M. Bellare and T. Kohno, A Theoretical Treatment of Related-Key Attacks: RKA-PRPs, RKA-PRFs, and Applications, EUROCRYPT'03, pp.491-506, 2003.
DOI : 10.1007/3-540-39200-9_31

E. Biham, New Types of Cryptoanalytic Attacks Using Related Keys (Extended Abstract) In: EURO- CRYPT'93, LNCS, pp.398-409, 1993.

E. Biham, R. J. Anderson, and L. R. Knudsen, Serpent: A New Block Cipher Proposal, FSE'98, pp.222-238, 1998.
DOI : 10.1007/3-540-69710-1_15

E. Biham, O. Dunkelman, and N. Keller, A Related-Key Rectangle Attack on the Full KASUMI, ASIACRYPT'05, pp.443-461, 2005.
DOI : 10.1007/11593447_24

E. Biham, O. Dunkelman, and N. Keller, Related-Key Boomerang and Rectangle Attacks, EUROCRYPT'05, pp.507-525, 2005.
DOI : 10.1007/11426639_30

E. Biham and A. Shamir, Differential Cryptanalysis of DES-like Cryptosystems, CRYPTO'90, pp.2-21, 1990.

A. Biryukov and D. Khovratovich, Related-Key Cryptanalysis of the Full AES-192 and AES-256, ASIACRYPT'09, pp.1-18978, 2009.
DOI : 10.1007/978-3-642-10366-7_1

A. Biryukov, D. Khovratovich, and I. Nikolic, Distinguisher and Related-Key Attack on the Full AES-256, CRYPTO'09, pp.231-249978, 2009.
DOI : 10.1007/978-3-642-03356-8_14

A. Bogdanov, C. Boura, V. Rijmen, M. Wang, L. Wen et al., Key Difference Invariant Bias in Block Ciphers, Advances in Cryptology -ASIACRYPT 2013 -19th International Conference on the Theory and Application of Cryptology and Information Security Proceedings, Part I. Lecture Notes in Computer Science, pp.357-376, 2013.
DOI : 10.1007/978-3-642-42033-7_19

A. Bogdanov, L. R. Knudsen, G. Leander, C. Paar, A. Poschmann et al., PRESENT: An Ultra-Lightweight Block Cipher, CHES'07, pp.450-466, 2007.
DOI : 10.1007/978-3-540-74735-2_31

A. Bogdanov and E. Tischhauser, On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui???s Algorithm??2, Lecture Notes in Computer Science, vol.8424, pp.19-38, 2013.
DOI : 10.1007/978-3-662-43933-3_2

C. Cid, S. Murphy, and M. J. Robshaw, Small Scale Variants of the AES, FSE'05, pp.145-162, 2005.
DOI : 10.1007/11502760_10

J. Daemen and V. Rijmen, AES and the Wide Trail Design Strategy, EURO- CRYPT'02, pp.108-109, 2002.
DOI : 10.1007/3-540-46035-7_7

J. Daemen and V. Rijmen, The Design of Rijndael: AES ? The Advanced Encryption Standard, 2002.
DOI : 10.1007/978-3-662-04722-4

J. Daemen and V. Rijmen, Probability distributions of correlation and differentials in block ciphers, Journal of Mathematical Cryptology, vol.1, issue.3, pp.221-242, 2007.
DOI : 10.1515/JMC.2007.011

O. Dunkelman, E. Fleischmann, M. Gorski, and S. Lucks, Related-Key Rectangle Attack of the Full HAS-160 Encryption Mode, INDOCRYPT'09, pp.157-168
DOI : 10.1007/978-3-642-10628-6_11

E. Fleischmann, M. Gorski, and S. Lucks, Memoryless Related-Key Boomerang Attack on the Full Tiger Block Cipher, ISPEC'09, pp.298-309978, 2009.
DOI : 10.1007/3-540-48519-8_12

M. Hermelin and K. Nyberg, Dependent Linear Approximations: The Algorithm of Biryukov and Others Revisited, CT-RSA'10, pp.318-333978, 2010.
DOI : 10.1007/978-3-642-11925-5_22

L. R. Knudsen and V. Rijmen, Known-Key Distinguishers for Some Block Ciphers, ASIACRYPT'07, pp.315-324, 2007.
DOI : 10.1007/978-3-540-76900-2_19

M. Matsui, Linear Cryptoanalysis Method for DES Cipher, EUROCRYPT'93. pp. 386?397, 1993.

K. Nyberg, Linear approximation of block ciphers, EUROCRYPT'94, pp.439-444, 1994.
DOI : 10.1007/BFb0053460

O. Connor and L. , Properties of Linear Approximation Tables, FSE'94, pp.131-136, 1994.

V. Rijmen, J. Daemen, B. Preneel, A. Bosselaers, and E. De-win, The cipher SHARK, FSE'96, pp.99-111, 1996.
DOI : 10.1007/3-540-60865-6_47

A. Röck and K. Nyberg, Generalization of Matsui???s Algorithm 1 to linear hull for key-alternating block ciphers, Designs, Codes and Cryptography, vol.66, issue.1-3, pp.175-193, 2013.
DOI : 10.1007/s10623-012-9679-1

S. Vaudenay, Decorrelation: A Theory for Block Cipher Security, Journal of Cryptology, vol.16, issue.4, pp.249-286, 2003.
DOI : 10.1007/s00145-003-0220-6

P. L. Vora and D. Mir, Related-Key Linear Cryptanalysis, 2006 IEEE International Symposium on Information Theory, pp.1609-1613, 2006.
DOI : 10.1109/ISIT.2006.261548

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.155.2801

W. Zhang, L. Zhang, W. Wu, and D. Feng, Related-Key Differential-Linear Attacks on Reduced AES-192, INDOCRYPT'07, pp.73-85, 2007.
DOI : 10.1007/978-3-540-77026-8_7