Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium, FSE 2009, pp.1-22, 2009. ,
DOI : 10.1007/978-3-642-03317-9_1
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.423.1108
PRINCE -A low-latency block cipher for pervasive computing applications -extended abstract, 2012. ,
DOI : 10.1007/978-3-642-34961-4_14
PRINCE -a low-latency block cipher for pervasive computing applications (full version) Cryptology ePrint Archive, p.529529, 2012. ,
DOI : 10.1007/978-3-642-34961-4_14
On the Influence of the Algebraic Degree of <formula formulatype="inline"><tex Notation="TeX">$F^{-1}$</tex></formula> on the Algebraic Degree of <formula formulatype="inline"><tex Notation="TeX">$G \circ F$</tex> </formula>, IEEE Transactions on Information Theory, vol.59, issue.1, pp.691-702, 2013. ,
DOI : 10.1109/TIT.2012.2214203
Higher-Order Differential Properties of Keccak and Luffa, FSE 2011, pp.252-269 ,
DOI : 10.1007/978-3-642-13858-4_15
URL : https://hal.archives-ouvertes.fr/inria-00537741
On cryptographic properties of the cosets of R(1, m), IEEE Transactions on Information Theory, vol.47, issue.4, pp.1494-1513, 2001. ,
DOI : 10.1109/18.923730
Degree of Composition of Highly Nonlinear Functions and Applications to Higher Order Differential Cryptanalysis, EUROCRYPT 2002, pp.518-533, 2002. ,
DOI : 10.1007/3-540-46035-7_34
The block cipher Square, FSE'97, pp.149-165, 1997. ,
DOI : 10.1007/BFb0052343
An algebraic approach to the association schemes of coding theory, 1973. ,
Optimized Interpolation Attacks on LowMC, Cryptology ePrint Archive Report, vol.2015418, p.418, 2015. ,
DOI : 10.1007/978-3-662-48800-3_22
URL : https://hal.archives-ouvertes.fr/hal-01235171
Cube Attacks on Tweakable Black Box Polynomials, EUROCRYPT 2009, pp.278-299, 2009. ,
DOI : 10.1007/978-3-540-68164-9_16
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.149.3185
Breaking Grain-128 with Dynamic Cube Attacks, FSE 2011, pp.167-187, 2011. ,
DOI : 10.1007/978-3-642-17401-8_16
Private communication, 2016. ,
Truncated and higher order differentials, FSE'94, pp.196-211, 1995. ,
DOI : 10.1007/3-540-60590-8_16
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.34.4730
Integral Cryptanalysis, FSE 2002, pp.112-127, 2002. ,
DOI : 10.1007/3-540-45661-9_9
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.20.6154
Higher order derivatives and differential cryptanalysis on the occasion of his 60'th birthday, Proc. " Symposium on Communication, Coding and Cryptography, 1994. ,
On the Classification of 4 Bit S-Boxes, Proceedings. Lecture Notes in Computer Science, vol.4547, pp.159-176, 2007. ,
DOI : 10.1007/978-3-540-73074-3_13
The theory of error-correcting codes, 1977. ,
Application of Boolean algebra to switching circuit design and to error detection, Transactions of the I.R.E. Professional Group on Electronic Computers, vol.3, issue.3, pp.6-12, 1954. ,
DOI : 10.1109/IREPGELC.1954.6499441
A class of multiple-error-correcting codes and the decoding scheme, Transactions of the IRE Professional Group on Information Theory, vol.4, issue.4, pp.38-49, 1954. ,
DOI : 10.1109/TIT.1954.1057465
New observation on division property, Science China Information Sciences, vol.9215, issue.9, p.459, 2015. ,
DOI : 10.1007/s11432-015-0376-x
Orthogonal polynomials, 1959. ,
DOI : 10.1090/coll/023
Integral Cryptanalysis on Full MISTY1, CRYPTO 2015, Part I. LNCS, pp.413-432, 2015. ,
DOI : 10.1007/978-3-662-47989-6_20
Structural Evaluation by Generalized Integral Property, EUROCRYPT 2015, Part I. LNCS, pp.287-314 ,
DOI : 10.1007/978-3-662-46800-5_12