J. P. Aumasson, I. Dinur, W. Meier, and A. Shamir, Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium, FSE 2009, pp.1-22, 2009.
DOI : 10.1007/978-3-642-03317-9_1

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.423.1108

J. Borghoff, A. Canteaut, T. Güneysu, E. B. Kavun, M. Kne?evi´kne?evi´c et al., PRINCE -A low-latency block cipher for pervasive computing applications -extended abstract, 2012.
DOI : 10.1007/978-3-642-34961-4_14

J. Borghoff, A. Canteaut, T. Güneysu, E. B. Kavun, M. Kne?evi´kne?evi´c et al., PRINCE -a low-latency block cipher for pervasive computing applications (full version) Cryptology ePrint Archive, p.529529, 2012.
DOI : 10.1007/978-3-642-34961-4_14

C. Boura and A. Canteaut, On the Influence of the Algebraic Degree of <formula formulatype="inline"><tex Notation="TeX">$F^{-1}$</tex></formula> on the Algebraic Degree of <formula formulatype="inline"><tex Notation="TeX">$G \circ F$</tex> </formula>, IEEE Transactions on Information Theory, vol.59, issue.1, pp.691-702, 2013.
DOI : 10.1109/TIT.2012.2214203

C. Boura, A. Canteaut, and C. Decannì-ere, Higher-Order Differential Properties of Keccak and Luffa, FSE 2011, pp.252-269
DOI : 10.1007/978-3-642-13858-4_15

URL : https://hal.archives-ouvertes.fr/inria-00537741

A. Canteaut, C. Carlet, P. Charpin, and C. Fontaine, On cryptographic properties of the cosets of R(1, m), IEEE Transactions on Information Theory, vol.47, issue.4, pp.1494-1513, 2001.
DOI : 10.1109/18.923730

A. Canteaut and M. Videau, Degree of Composition of Highly Nonlinear Functions and Applications to Higher Order Differential Cryptanalysis, EUROCRYPT 2002, pp.518-533, 2002.
DOI : 10.1007/3-540-46035-7_34

J. Daemen, L. R. Knudsen, and V. Rijmen, The block cipher Square, FSE'97, pp.149-165, 1997.
DOI : 10.1007/BFb0052343

P. Delsarte, An algebraic approach to the association schemes of coding theory, 1973.

I. Dinur, Y. Liu, W. Meier, and Q. Wang, Optimized Interpolation Attacks on LowMC, Cryptology ePrint Archive Report, vol.2015418, p.418, 2015.
DOI : 10.1007/978-3-662-48800-3_22

URL : https://hal.archives-ouvertes.fr/hal-01235171

I. Dinur and A. Shamir, Cube Attacks on Tweakable Black Box Polynomials, EUROCRYPT 2009, pp.278-299, 2009.
DOI : 10.1007/978-3-540-68164-9_16

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.149.3185

I. Dinur and A. Shamir, Breaking Grain-128 with Dynamic Cube Attacks, FSE 2011, pp.167-187, 2011.
DOI : 10.1007/978-3-642-17401-8_16

D. Khovratovich, Private communication, 2016.

L. R. Knudsen, Truncated and higher order differentials, FSE'94, pp.196-211, 1995.
DOI : 10.1007/3-540-60590-8_16

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.34.4730

L. R. Knudsen and D. Wagner, Integral Cryptanalysis, FSE 2002, pp.112-127, 2002.
DOI : 10.1007/3-540-45661-9_9

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.20.6154

X. Lai, Higher order derivatives and differential cryptanalysis on the occasion of his 60'th birthday, Proc. " Symposium on Communication, Coding and Cryptography, 1994.

G. Leander and A. Poschmann, On the Classification of 4 Bit S-Boxes, Proceedings. Lecture Notes in Computer Science, vol.4547, pp.159-176, 2007.
DOI : 10.1007/978-3-540-73074-3_13

F. J. Macwilliams and N. J. Sloane, The theory of error-correcting codes, 1977.

D. E. Muller, Application of Boolean algebra to switching circuit design and to error detection, Transactions of the I.R.E. Professional Group on Electronic Computers, vol.3, issue.3, pp.6-12, 1954.
DOI : 10.1109/IREPGELC.1954.6499441

I. S. Reed, A class of multiple-error-correcting codes and the decoding scheme, Transactions of the IRE Professional Group on Information Theory, vol.4, issue.4, pp.38-49, 1954.
DOI : 10.1109/TIT.1954.1057465

B. Sun, X. Hai, W. Zhang, L. Cheng, and Z. Yang, New observation on division property, Science China Information Sciences, vol.9215, issue.9, p.459, 2015.
DOI : 10.1007/s11432-015-0376-x

G. Szegö, Orthogonal polynomials, 1959.
DOI : 10.1090/coll/023

Y. Todo, R. Gennaro, and M. J. Robshaw, Integral Cryptanalysis on Full MISTY1, CRYPTO 2015, Part I. LNCS, pp.413-432, 2015.
DOI : 10.1007/978-3-662-47989-6_20

Y. Todo, Structural Evaluation by Generalized Integral Property, EUROCRYPT 2015, Part I. LNCS, pp.287-314
DOI : 10.1007/978-3-662-46800-5_12