S. Banik, A. Bogdanov, T. Isobe, K. Shibutani, H. Hiwatari et al., Midori: A block cipher for low energy, ASIACRYPT 2015, Part II, vol.9453, pp.411-436, 2015.

E. Biham and A. Shamir, Differential cryptanalysis of DES-like cryptosystems, Journal of Cryptology, vol.4, issue.1, pp.3-72, 1991.

A. Biryukov, G. Leurent, and L. Perrin, Cryptanalysis of Feistel networks with secret round functions, vol.8, pp.102-121
URL : https://hal.archives-ouvertes.fr/hal-01243130

A. Biryukov and L. Perrin, On reverse-engineering S-boxes with hidden design criteria or structure, CRYPTO 2015, Part I, vol.9215, pp.116-140, 2015.

C. Boura and A. Canteaut, On the boomerang uniformity of cryptographic sboxes, IACR Trans. Symm. Cryptol, vol.2018, issue.3, pp.290-310, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01944598

A. Canteaut, S. Duval, and G. Leurent, Construction of lightweight S-boxes using Feistel and MISTY structures, Dunkelman and Keliher, pp.373-393
URL : https://hal.archives-ouvertes.fr/hal-01205187

C. Cid, T. Huang, T. Peyrin, Y. Sasaki, and L. Song, Boomerang connectivity table: A new cryptanalysis tool, Part, vol.II, pp.683-714, 2018.

O. Dunkelman and L. Keliher, LNCS. Springer, vol.9566, 2015.

. Etsi/sage, Specification of the 3GPP Confidentiality and Integrity Algorithms 128-EEA3 & 128-EIA3, 2011.

V. Grosso, G. Leurent, F. Standaert, and K. Varici, LS-designs: Bitslice encryption for efficient masked software implementations, LNCS, vol.8540, pp.18-37, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01093491

V. Grosso, G. Leurent, F. Standaert, K. Varici, F. D. Anthony-journault et al., SCREAM & iSCREAM Side-Channel Resistant Authenticated Encryption with Masking. Candidate for the CAESAR Competition, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01093512

P. Karpman and B. Grégoire, The LITTLUN S-box and the FLY block cipher, Lightweight Cryptography Workshop, 2016.

M. Matsui, New block encryption algorithm MISTY, LNCS, vol.1267, pp.54-68, 1997.

S. Vaudenay and P. Junod, United States Patent (20040247117), see also "Fox, a New Family of Block Ciphers, 2004.

D. Wagner, The boomerang attack, LNCS, vol.1636, pp.156-170, 1999.