M. Ahmed-abdelraheem, M. Ågren, P. Beelen, and G. Leander, On the Distribution of Linear Biases: Three Instructive Examples, Advances in Cryptology -CRYPTO 2012, pp.50-67, 2012.
DOI : 10.1007/978-3-642-32009-5_4

R. Martin, B. Albrecht, . Driessen, G. Elif-bilge-kavun, C. Leander et al., Block Ciphers -Focus on the Linear Layer (feat. PRIDE), Advances in Cryptology -CRYPTO 2014, pp.57-76, 2014.

S. L. Paulo, E. Barkan, and . Biham, Implementation of the SQUARE block cipher, How Many Ways Can You Write Rijndael ? In Advances in Cryptology -ASIACRYPT 2002, pp.160-175, 2002.

[. Blondeau, A. Bogdanov, and G. Leander, Bounds in Shallows and in Miseries, Advances in Cryptology -CRYPTO 2013, part I, pp.204-221, 2013.
DOI : 10.1007/978-3-642-40041-4_12

J. Borghoff, A. Canteaut, T. Güneysu, M. Elif-bilge-kavun, L. R. Knezevic et al., PRINCE -A Low-Latency Block Cipher for Pervasive Computing Applications -Extended Abstract, Advances in Cryptology - ASIACRYPT 2012BCL08] Lilya Budaghyan, Claude Carlet, and Gregor Leander. Two Classes of Quadratic APN Binomials Inequivalent to Power Functions. IEEE Transactions on Information Theory, pp.208-225, 2008.

S. Ball and J. D. Beule, On sets of vectors of a finite vector space in which every subset of basis size is a basis II. Designs, Codes and Cryptography, pp.5-14, 2012.

J. [. Browning, M. T. Dillon, A. J. Mcquistan, and . Wolfe, An APN permutation in dimension six, Finite Fields : Theory and Applications, pp.33-42, 2010.
DOI : 10.1090/conm/518/10194

[. Blondeau, B. Gérard, and J. Tillich, Accurate estimates of the data complexity and success probability for various cryptanalyses . Designs, Codes and Cryptography, pp.3-34, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00610101

J. Bierbrauer, M. M. Gohar, and . Kyureghyan, Crooked binomials. Designs , Codes and Cryptography, pp.269-301, 2008.

A. Bogdanov, L. R. Knudsen, G. Leander, C. Paar, A. Poschmann et al., PRESENT: An Ultra-Lightweight Block Cipher, Cryptographic Hardware and Embedded Systems -CHES 2007, pp.450-466, 2007.
DOI : 10.1007/978-3-540-74735-2_31

M. Brinkmann and G. Leander, On the classification of APN functions up to dimension five. Designs, Codes and Cryptography, pp.273-288, 2008.

C. Blondeau and K. Nyberg, New Links between Differential and Linear Cryptanalysis, Advances in Cryptology -EUROCRYPT 2013, pp.388-404, 2013.
DOI : 10.1007/978-3-642-38348-9_24

E. Biham and A. Shamir, Differential Cryptanalysis of DES-like Cryptosystems, Advances in Cryptology -CRYPTO'90, pp.2-21, 1990.

E. Biham and A. Shamir, Differential cryptanalysis of DES-like cryptosystems, Journal of Cryptology, pp.3-72, 1991.

C. Carlet, Boolean Functions for Cryptography and Error Correcting Codes, chapter 8 of Boolean Models and Methods in Mathematics, Encyclopedia of Mathematics and its Applications, pp.257-397, 2010.

A. Canteaut and P. Charpin, Decomposing bent functions, IEEE Transactions on Information Theory, vol.49, issue.8, pp.2004-2023, 2003.
DOI : 10.1109/TIT.2003.814476

P. Charpin, Théorie Algébrique des codes-correcteurs d'erreurs, 1998

S. Chun and . Kim, Differential and linear cryptanalysis for 2-round SPNs, Information Processing Letters, vol.87, issue.5, pp.277-282, 2003.
DOI : 10.1016/S0020-0190(03)00333-8

A. Canteaut and J. Roué, Extended differential properties of cryptographic functions, Topics in Finite Fields, pp.43-70, 2014.
DOI : 10.1090/conm/632/12618

URL : https://hal.archives-ouvertes.fr/hal-00859027

A. Canteaut and J. Roué, Differential Attacks Against SPN: A Thorough Analysis, C2SI 2015, pp.45-62, 2015.
DOI : 10.1007/978-3-319-18681-8_4

URL : https://hal.archives-ouvertes.fr/hal-01237293

A. Canteaut and J. Roué, On the Behaviors of Affine Equivalent Sboxes Regarding Differential and Linear Attacks, Advances in Cryptology -EUROCRYPT 2015, part I, pp.45-74, 2015.
DOI : 10.1007/978-3-662-46800-5_3

URL : https://hal.archives-ouvertes.fr/hal-01104051

[. Chabaud and S. Vaudenay, Links Between Differential and Linear Cryptoanalysis, Advances in Cryptology -EUROCRYPT '94, pp.356-365, 1994.

J. Daemen, Cipher and hash function design strategies based on linear and differential cryptanalysis, 1995.

[. Diffie and M. E. Hellman, New directions in cryptography, IEEE Transactions on Information Theory, vol.22, issue.6, pp.644-654, 1976.
DOI : 10.1109/TIT.1976.1055638

J. Daemen, L. R. Knudsen, and V. Rijmen, The block cipher Square, Fast Software Encryption -FSE'97, pp.149-165, 1997.
DOI : 10.1007/BFb0052343

J. Daemen, M. Lamberger, N. Pramstaller, V. Rijmen, and F. Vercauteren, Computational aspects of the expected differential probability of 4-round AES and AES-like ciphers, Computing, vol.1, issue.2, pp.85-104, 2009.
DOI : 10.1007/s00607-009-0034-y

J. Daemen and V. Rijmen, Rijndael/AES, AES Candidate Conference, pp.343-348, 2000.
DOI : 10.1007/0-387-23483-7_358

J. Daemen and V. Rijmen, The Wide Trail Design Strategy, IMA International Conference -Coding and Cryptography, pp.222-238, 2001.
DOI : 10.1007/3-540-45325-3_20

J. Daemen and V. Rijmen, The Design of Rijndael : AES -The Advanced Encryption Standard. Information Security and Cryptography, 2002.
DOI : 10.1007/978-3-662-04722-4

J. Daemen and V. Rijmen, Probability distributions of correlation and differentials in block ciphers, Journal of Mathematical Cryptology, vol.1, issue.3, 2005.
DOI : 10.1515/JMC.2007.011

J. Daemen and V. Rijmen, Understanding Two-Round Differentials in AES, Security and Cryptography for Networks -SCN 2006, pp.78-94, 2006.
DOI : 10.1007/11832072_6

J. Daemen and V. Rijmen, Plateau characteristics, IET Information Security, vol.1, issue.1, pp.11-17, 2007.
DOI : 10.1049/iet-ifs:20060099

J. Daemen and V. Rijmen, Probability distributions of correlation and differentials in block ciphers, Journal of Mathematical Cryptology, vol.1, issue.3, pp.221-242, 2007.
DOI : 10.1515/JMC.2007.011

J. Daemen and V. Rijmen, New criteria for linear maps in AES-like ciphers, Cryptography and Communications, vol.8, issue.1, pp.47-69, 2009.
DOI : 10.1007/s12095-008-0003-x

J. Daemen and V. Rijmen, Advanced Linear Cryptanalysis of Block and Stream Ciphers, chapter Correlation Analysis in GF (2 n ) Cryptology and information security, pp.115-131, 2011.

J. Guo, T. Peyrin, A. Poschmann, and M. Robshaw, The LED Block Cipher, Cryptographic Hardware and Embedded Systems - CHES 2011, pp.326-341, 2011.
DOI : 10.1007/978-3-642-23951-9_22

C. Harpes, Cryptanalysis of iterated block ciphers, Series in Information Processing. Hartung-Gorre Verlag, 1996.

C. Harpes, G. G. Kramer, and J. L. Massey, A Generalization of Linear Cryptanalysis and the Applicability of Matsui???s Piling-up Lemma, Advances in Cryptology -EUROCRYPT'95, pp.24-38, 1995.
DOI : 10.1007/3-540-49264-X_3

S. Hong, J. Lee, J. Lim, . Sung, I. Dong-hyeon-cheon et al., Provable Security against Differential and Linear Cryptanalysis for the SPN Structure In Fast Software Encryption -FSE, LNCS Elif Bilge Kavun, vol.14, pp.273-283, 1952.

L. Keliher and J. Sui, Exact maximum expected differential and linear probability for two-round Advanced Encryption Standard, IET Information Security, vol.1, issue.2, pp.53-57, 2007.
DOI : 10.1049/iet-ifs:20060161

M. M. Gohar and . Kyureghyan, Crooked maps in F 2 n . Finite Fields and Their Applications, pp.713-726, 2007.

C. Hoon, L. , and T. Korkishko, mCrypton -A Lightweight Block Cipher for Security of Low-Cost RFID Tags and Sensors, Information Security Applications -WISA 2005, pp.243-258, 2006.

X. Lai, J. L. Massey, and S. Murphy, Markov Ciphers and Differential Cryptanalysis, Advances in Cryptology -EUROCRYPT'91, pp.17-38, 1991.
DOI : 10.1007/3-540-46416-6_2

R. Lidl and H. Niederreiter, Finite Fields, 1983.
DOI : 10.1017/CBO9780511525926

M. Matsui, Linear Cryptanalysis Method for DES Cipher, Advances in Cryptology -EUROCRYPT'93, pp.386-397
DOI : 10.1007/3-540-48285-7_33

M. Matsui, The First Experimental Cryptanalysis of the Data Encryption Standard, Advances in Cryptology -CRYPTO'94, pp.1-11, 1995.
DOI : 10.1007/3-540-48658-5_1

R. J. Mceliece, Finite Fields for Computer Scientists and Engineers, 1987.
DOI : 10.1007/978-1-4613-1983-2

F. J. , M. , N. J. , and A. Sloane, The Theory of Error-Correcting Codes, 1977.

A. Menezes, P. C. Van-oorshot, and S. A. Vanstone, Handbook of applied cryptography, 1997.
DOI : 10.1201/9781439821916

N. Mouha, Q. Wang, D. Gu, and B. Preneel, Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming, Information Security and Cryptology -Inscrypt 2011, pp.57-76, 2012.
DOI : 10.1007/978-3-642-34704-7_5

[. Nyberg and L. R. Knudsen, Provable Security Against Differential Cryptanalysis, Advances in Cryptology -CRYPTO'92, pp.566-574, 1993.
DOI : 10.1007/3-540-48071-4_41

K. Nyberg, Differentially uniform mappings for cryptography, Advances in Cryptology -EUROCRYPT '93, pp.53-64, 1994.
DOI : 10.1007/3-540-48285-7_6

[. Nyberg, Linear approximation of block ciphers, Advances in Cryptology -EUROCRYPT'94, pp.439-444
DOI : 10.1007/BFb0053460

[. Park, S. H. Sung, S. Lee, and J. Lim, Improving the Upper Bound on the Maximum Differential and the Maximum Linear Hull Probability for SPN Structures and AES, Fast Software Encryption -FSE 2003, pp.247-260, 2003.
DOI : 10.1007/978-3-540-39887-5_19

J. Vincent-rijmen, B. Daemen, and . Preneel, Antoon Bosselaers, and Erik De Win. The Cipher SHARK, Fast Software Encryption -FSE'96, pp.99-111, 1996.

O. S. Rothaus, On ???bent??? functions, Journal of Combinatorial Theory, Series A, vol.20, issue.3, pp.300-305, 1976.
DOI : 10.1016/0097-3165(76)90024-8

B. Segre, Curve razionali normali ek-archi negli spazi finiti, Annali di Matematica Pura ed Applicata, Series 4, vol.7, issue.8, pp.357-379, 1955.
DOI : 10.1007/BF02410779

C. E. Shannon, Communication Theory of Secrecy Systems*, Bell System Technical Journal, vol.28, issue.4, pp.656-715, 1949.
DOI : 10.1002/j.1538-7305.1949.tb00928.x

C. Richard and . Singleton, Maximum Distance q-nary codes, IEEE Transactions on Information Theory, vol.10, pp.116-118, 1964.

A. Tardy-corfdir and H. Gilbert, A Known Plaintext Attack of FEAL-4 and FEAL-6, Advances in Cryptology -CRYPTO'91, pp.172-182, 1991.
DOI : 10.1007/3-540-46766-1_12

[. Zheng and X. Zhang, Plateaued Functions, Information and Communication Security -ICICS'99, pp.224-300, 1999.
DOI : 10.1007/978-3-540-47942-0_24