C. Beierle, J. Jean, S. Kölbl, G. Leander, A. Moradi et al., The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS, CRYPTO 2016, Part II, pp.123-153, 2016.
DOI : 10.1007/978-3-642-21599-5_13

J. Borghoff, A. Canteaut, T. Güneysu, E. B. Kavun, M. Kne?evi´kne?evi´c et al., PRINCE -A low-latency block cipher for pervasive computing applications -extended abstract, ASIACRYPT 2012, pp.208-225, 2012.
DOI : 10.1007/978-3-642-34961-4_14

URL : http://orbit.dtu.dk/en/publications/prince--a-lowlatency-block-cipher-for-pervasive-computing-applications-extended-abstract(f7c39395-2294-475d-8fe4-102655401c00).html

C. Chaigneau, T. Fuhr, H. Gilbert, J. Jean, and J. R. Reinhard, Cryptanalysis of NORX v2.0, IACR Trans. Symmetric Cryptol, vol.2017, issue.1, 2017.

J. Guo, J. Jean, I. Nikolic, K. Qiao, Y. Sasaki et al., Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs, IACR Trans. Symmetric Cryptol, vol.2016, issue.1, pp.33-56, 2016.

J. Guo, T. Peyrin, A. Poschmann, and M. J. Robshaw, The LED Block Cipher, CHES 2011, pp.326-341, 2011.
DOI : 10.1007/978-3-642-23951-9_22

J. Jean, Cryptanalysis of Haraka, IACR Trans. Symmetric Cryptol, vol.2016, issue.1, pp.1-12, 2016.

G. Leander, M. A. Abdelraheem, H. Alkhzaimi, and E. Zenner, A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack, CRYPTO 2011, pp.206-221, 2011.
DOI : 10.1007/978-3-642-22792-9_12

G. Leander, B. Minaud, and S. Rønjom, A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro, EUROCRYPT 2015, Part I. LNCS, pp.254-283, 2015.
DOI : 10.1007/978-3-662-46800-5_11

S. Rønjom, Invariant subspaces in Simpira Cryptology ePrint Archive, Report, vol.2016248, p.248, 2016.

Y. Todo, G. Leander, and Y. Sasaki, Nonlinear invariant attack -practical attack on full SCREAM, iSCREAM, and Midori64, ASI- ACRYPT 2016, Part II, pp.3-33, 2016.