T. Baignères, P. Junod, and S. Vaudenay, How Far Can We Go Beyond Linear Cryptanalysis?, Advances in Cryptology - ASIACRYPT 2004, pp.432-450, 2004.
DOI : 10.1007/978-3-540-30539-2_31

E. Biham, A. Biryukov, and A. Shamir, Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials, Advances in Cryptography -EURO- CRYPT 1999, pp.12-23, 1999.
DOI : 10.1007/3-540-48910-X_2

E. Biham and A. Shamir, Differential Cryptanalysis of DES-like Cryptosystems, Lecture Notes in Computer Science, vol.537, pp.2-21, 1991.
DOI : 10.1007/3-540-38424-3_1

C. Blondeau and B. Gérard, Links between theoretical and effective differential probabilities: Experiments on PRESENT. ECrypt II Workshop on Tools for Cryptanalysis, 2010.

C. Blondeau and B. Gérard, Multiple Differential Cryptanalysis: Theory and Practice, Lecture Notes in Computer Science, vol.21, 2011.
DOI : 10.1007/978-3-540-71039-4_23

URL : https://hal.archives-ouvertes.fr/hal-00610107

A. Bogdanov, L. R. Knudsen, G. Leander, C. Paar, A. Poschmann et al., PRESENT: An Ultra-Lightweight Block Cipher, Cryptographic Hardware and Embedded Systems ? CHES 2007, pp.450-466, 2007.
DOI : 10.1007/978-3-540-74735-2_31

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.122.2536

A. Bogdanov and C. Rechberger, A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN, Selected Areas in Cryptography -SAC 2010, pp.229-240, 2010.
DOI : 10.1007/978-3-642-01001-9_8

C. Decannì-ere, O. Dunkelman, and M. Kne?evi´kne?evi´c, KATAN and KTANTAN ??? A Family of Small and Efficient Hardware-Oriented Block Ciphers, Cryptographic Hardware and Embedded Systems -CHES 2009, pp.272-288, 2009.
DOI : 10.1007/978-3-642-04138-9_20

J. Daemen and V. Rijmen, Probability distributions of correlation and differentials in block ciphers, Journal of Mathematical Cryptology, vol.1, issue.3, 2005.
DOI : 10.1515/JMC.2007.011

D. Hong, J. Sung, S. Hong, J. Lim, S. Lee et al., HIGHT: A New Block Cipher Suitable for Low-Resource Device, Cryptographic Hardware and Embedded Systems -CHES 2006, pp.46-59, 2006.
DOI : 10.1007/11894063_4

S. Knellwolf, Meet-in-the-Middle cryptanalysis of KATAN, ECRYPT Workshop on Lightweight Cryptography, 2011.

S. Knellwolf, W. Meier, and M. Naya-plasencia, Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems, Advances in Cryptography -ASIACRYPT 2010, pp.130-145, 2010.
DOI : 10.1007/978-3-642-17373-8_8

L. Knudsen, DEAL ? a 128-bit block cipher, 1998.

L. R. Knudsen, Truncated and higher order differentials, Fast Software Encryption, pp.196-211, 1995.
DOI : 10.1007/3-540-60590-8_16

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.34.4730

X. Lai, Higher order derivatives and differential cryptanalysis. communications and cryptography, 1994.
DOI : 10.1007/978-1-4615-2694-0_23

X. Lai and J. L. Massey, Markov Ciphers and Differential Cryptanalysis, Advances in Cryptology ? EUROCRYPT'91, pp.17-38, 1991.
DOI : 10.1007/3-540-46416-6_2

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.36.2323

G. Leander, Small scale variants of the block cipher PRESENT. Cryptology ePrint Archive, Report, vol.143, 2010.

S. Murphy, The analysis of simultaneous differences in Differential Cryptanalysis, 2011.

S. Murphy, F. Piper, M. Walker, and P. Wild, Likelihood estimation for block cipher keys, 1995.

C. Tezcan, The Improbable Differential Attack: Cryptanalysis of Reduced Round CLEFIA, Progress in Cryptology -INDOCRYPT 2010, pp.197-209, 2010.
DOI : 10.1007/978-3-642-17401-8_15

L. Wei, C. Rechberger, J. Guo, H. Wu, H. Wang et al., Improved Meet-in-the-Middle Cryptanalysis of KTANTAN (Poster), Cryptology ePrint Archive Report, vol.201, 2011.
DOI : 10.1007/978-3-642-22497-3_31