M. Matsui and A. Yamagishi, A New Method for Known Plaintext Attack of FEAL Cipher, Proceedings of the 11th annual international conference on Theory and application of cryptographic techniques. EUROCRYPT'92, pp.81-91, 1993.
DOI : 10.1007/3-540-47555-9_7

E. Biham and A. Shamir, Differential Cryptanalysis of DES-like Cryptosystems, Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology. CRYPTO '90, pp.2-21, 1991.

R. Team, R: A Language and Environment for Statistical Computing. R Foundation for Statistical Computing, 2013.

F. Lafitte, The boolfun Package: Cryptographic Properties of Boolean Functions, 2013.

F. Lafitte, D. V. Heule, and J. V. Hamme, Cryptographic Boolean Functions with R, The R Journal, vol.3, issue.1, pp.44-47, 2011.

W. A. Stein, The Sage Development Team, Sage Mathematics Software, 2013.

J. Alvarez-cubero and P. Zufiria, A c++ class for analysing vector boolean functions from a cryptographic perspective, Security and Cryptography (SECRYPT) Proceedings of the 2010 International Conference on, pp.1-9, 2010.

L. R. Knudsen and M. Robshaw, The Block Cipher Companion. Information Security and Cryptography, 2011.

A. Braeken, Cryptographic Properties of Boolean Functions and S-Boxes, 2006.

Y. Crama and P. L. Hammer, Boolean Models and Methods in Mathematics, 2010.

S. Guilley and R. Pacalet, Differential Power Analysis Model and Some Results, pp.127-142, 2004.
DOI : 10.1007/1-4020-8147-2_9

E. Prouff, DPA Attacks and S-Boxes, Lecture Notes in Computer Science, vol.3557, pp.424-441, 2005.
DOI : 10.1007/11502760_29

C. Carlet, On Highly Nonlinear S-Boxes and Their Inability to Thwart DPA Attacks, Proceedings of the 6th international conference on Cryptology in India. INDOCRYPT'05, pp.49-62, 2005.
DOI : 10.1007/11596219_5

L. D. Burnett, Heuristic Optimization of Boolean Functions and Substitution Boxes for Cryptography, 2005.

X. Zhang and Y. Zheng, GAC ??? the Criterion for Global Avalanche Characteristics of Cryptographic Functions, Journal of Universal Computer Science, vol.1, issue.5, pp.316-333, 1995.
DOI : 10.1007/978-3-642-80350-5_30

J. A. Clark, J. L. Jacob, and S. Stepney, The design of S-boxes by simulated annealing, New Generation Computing, vol.220, issue.4598, pp.219-231, 2005.
DOI : 10.1007/BF03037656

B. Preneel, W. Van-leekwijck, L. Van-linden, R. Govaerts, and J. Vandewalle, Propagation Characteristics of Boolean Functions, Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology . EUROCRYPT '90, pp.161-173, 1991.
DOI : 10.1007/3-540-46877-3_14

H. M. Heys, A TUTORIAL ON LINEAR AND DIFFERENTIAL CRYPTANALYSIS, Cryptologia, vol.26, issue.3, 2001.
DOI : 10.1080/0161-110291890885

K. Nyberg, Perfect nonlinear S-boxes, Proceedings. Lecture Notes in Computer Science, vol.547, pp.378-386, 1991.
DOI : 10.1007/3-540-46416-6_32

J. Seberry, X. M. Zhang, and Y. Zheng, Systematic Generation of Cryptographically Robust S-boxes (Extended Abstract), Proceedings of the First ACM Conference on Computer and Communications Security, pp.172-182, 1993.

J. Daemen and V. Rijmen, The Design of Rijndael, 2002.
DOI : 10.1007/978-3-662-04722-4

M. J. Saarinen, Cryptographic Analysis of All 4 ?? 4-Bit S-Boxes, Lecture Notes in Computer Science, vol.8, issue.1, pp.118-133, 2012.
DOI : 10.1007/978-3-540-25937-4_18

L. Fan, Y. Zhou, and D. Feng, A Fast Implementation of Computing the Transparency Order of S-Boxes, 2008 The 9th International Conference for Young Computer Scientists, pp.206-211, 2008.
DOI : 10.1109/ICYCS.2008.302

C. Cid, S. Kiyomoto, and J. Kurihara, The rakaposhi Stream Cipher, Lecture Notes in Computer Science, vol.5927, pp.32-46, 2009.
DOI : 10.1007/978-3-642-11145-7_5

W. Kusnierczyk, rbenchmark: Benchmarking routine for R, 2012.