M. A. Abdelraheem, M. Ågren, P. Beelen, and G. Leander, On the Distribution of Linear Biases: Three Instructive Examples, Advances in Cryptology -CRYPTO 2012. CRYPTO 2012, vol.7417, pp.50-67, 2012.

K. Åhlander and H. Munthe-kaas, Applications of the Generalized Fourier Transform on Numerical Linear Algebra, Bit Numerical Mathematics, vol.45, pp.819-850, 2005.

T. Ashur and V. Rijmen, On Linear Hulls and Trails, Progress in Cryptology -INDOCRYPT 2016. INDOCRYPT 2016, vol.10095, pp.269-286, 2016.

S. Banik, S. K. Pandey, T. Peyrin, Y. Sasaki, S. M. Sim et al., GIFT: A Small Present -Towards Reaching the Limit of Lightweight Encryption, Cryptographic Hardware and Embedded Systems -CHES 2017. CHES 2017, vol.10529, pp.321-345, 2017.

A. Biryukov, C. De-cannière, and M. Quisquater, On Multiple Linear Approximations, Advances in Cryptology -CRYPTO 2004. CRYPTO, vol.3152, pp.1-22, 2004.

C. Blondeau and K. Nyberg, Joint Data and Key Distribution of the Linear Cryptanalysis Test Statistic and its Impact to Data Complexity Estimates of Multiple/Multidimensional Linear and Truncated Differential Attacks, IACR Cryptology ePrint Archive 2015, 935. International Association for Cryptologic Research, 2015.

C. Blondeau and K. Nyberg, Improved Parameter Estimates for Correlation and Capacity Deviates in Linear Cryptanalysis, IACR Transactions on Symmetric Cryptology, vol.2016, pp.162-191, 2017.

A. Bogdanov, L. R. Knudsen, G. Leander, C. Paar, A. Poschmann et al., PRESENT: An Ultra-Lightweight Block Cipher, Cryptographic Hardware and Embedded Systems -CHES 2007. CHES, vol.4727, pp.450-466, 2007.

A. Bogdanov and M. Wang, Zero Correlation Linear Cryptanalysis with Reduced Data Complexity, Fast Software Encryption. FSE 2012, vol.7549, pp.29-48, 2012.

A. Bogdanov, H. Geng, M. Wang, L. Wen, and B. Collard, Zero-Correlation Linear Cryptanalysis with FFT and Improved Attacks on ISO Standards Camellia and CLEFIA, Selected Areas in Cryptography -SAC 2013. SAC 2013, vol.8282, pp.306-323, 2014.

A. Bogdanov, E. Tischhauser, and P. Vejre, Multivariate Profiling of Hulls for Linear Cryptanalysis, IACR Transactions on Symmetric Cryptology, issue.1, pp.101-125, 2018.

C. Carlet, Vectorial Boolean Functions for Cryptography, Boolean Models and Methods in Mathematics, Computer Science, and Engineering (Encyclopedia of Mathematics and its Applications), pp.398-470, 2010.
URL : https://hal.archives-ouvertes.fr/hal-02060699

J. Y. Cho, Linear Cryptanalysis of Reduced-Round PRESENT, Topics in Cryptology -CT-RSA 2010. CT-RSA 2010, vol.5985, pp.302-317, 2010.

J. W. Cooley and J. W. Tukey, An Algorithm for the Machine Calculation of, Complex Fourier Series. In: Mathematics of Computation, vol.19, pp.297-301, 1965.

P. Chose, A. Joux, and M. Mitton, Fast Correlation Attacks: An Algorithmic Point of View, Advances in Cryptology -EUROCRYPT 2002, vol.2332, pp.209-221, 2002.

B. Collard, F. X. Standaert, and J. J. Quisquater, Improving the Time Complexity of Matsui's Linear Cryptanalysis, Information Security and Cryptology -ICISC 2007. ICISC, vol.4817, pp.77-88, 2007.

B. Collard and F. X. Standaert, A Statistical Saturation Attack against the Block Cipher PRESENT, Topics in Cryptology -CT-RSA 2009, vol.5473, pp.195-210, 2009.

J. Daemen and V. Rijmen, The Design of Rijndael, 2002.

J. Daemen and V. Rijmen, Probability distributions of correlation and differentials in block ciphers, Journal of Mathematical Cryptology, vol.1, pp.221-242, 2007.

N. Datta, A. Ghoshal, D. Mukhopadhyay, S. Patranabis, S. Picek et al., , 2019.

M. Hermelin, J. Y. Cho, and K. Nyberg, Multidimensional Linear Cryptanalysis of Reduced Round Serpent, Information Security and Privacy. ACISP, vol.5107, pp.203-215, 2008.

M. Hermelin, J. Y. Cho, and K. Nyberg, Multidimensional Extension of Matsui's Algorithm 2, Fast Software Encryption. FSE, vol.5665, pp.209-227, 2009.

M. Hermelin, J. Y. Cho, and K. Nyberg, Multidimensional Linear Cryptanalysis, Journal of Cryptology, vol.32, pp.1-34, 2019.

Z. Hu and H. Wan, A novel generic Fast Fourier Transform pruning technique and complexity analysis, IEEE Transactions on Signal Processing, vol.53, issue.1, pp.274-282, 2004.

D. Jankovic, R. S. Stankovic, and R. Drechsler, Decision Diagram Method for Calculation of Pruned Walsh Transform, IEEE Transactions on Computers, vol.50, issue.2, pp.147-157, 2001.

B. S. Kaliski and M. J. Robshaw, Linear Cryptanalysis Using Multiple Approximations, Advances in Cryptology -CRYPTO 1994. CRYPTO, vol.839, pp.26-39, 1994.

M. Kaplan, G. Laurent, A. Leverrier, and M. Naya-plasencia, Quantum differential and linear cryptanalysis, IACR Transactions on Symmetric Cryptology 2016 (1), pp.71-94, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01652807

M. Matsui and A. Yamagishi, A New Method for Known Plaintext Attack of FEAL Cipher, Advances in Cryptology -EUROCRYPT 1992. EUROCRYPT 1992, vol.658, pp.81-91, 1993.

M. Matsui, Linear Cryptanalysis Method for DES Cipher, Advances in Cryptology -EUROCRYPT 1993. EUROCRYPT 1993, vol.765, pp.386-397, 1994.

M. Matsui, The First Experimental Cryptanalysis of the Data Encryption Standard, Advances in Cryptology -CRYPTO 1994. CRYPTO, vol.839, pp.1-11, 1994.

M. Matsui, On Correlation between the Order of S-boxes and the Strength of DES, Advances in Cryptology -EUROCRYPT 1994. EUROCRYPT, vol.950, pp.366-375, 1994.

P. H. Nguyen, H. Wu, and H. Wang, Improving the Algorithm 2 in Multidimensional Linear Cryptanalysis, Information Security and Privacy. ACISP 2011, vol.6812, pp.61-74, 2011.

K. Nyberg, Linear Approximation of Block Ciphers, Advances in Cryptology -EUROCRYPT 1994. EUROCRYPT, vol.950, pp.439-444, 1994.

K. Nyberg, Statistical and Linear Independence of Binary Random Variables, IACR Cryptology ePrint Archive 2017, 432. International Association for Cryptologic Research, 2018.

J. Nakahara, P. Sepehrdad, B. Zhang, and M. Wang, Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT, Cryptology and Network Security. CANS 2009, vol.5888, pp.58-75, 2009.

K. Ohkuma, Weak Keys of Reduced-Round PRESENT for Linear Cryptanalysis, Selected Areas in Cryptography. SAC, vol.5867, pp.249-265, 2009.

G. Leander, On Linear Hulls, Statistical Saturation Attacks, PRESENT and a Cryptanalysis of PUFFIN, Advances in Cryptology -EUROCRYPT 2011. EUROCRYPT 2011, vol.6632, pp.303-322, 2011.

A. A. Selçuk, On Probability of Success in Linear and Differential Cryptanalysis, Journal of Cryptology, vol.21, pp.131-147, 2008.

L. Zheng and S. Zhang, FFT-based Multidimensional Linear Attack on PRESENT using the 2-bit-Fixed Characteristic, Security and Communication Networks, vol.8, pp.3535-3545, 2015.