K. Aoki, T. Ichikawa, M. Kanda, M. Matsui, S. Moriai et al., Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms ??? Design andAnalysis, Proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography, SAC '00, pp.39-56, 2001.
DOI : 10.1007/3-540-44983-3_4

E. Biham, O. Dunkelman, and N. Keller, Enhancing Differential-Linear Cryptanalysis, Advances in Cryptology -ASIACRYPT 2002, pp.254-266, 2002.
DOI : 10.1007/3-540-36178-2_16

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.13.4740

E. Biham and A. Shamir, Differential cryptanalysis of the data encryption standard, 1993.
DOI : 10.1007/978-1-4613-9314-6

A. Biryukov, The Boomerang Attack on 5 and 6-Round Reduced AES, AES Conference, pp.11-15, 2004.
DOI : 10.1007/11506447_2

J. Daemen and V. Rijmen, The Design of Rijndael: AES -The Advanced Encryption Standard, 2002.
DOI : 10.1007/978-3-662-04722-4

J. Daemen, L. R. Knudsen, and V. Rijmen, The block cipher Square, Fast Software Encryption (FSE'97, pp.149-165, 1997.
DOI : 10.1007/BFb0052343

H. Demirci and A. A. Selçuk, A Meet-in-the-Middle Attack on 8-Round AES, Fast Software Encryption, pp.116-126, 2008.
DOI : 10.1007/978-3-540-71039-4_7

N. Ferguson, J. Kelsey, S. Lucks, B. Schneier, M. Stay et al., Improved Cryptanalysis of Rijndael, Fast Software Encryption, pp.213-230, 1978.
DOI : 10.1007/3-540-44706-7_15

Y. Hatano, H. Sekine, and T. Kaneko, Higher Order Differential Attack of Camellia(II)
DOI : 10.1007/3-540-36492-7_10

Y. He and S. Qing, Square Attack on Reduced Camellia Cipher, Proceedings of the Third International Conference on Information and Communications Security, pp.238-245, 2001.
DOI : 10.1007/3-540-45600-7_27

G. Henri and M. Minier, A Collision Attack on 7 Rounds of Rijndael, AES Candidate Conference, pp.230-241, 2000.

L. R. Knudsen, Truncated and higher order differentials, Fast Software Encryption (FSE'94), pp.196-211, 1995.
DOI : 10.1007/3-540-60590-8_16

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.34.4730

S. K. Langford and M. E. Hellman, Differential-Linear Cryptanalysis, Advances in Cryptology -CRYPTO '94, pp.17-25, 1994.
DOI : 10.1007/3-540-48658-5_3

M. Matsui, Linear Cryptanalysis Method for DES Cipher, Workshop on the theory and application of cryptographic techniques on Advances in cryptology, EUROCRYPT '93, pp.386-397, 1994.
DOI : 10.1007/3-540-48285-7_33

A. Aydin and S. , On Probability of Success in Linear and Differential Cryptanalysis, J. Cryptology, vol.21, issue.1, pp.131-147, 2008.

D. Wagner, The Boomerang Attack, Fast Software Encryption (FSE'99), volume 1636 of LNCS, pp.156-170, 1999.
DOI : 10.1007/3-540-48519-8_12

Y. Yeom, Integral Cryptanalysis and Higher Order Differential Attack, Trends in Mathematics (ICMS), vol.8, issue.1, pp.101-118, 2005.

W. Zhang, W. Wu, and D. Feng, New Results on Impossible Differential Cryptanalysis of Reduced AES, Information Security and Cryptology (ICISC) 2007, pp.239-250, 2007.
DOI : 10.1007/978-3-540-76788-6_19