M. Albrecht, C. Rechberger, T. Schneider, and T. Tiessen, Ciphers for MPC and FHE
DOI : 10.1007/978-3-662-46800-5_17

M. R. Albrecht, B. Driessen, G. Elif-bilge-kavun, C. Leander, T. Paar et al., Block Ciphers ??? Focus on the Linear Layer (feat. PRIDE), Advances in Cryptology -CRYPTO 2014 -34th Annual Cryptology Conference Proceedings, Part I, pp.57-76, 2014.
DOI : 10.1007/978-3-662-44371-2_4

D. Augot and M. Finiasz, Direct construction of recursive mds diffusion layers using shortened bch codes. Cryptology ePrint Archive, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01044597

S. Chari, C. S. Jutla, J. R. Rao, and P. Rohatgi, Towards Sound Approaches to Counteract Power-Analysis Attacks, Advances in Cryptology -CRYPTO '99, 19th Annual International Cryptology Conference Proceedings, volume 1666 of Lecture Notes in Computer Science, pp.398-412, 1999.
DOI : 10.1007/3-540-48405-1_26

J. Daemen, M. Peeters, G. Van-assche, and V. Rijmen, The block cipher Noekeon (NESSIE project submission)

J. Daemen and V. Rijmen, The Wide Trail Design Strategy, Cryptography and Coding Proceedings, pp.222-238, 2001.
DOI : 10.1007/3-540-45325-3_20

J. Daemen and V. Rijmen, The Design of Rijndael: AES -The Advanced Encryption Standard. Information Security and Cryptography, 2002.
DOI : 10.1007/978-3-662-04722-4

B. Gérard, V. Grosso, M. Naya-plasencia, and F. Standaert, Block Ciphers That Are Easier to Mask: How Far Can We Go?, Cryptographic Hardware and Embedded Systems -CHES 2013 -15th International Workshop Proceedings, volume 8086 of Lecture Notes in Computer Science, pp.383-399, 2013.
DOI : 10.1007/978-3-642-40349-1_22

H. Gilbert and T. Peyrin, Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations, Fast Software Encryption, 17th International Workshop, FSE 2010, pp.365-383, 2010.
DOI : 10.1007/978-3-642-13858-4_21

V. Grosso, G. Leurent, F. Standaert, and K. Varici, LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations
DOI : 10.1007/978-3-662-46706-0_2

URL : https://hal.archives-ouvertes.fr/hal-01093491

J. Guo, T. Peyrin, A. Poschmann, and M. J. Robshaw, The LED Block Cipher, Cryptographic Hardware and Embedded Systems -CHES 2011 -13th International Workshop, pp.326-341, 2011.
DOI : 10.1007/978-3-642-23951-9_22

L. R. Knudsen, G. Leander, A. Poschmann, and M. J. Robshaw, PRINTcipher: A Block Cipher for IC-Printing, Mangard and Standaert [15], pp.16-32
DOI : 10.1007/978-3-642-15031-9_2

G. Leander, M. A. Abdelraheem, H. Alkhzaimi, and E. Zenner, A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack, Advances in Cryptology -CRYPTO 2011 -31st Annual Cryptology Conference, pp.206-221, 2011.
DOI : 10.1007/978-3-642-22792-9_12

G. Leander, B. Minaud, and R. , A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro
DOI : 10.1007/978-3-662-46800-5_11

G. Piret, T. Roche, and C. Carlet, PICARO -A block cipher allowing efficient higher-order side-channel resistance -extended version -. IACR Cryptology ePrint Archive, p.358, 2012.

M. Rivain and E. Prouff, Provably Secure Higher-Order Masking of AES, Mangard and Standaert [15], pp.413-427
DOI : 10.1007/978-3-642-15031-9_28

N. Mouha and B. Preneel, Finding optimal bitsliced implementations of 4x4- bit s-boxes, SKEW 2011 Symmetric Key Encryption Workshop, pp.16-17, 2011.