D. Augot and M. Finiasz, Exhaustive search for small dimension recursive MDS diffusion layers for block ciphers and hash functions, 2013 IEEE International Symposium on Information Theory, pp.1551-1555, 2013.
DOI : 10.1109/ISIT.2013.6620487

URL : https://hal.archives-ouvertes.fr/hal-00823082

D. Augot and M. Finiasz, Direct Construction of Recursive MDS Diffusion Layers Using Shortened BCH Codes, Fast Software Encryption, FSE 2014, 2014.
DOI : 10.1007/978-3-662-46706-0_1

URL : https://hal.archives-ouvertes.fr/hal-01044597

D. Augot and M. Finiasz, Direct Construction of Recursive MDS Diffusion Layers Using Shortened BCH Codes
DOI : 10.1007/978-3-662-46706-0_1

URL : https://hal.archives-ouvertes.fr/hal-01044597

T. P. Berger, Construction of Recursive MDS Diffusion Layers from Gabidulin Codes, INDOCRYPT 2013, pp.274-285, 2013.
DOI : 10.1007/978-3-319-03515-4_18

URL : https://hal.archives-ouvertes.fr/hal-00913852

T. P. Berger and A. Ourivski, Construction of new MDS codes from Gabidulin codes, Proceedings of ACCT 2009, pp.40-47, 2004.
URL : https://hal.archives-ouvertes.fr/hal-00068463

P. Barreto and V. Rijmen, The Khazad Legacy-Level Block Cipher, Submission to the NESSIE Project, 2000.

J. Daemen, Cipher and hash function design, strategies based on linear and differential cryptanalysis, 1995.

J. Daemen, L. R. Knudsen, and V. Rijmen, The block cipher Square, Fast Software Encryption, pp.149-165, 1997.
DOI : 10.1007/BFb0052343

J. Daemen and V. Rijmen, The Design of Rijndael: AES -The Advanced Encryption Standard, Information Security and Cryptography, 2002.
DOI : 10.1007/978-3-662-04722-4

G. D. Filho, P. Barreto, and V. Rijmen, The Maelstrom-0 Hash Function, Proceedings of the 6th Brazilian Symposium on Information and Computer Systems Security, 2006.

E. M. Gabidulin, Theory of codes with maximum rank distance, Problems of Information Transmission (English translation of Problemy Peredachi Informatsii), 1985.

P. Gauravaram, L. R. Knudsen, K. Matusiewicz, F. Mendel, C. Rechberger et al., Gr?stl a SHA-3 Candidate, Submission to NIST, 2008.

J. Guo, T. Peyrin, and A. Poshmann, The PHOTON Family of Lightweight Hash Functions, CRYPTO 2011, pp.222-239, 2011.
DOI : 10.1007/978-3-642-22792-9_13

J. Guo, T. Peyrin, A. Poshmann, and M. J. Robshaw, The LED Block Cipher, CHES 2011, pp.326-341, 2011.
DOI : 10.1007/978-3-642-23951-9_22

K. C. Gupta and I. G. Ray, On Constructions of MDS Matrices from Companion Matrices for Lightweight Cryptography, CD-ARES Workshops 2013, pp.29-43, 2013.
DOI : 10.1007/978-3-642-40588-4_3

URL : https://hal.archives-ouvertes.fr/hal-01506562

P. Junod and S. Vaudenay, Perfect Diffusion Primitives for Block Ciphers, Selected Areas in Cryptography, pp.84-99, 2004.
DOI : 10.1007/978-3-540-30564-4_6

P. Junod and S. Vaudenay, FOX : A New Family of Block Ciphers, Selected Areas in Cryptography, pp.114-129, 2004.
DOI : 10.1007/978-3-540-30564-4_8

F. J. Macwilliams and N. J. Sloane, The Theory of Error-Correcting Codes, 1988.

S. Marchi and . De, Polynomials arising in factoring generalized Vandermonde determinants: an algorithm for computing their coefficients, Mathematical and Computer Modelling, pp.271-281, 2001.
DOI : 10.1016/S0895-7177(01)00060-7

N. Jr, J. Abrahao, and E. , A New Involutory MDS Matrix for the AES, In International Journal of Network Security, vol.9, issue.2, pp.109-116, 2009.

V. Rijmen, J. Daemen, B. Preneel, A. Bosselaers, and E. D. Win, The cipher SHARK, Fast Software Encryption, pp.99-112, 1996.
DOI : 10.1007/3-540-60865-6_47

M. Sajadieh, M. Dakhilalian, H. Mala, and P. Sepehrdad, Recursive Diffusion Layers for Block Ciphers and Hash Functions, Fast Software Encryption 2012, pp.385-401, 2012.
DOI : 10.1007/978-3-642-34047-5_22

B. Schneier, J. Kelsey, D. Whiting, D. Wagner, C. Hall et al., Twofish: A 128-bit block cipher, The first AES Candidate Conference. National Institute for Standards and Technology, 1998.

B. Schneier, J. Kelsey, D. Whiting, D. Wagner, C. Hall et al., The Twofish encryption algorithm, 1999.

C. P. Schnorr and S. Vaudenay, Black box cryptanalysis of hash networks based on multipermutations, EUROCRYPT 1994, pp.47-57, 1995.
DOI : 10.1007/BFb0053423

C. E. Shannon, Communication Theory of Secrecy Systems*, Bell Syst, pp.656-715, 1949.
DOI : 10.1002/j.1538-7305.1949.tb00928.x

S. Vaudenay, On the need for multipermutations: Cryptanalysis of MD4 and SAFER, Fast Software Encryption, pp.286-297, 1994.
DOI : 10.1007/3-540-60590-8_22

D. Watanabe, S. Furuya, H. Yoshida, K. Takaragi, and B. Preneel, A New Keystream Generator MUGI, Fast Software Encryption 2002, pp.179-194, 2002.
DOI : 10.1007/3-540-45661-9_14

S. Wu, M. Wang, and W. Wu, Recursive Diffusion Layers for (Lightweight) Block Ciphers and Hash Functions, Selected Areas in Cryptography 2013, pp.355-371, 2013.
DOI : 10.1007/978-3-642-35999-6_23