A. Biryukov and D. Khovratovich, Related-Key Cryptanalysis of the Full AES-192 and AES-256, pp.11-12
DOI : 10.1007/978-3-642-10366-7_1

A. Biryukov and I. Nikolic, A New Security Analysis of AES-128. CRYPTO 2009 rump session, slides only, 2009.

A. Bogdanov, D. Khovratovich, and C. Rechberger, Biclique Cryptanalysis of the Full AES, Lecture Notes in Computer Science, vol.7073, pp.344-371, 2011.
DOI : 10.1007/978-3-642-25385-0_19

C. Bouillaguet, P. Derbez, and P. A. Fouque, Automatic Search of Attacks on Round-Reduced AES and Applications, Lecture Notes in Computer Science, vol.6841, pp.169-187, 2011.
DOI : 10.1007/978-3-642-22792-9_10

URL : https://hal.archives-ouvertes.fr/hal-01110414

J. Daemen and V. Rijmen, Understanding Two-Round Differentials in AES, Lecture Notes in Computer Science, vol.4116, pp.78-94, 2006.
DOI : 10.1007/11832072_6

O. Dunkelman, N. Keller, and A. Shamir, Improved Single-Key Attacks on 8-Round AES-192 and AES-256, Lecture Notes in Computer Science, vol.6477, pp.158-176, 2010.
DOI : 10.1007/978-3-642-17373-8_10

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.295.9494

H. Gilbert and T. Peyrin, Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations, Lecture Notes in Computer Science, vol.6147, pp.365-383, 2010.
DOI : 10.1007/978-3-642-13858-4_21

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.215.1874

L. R. Knudsen and V. Rijmen, Known-Key Distinguishers for Some Block Ciphers, Lecture Notes in Computer Science, vol.4833, pp.315-324, 2007.
DOI : 10.1007/978-3-540-76900-2_19

M. Lamberger, F. Mendel, C. Rechberger, V. Rijmen, and M. Schläffer, Rebound Distinguishers: Results on the Full Whirlpool Compression Function, pp.126-143
DOI : 10.1007/978-3-642-10366-7_8

M. Matsui, Advances in Cryptology -ASIACRYPT, 15th International Conference on the Theory and Application of Cryptology and Information Security Proceedings, 2009.

F. Mendel, T. Peyrin, C. Rechberger, and M. Schläffer, Improved Cryptanalysis of the Reduced Gr??stl Compression Function, ECHO Permutation and AES Block Cipher, Lecture Notes in Computer Science, vol.5867, pp.16-35, 2009.
DOI : 10.1007/978-3-642-05445-7_2

F. Mendel, C. Rechberger, M. Schläffer, and S. S. Thomsen, The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Gr??stl, Lecture Notes in Computer Science, vol.5665, pp.260-276, 2009.
DOI : 10.1007/978-3-642-03317-9_16

M. Minier, R. C. Phan, and B. Pousse, Distinguishers for Ciphers and Known Key Attack against Rijndael with Large Blocks, Lecture Notes in Computer Science, vol.16, issue.4, pp.60-76, 2009.
DOI : 10.1007/s00145-003-0220-6

URL : https://hal.archives-ouvertes.fr/inria-00524350

I. Nikolic, J. Pieprzyk, P. Sokolowski, and R. Steinfeld, Known and Chosen Key Differential Distinguishers for Block Ciphers, Lecture Notes in Computer Science, vol.6829, pp.29-48, 2010.
DOI : 10.1007/978-3-642-24209-0_3

Y. Sasaki, S. Emami, D. Hong, and A. Kumar, Improved Known-Key Distinguishers on Feistel-SP Ciphers and Application to Camellia, ACISP. Lecture Notes in Computer Science, vol.7372, pp.87-100, 2012.
DOI : 10.1007/978-3-642-31448-3_7

URL : http://www.researchonline.mq.edu.au/vital/access/services/Download/mq:21069/DS01

Y. Sasaki and K. Yasuda, Known-Key Distinguishers on 11-Round Feistel and Collision Attacks on Its Hashing Modes, Lecture Notes in Computer Science, vol.10, pp.397-415, 2011.
DOI : 10.1109/TIT.1964.1053661