K. Aoki, T. Ichikawa, M. Kanda, M. Matsui, S. Moriai et al., Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms-Design and Analysis, Selected Areas in Cryptography-SAC 2000, vol.2012, pp.39-56, 2000.

B. Bahrak and M. R. Aref, Impossible Differential Attack on Seven-Round AES-128, vol.2, pp.28-32, 2008.

E. Biham, A. Biryukov, and A. Shamir, Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials, EUROCRYPT'99, vol.1592, pp.12-23, 1999.

A. Biryukov, P. Derbez, and L. Perrin, Differential Analysis and Meet-in-the-Middle Attack Against Round-Reduced TWINE. In: Fast Software Encryption-FSE 2015, vol.9054, pp.3-27, 2015.

C. Blondeau, Impossible differential attack on 13-round Camellia-192, Inf. Process. Lett, vol.115, issue.9, pp.660-666, 2015.

C. Blondeau and M. Minier, Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel Networks Using the Matrix Method, FSE 2015, vol.9054, pp.92-113, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01199221

A. Bogdanov, D. Khovratovich, and C. Rechberger, Biclique Cryptanalysis of the Full AES, ASIACRYPT'11, vol.7073, pp.344-371, 2011.

A. Bogdanov, L. R. Knudsen, G. Leander, C. Paar, A. Poschmann et al., PRESENT: An Ultra-Lightweight Block Cipher, CHES 2007, vol.4727, pp.450-466, 2007.

C. Boura, M. Minier, M. Naya-plasencia, and V. Suder, Improved Impossible Differential Attacks against Round-Reduced LBlock. IACR Cryptology ePrint Archive, vol.279, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01068887

C. Boura, M. Naya-plasencia, and V. Suder, Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon. In: ASIACRYPT'14 (I), vol.8873, pp.179-199, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01068894

P. Derbez, Note on Impossible Differential Attacks. In: Fast Software EncryptionFSE 2016, vol.9783, pp.416-427, 2016.

P. Derbez and P. A. Fouque, Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES, Fast Software Encryption-FSE 2013, vol.8424, pp.541-560, 2013.

P. Derbez, P. A. Fouque, and J. Jean, Improved Key Recovery Attacks on ReducedRound AES in the Single-Key Setting, EUROCRYPT'13, vol.7881, pp.371-387, 2013.
URL : https://hal.archives-ouvertes.fr/hal-01094304

, Announcing the Advanced Encryption Standard (AES), FIPS, vol.197, 2001.

J. Guo, T. Peyrin, A. Poschmann, and M. J. Robshaw, The LED Block Cipher, vol.6917, pp.326-341, 2011.

J. Jean, M. Naya-plasencia, and T. Peyrin, Multiple Limited-Birthday Distinguishers and Applications, SAC'13, vol.8282, 2014.
URL : https://hal.archives-ouvertes.fr/hal-00870452

J. Kim, S. Hong, S. Lee, J. H. Song, and H. Yang, Truncated Differential Attacks on 8-Round CRYPTON. In: ICISC 2003, vol.2971, pp.446-456, 2004.

L. R. Knudsen, DEAL-A 128-bit cipher, 1998.

D. Kwon, J. Kim, S. Park, S. H. Sung, Y. Sohn et al., New Block Cipher: ARIA. In: ICISC 2003, vol.2971, pp.432-445, 2004.

L. Li, K. Jia, X. Wang, and X. Dong, Meet-in-the-Middle Technique for Truncated Differential and Its Applications to CLEFIA and Camellia, Fast Software Encryption-FSE 2015, vol.9054, pp.48-70, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01256208

R. Li, B. Sun, P. Zhang, and C. Li, New Impossible Differential Cryptanalysis of ARIA. Cryptology ePrint Archive, 2008.

S. Li and C. Song, Improved Impossible Differential Cryptanalysis of ARIA, pp.129-132, 2008.

X. Li, C. Jin, and F. Fu, Improved Results of Impossible Differential Cryptanalysis on Reduced FOX, Comput. J, vol.59, issue.4, pp.541-548, 2016.

C. H. Lim, A Revised Version of Crypton-Crypton V1.0, FSE'99, vol.1636, pp.31-45, 1999.

Y. Liu, L. Li, D. Gu, X. Wang, Z. Liu et al., New Observations on Impossible Differential Cryptanalysis of Reduced-Round Camellia. In: FSE'12, vol.7549, pp.90-109, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00922229

Z. Liu, D. Gu, Y. Liu, J. Li, and W. Lei, Linear cryptanalysis of aria block cipher, Information and Communications Security, vol.7043, pp.242-254, 2011.

J. Lu, O. Dunkelman, N. Keller, and J. Kim, New Impossible Differential Attacks on AES. In: INDOCRYPT'08, vol.5365, pp.279-293, 2008.

H. Mala, , 2014.

H. Mala, M. Dakhilalian, V. Rijmen, and M. Modarres-hashemi, Improved Impossible Differential Cryptanalysis of 7-Round AES-128. In: INDOCRYPT'10, vol.6498, pp.282-291, 2010.

H. Mala, M. Shakiba, and M. Dakhilalian, New impossible differential attacks on reduced-round Crypton, vol.32, pp.222-227, 2010.

M. Minier and H. Gilbert, Stochastic Cryptanalysis of Crypton, FSE 2000, vol.1978, pp.121-133, 2001.

M. Marine, Improving impossible-differential attacks against Rijndael-160 and Rijndael-224. Designs, Codes and Cryptography, pp.1-13, 2016.

M. Shakiba, M. Dakhilalian, and H. Mala, On computational complexity of impossible differential cryptanalysis, Inf. Process. Lett, vol.114, issue.5, pp.252-255, 2014.

T. Shirai, K. Shibutani, T. Akishita, S. Moriai, and T. Iwata, The 128-Bit Blockcipher CLEFIA (Extended Abstract). In: Fast Software Encryption-FSE 2007, vol.4593, pp.181-195, 2007.

Y. Tsunoo, E. Tsujihara, M. Shigeri, T. Suzaki, and T. Kawabata, Cryptanalysis of CLEFIA using multiple impossible differentials, ISITA'08, pp.1-6, 2008.

W. Wu and L. Zhang, LBlock: A Lightweight Block Cipher, ACNS 2011, vol.6715, pp.327-344, 2011.

W. Wu, W. Zhang, and D. Feng, Impossible Differential Cryptanalysis of ReducedRound ARIA and Camellia, J. Comput. Sci. Technol, vol.22, issue.3, pp.449-456, 2007.

Q. Yang, L. Hu, S. Sun, and L. , Song: Related-key Impossible Differential Analysis of Full Khudra. IACR Cryptology ePrint Archive, vol.840, 2015.

W. Zhang, W. Wu, and D. Feng, New Results on Impossible Differential Cryptanalysis of Reduced AES. In: ICISC'07, vol.4817, pp.239-250, 2007.