I. Baran, E. D. Demaine, and M. P?tra?cu, Subquadratic algorithms for 3sum, Algorithmica, vol.50, issue.4, pp.584-596, 2008.

D. J. Bernstein, Better price-performance ratios for generalized birthday attacks, Workshop Record of SHARCS, vol.7, p.160, 2007.

A. Bogdanov, L. R. Knudsen, G. Leander, F. X. Standaert, J. P. Steinberger et al., Key-alternating ciphers in a provable setting: Encryption using a small number of public permutations -(extended abstract), EUROCRYPT 2012, vol.7237, pp.45-62, 2012.

C. Bouillaguet, C. Delaplace, and P. A. Fouque, Revisiting and improving algorithms for the 3xor problem, IACR Trans. Symm. Cryptol, vol.2018, issue.1, pp.254-276, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01655907

S. Chen, R. Lampe, J. Lee, Y. Seurin, and J. P. Steinberger, Minimizing the tworound Even-Mansour cipher, CRYPTO 2014, Part I. LNCS, vol.8616, pp.39-56, 2014.
URL : https://hal.archives-ouvertes.fr/hal-02176881

S. Chen and J. P. Steinberger, Tight security bounds for key-alternating ciphers, EUROCRYPT 2014, vol.8441, pp.327-350, 2014.

J. Daemen, Limitations of the Even-Mansour construction (rump session), ASIACRYPT'91, vol.739, pp.495-498, 1993.

I. Dinur, O. Dunkelman, N. Keller, and A. Shamir, Key recovery attacks on 3-round Even-Mansour, 8-step LED-128, and full AES2, ASIACRYPT 2013, Part I. LNCS, vol.8269, pp.337-356, 2013.

I. Dinur, O. Dunkelman, N. Keller, and A. Shamir, Key recovery attacks on iterated Even-Mansour encryption schemes, Journal of Cryptology, vol.29, issue.4, pp.697-728, 2016.

O. Dunkelman, N. Keller, and A. Shamir, Minimalism in cryptography: The Even-Mansour scheme revisited, EURO-CRYPT 2012, vol.7237, pp.336-354, 2012.

O. Dunkelman, N. Keller, and A. Shamir, Slidex attacks on the Even-Mansour encryption scheme, Journal of Cryptology, vol.28, issue.1, pp.1-28, 2015.

S. Even and Y. Mansour, A construction of a cipher from a single pseudorandom permutation, ASIACRYPT'91, vol.739, pp.210-224, 1993.

P. Ga?i, Plain versus randomized cascading-based key-length extension for block ciphers, CRYPTO 2013, Part I. LNCS, vol.8042, pp.551-570, 2013.

T. Isobe and K. Shibutani, New key recovery attacks on minimal two-round Even-Mansour ciphers, Part I. LNCS, vol.10624, pp.244-263, 2017.

A. Joux, Algorithmic Cryptanalysis. Chapman & Hall/CRC, 1st edn, 2009.

A. Joux and S. Lucks, Improved generic algorithms for 3-collisions, ASIACRYPT 2009, vol.5912, pp.347-363, 2009.

R. Lampe, J. Patarin, and Y. Seurin, An asymptotically tight security analysis of the iterated Even-Mansour cipher, ASIACRYPT 2012, vol.7658, pp.278-295, 2012.

I. Nikolic and Y. Sasaki, Refinements of the k-tree algorithm for the generalized birthday problem, ASIACRYPT 2015, Part II, vol.9453, pp.683-703, 2015.

I. Nikolic, L. Wang, and S. Wu, Cryptanalysis of round-reduced LED, FSE 2013, vol.8424, pp.112-129, 2014.

D. Wagner, A generalized birthday problem, CRYPTO 2002, vol.2442, pp.288-303, 2002.