On the Distribution of Linear Biases: Three Instructive Examples, Advances in Cryptology -CRYPTO 2012, pp.50-67, 2012. ,
DOI : 10.1007/978-3-642-32009-5_4
Block Ciphers -Focus on the Linear Layer (feat. PRIDE), Advances in Cryptology -CRYPTO 2014, pp.57-76, 2014. ,
Implementation of the SQUARE block cipher, How Many Ways Can You Write Rijndael ? In Advances in Cryptology -ASIACRYPT 2002, pp.160-175, 2002. ,
Bounds in Shallows and in Miseries, Advances in Cryptology -CRYPTO 2013, part I, pp.204-221, 2013. ,
DOI : 10.1007/978-3-642-40041-4_12
PRINCE -A Low-Latency Block Cipher for Pervasive Computing Applications -Extended Abstract, Advances in Cryptology - ASIACRYPT 2012BCL08] Lilya Budaghyan, Claude Carlet, and Gregor Leander. Two Classes of Quadratic APN Binomials Inequivalent to Power Functions. IEEE Transactions on Information Theory, pp.208-225, 2008. ,
On sets of vectors of a finite vector space in which every subset of basis size is a basis II. Designs, Codes and Cryptography, pp.5-14, 2012. ,
An APN permutation in dimension six, Finite Fields : Theory and Applications, pp.33-42, 2010. ,
DOI : 10.1090/conm/518/10194
Accurate estimates of the data complexity and success probability for various cryptanalyses . Designs, Codes and Cryptography, pp.3-34, 2011. ,
URL : https://hal.archives-ouvertes.fr/hal-00610101
Crooked binomials. Designs , Codes and Cryptography, pp.269-301, 2008. ,
PRESENT: An Ultra-Lightweight Block Cipher, Cryptographic Hardware and Embedded Systems -CHES 2007, pp.450-466, 2007. ,
DOI : 10.1007/978-3-540-74735-2_31
On the classification of APN functions up to dimension five. Designs, Codes and Cryptography, pp.273-288, 2008. ,
New Links between Differential and Linear Cryptanalysis, Advances in Cryptology -EUROCRYPT 2013, pp.388-404, 2013. ,
DOI : 10.1007/978-3-642-38348-9_24
Differential Cryptanalysis of DES-like Cryptosystems, Advances in Cryptology -CRYPTO'90, pp.2-21, 1990. ,
Differential cryptanalysis of DES-like cryptosystems, Journal of Cryptology, pp.3-72, 1991. ,
Boolean Functions for Cryptography and Error Correcting Codes, chapter 8 of Boolean Models and Methods in Mathematics, Encyclopedia of Mathematics and its Applications, pp.257-397, 2010. ,
Decomposing bent functions, IEEE Transactions on Information Theory, vol.49, issue.8, pp.2004-2023, 2003. ,
DOI : 10.1109/TIT.2003.814476
Théorie Algébrique des codes-correcteurs d'erreurs, 1998 ,
Differential and linear cryptanalysis for 2-round SPNs, Information Processing Letters, vol.87, issue.5, pp.277-282, 2003. ,
DOI : 10.1016/S0020-0190(03)00333-8
Extended differential properties of cryptographic functions, Topics in Finite Fields, pp.43-70, 2014. ,
DOI : 10.1090/conm/632/12618
URL : https://hal.archives-ouvertes.fr/hal-00859027
Differential Attacks Against SPN: A Thorough Analysis, C2SI 2015, pp.45-62, 2015. ,
DOI : 10.1007/978-3-319-18681-8_4
URL : https://hal.archives-ouvertes.fr/hal-01237293
On the Behaviors of Affine Equivalent Sboxes Regarding Differential and Linear Attacks, Advances in Cryptology -EUROCRYPT 2015, part I, pp.45-74, 2015. ,
DOI : 10.1007/978-3-662-46800-5_3
URL : https://hal.archives-ouvertes.fr/hal-01104051
Links Between Differential and Linear Cryptoanalysis, Advances in Cryptology -EUROCRYPT '94, pp.356-365, 1994. ,
Cipher and hash function design strategies based on linear and differential cryptanalysis, 1995. ,
New directions in cryptography, IEEE Transactions on Information Theory, vol.22, issue.6, pp.644-654, 1976. ,
DOI : 10.1109/TIT.1976.1055638
The block cipher Square, Fast Software Encryption -FSE'97, pp.149-165, 1997. ,
DOI : 10.1007/BFb0052343
Computational aspects of the expected differential probability of 4-round AES and AES-like ciphers, Computing, vol.1, issue.2, pp.85-104, 2009. ,
DOI : 10.1007/s00607-009-0034-y
Rijndael/AES, AES Candidate Conference, pp.343-348, 2000. ,
DOI : 10.1007/0-387-23483-7_358
The Wide Trail Design Strategy, IMA International Conference -Coding and Cryptography, pp.222-238, 2001. ,
DOI : 10.1007/3-540-45325-3_20
The Design of Rijndael : AES -The Advanced Encryption Standard. Information Security and Cryptography, 2002. ,
DOI : 10.1007/978-3-662-04722-4
Probability distributions of correlation and differentials in block ciphers, Journal of Mathematical Cryptology, vol.1, issue.3, 2005. ,
DOI : 10.1515/JMC.2007.011
Understanding Two-Round Differentials in AES, Security and Cryptography for Networks -SCN 2006, pp.78-94, 2006. ,
DOI : 10.1007/11832072_6
Plateau characteristics, IET Information Security, vol.1, issue.1, pp.11-17, 2007. ,
DOI : 10.1049/iet-ifs:20060099
Probability distributions of correlation and differentials in block ciphers, Journal of Mathematical Cryptology, vol.1, issue.3, pp.221-242, 2007. ,
DOI : 10.1515/JMC.2007.011
New criteria for linear maps in AES-like ciphers, Cryptography and Communications, vol.8, issue.1, pp.47-69, 2009. ,
DOI : 10.1007/s12095-008-0003-x
Advanced Linear Cryptanalysis of Block and Stream Ciphers, chapter Correlation Analysis in GF (2 n ) Cryptology and information security, pp.115-131, 2011. ,
The LED Block Cipher, Cryptographic Hardware and Embedded Systems - CHES 2011, pp.326-341, 2011. ,
DOI : 10.1007/978-3-642-23951-9_22
Cryptanalysis of iterated block ciphers, Series in Information Processing. Hartung-Gorre Verlag, 1996. ,
A Generalization of Linear Cryptanalysis and the Applicability of Matsui???s Piling-up Lemma, Advances in Cryptology -EUROCRYPT'95, pp.24-38, 1995. ,
DOI : 10.1007/3-540-49264-X_3
Provable Security against Differential and Linear Cryptanalysis for the SPN Structure In Fast Software Encryption -FSE, LNCS Elif Bilge Kavun, vol.14, pp.273-283, 1952. ,
Exact maximum expected differential and linear probability for two-round Advanced Encryption Standard, IET Information Security, vol.1, issue.2, pp.53-57, 2007. ,
DOI : 10.1049/iet-ifs:20060161
Crooked maps in F 2 n . Finite Fields and Their Applications, pp.713-726, 2007. ,
mCrypton -A Lightweight Block Cipher for Security of Low-Cost RFID Tags and Sensors, Information Security Applications -WISA 2005, pp.243-258, 2006. ,
Markov Ciphers and Differential Cryptanalysis, Advances in Cryptology -EUROCRYPT'91, pp.17-38, 1991. ,
DOI : 10.1007/3-540-46416-6_2
Finite Fields, 1983. ,
DOI : 10.1017/CBO9780511525926
Linear Cryptanalysis Method for DES Cipher, Advances in Cryptology -EUROCRYPT'93, pp.386-397 ,
DOI : 10.1007/3-540-48285-7_33
The First Experimental Cryptanalysis of the Data Encryption Standard, Advances in Cryptology -CRYPTO'94, pp.1-11, 1995. ,
DOI : 10.1007/3-540-48658-5_1
Finite Fields for Computer Scientists and Engineers, 1987. ,
DOI : 10.1007/978-1-4613-1983-2
The Theory of Error-Correcting Codes, 1977. ,
Handbook of applied cryptography, 1997. ,
DOI : 10.1201/9781439821916
Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming, Information Security and Cryptology -Inscrypt 2011, pp.57-76, 2012. ,
DOI : 10.1007/978-3-642-34704-7_5
Provable Security Against Differential Cryptanalysis, Advances in Cryptology -CRYPTO'92, pp.566-574, 1993. ,
DOI : 10.1007/3-540-48071-4_41
Differentially uniform mappings for cryptography, Advances in Cryptology -EUROCRYPT '93, pp.53-64, 1994. ,
DOI : 10.1007/3-540-48285-7_6
Linear approximation of block ciphers, Advances in Cryptology -EUROCRYPT'94, pp.439-444 ,
DOI : 10.1007/BFb0053460
Improving the Upper Bound on the Maximum Differential and the Maximum Linear Hull Probability for SPN Structures and AES, Fast Software Encryption -FSE 2003, pp.247-260, 2003. ,
DOI : 10.1007/978-3-540-39887-5_19
Antoon Bosselaers, and Erik De Win. The Cipher SHARK, Fast Software Encryption -FSE'96, pp.99-111, 1996. ,
On ???bent??? functions, Journal of Combinatorial Theory, Series A, vol.20, issue.3, pp.300-305, 1976. ,
DOI : 10.1016/0097-3165(76)90024-8
Curve razionali normali ek-archi negli spazi finiti, Annali di Matematica Pura ed Applicata, Series 4, vol.7, issue.8, pp.357-379, 1955. ,
DOI : 10.1007/BF02410779
Communication Theory of Secrecy Systems*, Bell System Technical Journal, vol.28, issue.4, pp.656-715, 1949. ,
DOI : 10.1002/j.1538-7305.1949.tb00928.x
Maximum Distance q-nary codes, IEEE Transactions on Information Theory, vol.10, pp.116-118, 1964. ,
A Known Plaintext Attack of FEAL-4 and FEAL-6, Advances in Cryptology -CRYPTO'91, pp.172-182, 1991. ,
DOI : 10.1007/3-540-46766-1_12
Plateaued Functions, Information and Communication Security -ICICS'99, pp.224-300, 1999. ,
DOI : 10.1007/978-3-540-47942-0_24