Differential cryptanalysis of DES-like cryptosystems, CRYPTO'90, pp.2-21, 1991. ,
DOI : 10.1007/3-540-38424-3_1
URL : http://www.crypto.nkfu.edu.tw/CRYPTO/biham.pdf
Differential properties of power functions, International Journal of Information and Coding Theory, vol.1, issue.2, pp.149-170, 2010. ,
DOI : 10.1504/IJICOT.2010.032132
URL : https://hal.archives-ouvertes.fr/hal-00610092
Multiple Differential Cryptanalysis: Theory and Practice, LNCS, vol.21, pp.35-54, 2011. ,
DOI : 10.1007/978-3-540-71039-4_23
URL : https://hal.archives-ouvertes.fr/hal-00610107
On the classification of APN functions up to dimension five, Designs, Codes and Cryptography, vol.2, issue.1-3, pp.273-288, 2008. ,
DOI : 10.1007/s10623-008-9194-6
An APN permutation in dimension six, Contemporary Mathematics. AMS, vol.518, pp.33-42, 2010. ,
DOI : 10.1090/conm/518/10194
On the Behaviors of Affine Equivalent Sboxes Regarding Differential and Linear Attacks, EUROCRYPT 2015, Part I, pp.45-74, 2015. ,
DOI : 10.1007/978-3-662-46800-5_3
URL : https://hal.archives-ouvertes.fr/hal-01104051
Open Questions on Nonlinearity and on APN Functions, Arithmetic of Finite Fields -WAIFI 2014, pp.83-107, 2015. ,
DOI : 10.1007/978-3-319-16277-5_5
Codes, Bent Functions and Permutations Suitable For DES-like Cryptosystems, Designs, Codes and Cryptography, vol.15, issue.2, pp.125-156, 1998. ,
DOI : 10.1023/A:1008344232130
Links between differential and linear cryptoanalysis, EUROCRYPT'94, pp.356-365, 1995. ,
DOI : 10.1007/bfb0053450
URL : http://umjy.chonnam.ac.kr/~journey/cs/crypto/papers/liens-94-3_a4.ps
Almost perfect nonlinear power functions on GF(2/sup n/): the Welch case, IEEE Transactions on Information Theory, vol.45, issue.4, pp.1271-1275, 1999. ,
DOI : 10.1109/18.761283
A new APN function which is not equivalent to a power mapping, IEEE Transactions on Information Theory, vol.52, issue.2, pp.744-747, 2006. ,
DOI : 10.1109/TIT.2005.862128
URL : http://arxiv.org/pdf/math/0506420
On a remarkable property of APN Gold functions, Cryptology ePrint Archive Report, vol.2016, p.286, 2016. ,
Proof of a conjecture on the sequence of exceptional numbers, classifying cyclic codes and APN functions, Journal of Algebra, vol.343, issue.1, pp.78-92, 2011. ,
DOI : 10.1016/j.jalgebra.2011.06.019
Truncated and higher order differentials, FSE'94, pp.196-211, 1995. ,
DOI : 10.1007/3-540-60590-8_16
URL : ftp://ftp.esat.kuleuven.ac.be/cosic/knudsen/trunc.ps.Z
PRINTcipher: A Block Cipher for IC-Printing, LNCS, vol.6225, pp.16-32, 2010. ,
DOI : 10.1007/978-3-642-15031-9_2
On the Classification of 4 Bit S-Boxes, Proceedings. Lecture Notes in Computer Science, vol.4547, pp.159-176, 2007. ,
DOI : 10.1007/978-3-540-73074-3_13
Differentially uniform mappings for cryptography, EUROCRYPT'93, pp.55-64, 1994. ,
DOI : 10.1007/3-540-48285-7_6
Provable security against differential cryptanalysis (rump session), LNCS, vol.740, pp.566-574, 1993. ,
DOI : 10.1007/3-540-48071-4_41
Improving the Upper Bound on the Maximum Differential and the Maximum Linear Hull Probability for SPN Structures and AES, LNCS, vol.2887, pp.247-260, 2003. ,
DOI : 10.1007/978-3-540-39887-5_19
Antiderivative functions over F2n, Workshop on Coding and Cryptography -WCC 2015, 2015. ,
DOI : 10.1007/s10623-016-0186-7
URL : https://hal.archives-ouvertes.fr/hal-01275708
Antiderivative functions over $$\mathbb {F}_{2^n}$$ F 2 n, Designs, Codes and Cryptography, vol.82, issue.1-2, pp.435-447, 2017. ,
DOI : 10.1007/s00200-014-0220-9
A matrix approach for constructing quadratic APN functions, Designs, Codes and Cryptography, vol.73, issue.2, pp.587-600, 2014. ,
DOI : 10.1016/j.ffa.2011.06.002
URL : http://eprint.iacr.org/2013/007.pdf