F. Armknecht, G. Akkar, R. Bevan, P. Dischamp, and D. Moyart, Introducing a new variant of fast algebraic attacks and minimizing their successive data complexity, MycryptAC10] Martin Albrecht and Carlos Cid. Cold Boot Key Recovery using Polynomial System Solving with Noise 2nd International Conference on Symbolic Computation and Cryptography, 2010. [AF05] Gwénolé Ars and Jean-Charles Faugère. Algebraic Immunities of functions over finite fields, pp.16-32, 2000.
URL : https://hal.archives-ouvertes.fr/hal-01351381

T. K. Aoki, M. Ichikawa, M. Kanda, S. Matsui, J. Moriai et al., Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms Constructing Single-and Multi-Output Boolean Functions with Maximal Immunity, Proceedings of ICALP 2006, pp.180-191, 2000.

E. Brier, C. Clavier, and F. Olivier, Applications aux codes correcteurs et` et` a la cryptographie Correlation Power Analysis with a Leakage Model The MAGMA algebra system: the user language, Gwénolé Ars. Applications des bases de Gröbner en cryptographie Etude des systèmes algébriques surdéterminés CHES'04BCP97] Wieb Bosma, pp.16-29235, 1997.

M. Bardet, J. Faugère, B. Salvy, [. Bardet, J. Faugère et al., On the Complexity of Gröbner Basis Computation of Semi-Regular Overdetermined Algebraic Equations Asymptotic Behaviour of the Degree of Regularity of Semi-Regular Polynomial Systems, Proc. of International Conference on Polynomial System Solving (ICPSS) Proc. of MEGA 2005, Eighth Inter. Symposium on Effective Methods in Algebraic Geometry, pp.71-75, 2004.

A. Bogdanov, L. R. Knudsen, G. Le, C. Paar, A. Poschmann et al., PRESENT: An Ultra-Lightweight Block Cipher Algebraic Methods in Side-Channel Collision Attacks and Practical Collision Detection, CHES'07 INDOCRYPT, pp.251-265, 2007.

A. Bogdanov, Improved Side-Channel Collision Attacks on AES, Selected Areas in Cryptography, pp.84-95, 2007.
DOI : 10.1007/978-3-540-77360-3_6

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.137.1652

A. Bogdanov, Multiple-Differential Side- Channel Collision Attacks on AES, Cryptographic Hardware and Embedded Systems -CHES 2008 Proceedings, pp.30-44, 2008.

C. Carlet, On the algebraic immunities and higher order nonlinearities of vectorial Boolean functions, volume 13 of NATO Science for Peace and Security Series, D: Information and Communication Security, pp.104-116, 2009.

C. Carlet, [. Chari, C. S. Jutla, J. R. Rao, P. Rohatgi et al., Towards Sound Approaches to Counteract Power-Analysis Attacks, Vectorial Boolean Functions for Cryptography Advances in Cryptology -CRYPTO '99, 19th Annual International Cryptology Conference ProceedingsCL05] Carlos Cid and Gaëtan Leurent. An Analysis of the XSL Algorithm. In ASIACRYPT, pp.398-469, 1999.

N. Courtois and W. Faugère, Algebraic Attacks on Stream Ciphers with Linear Feedback [CP02] Nicolas Courtois and Josef Pieprzyk Cryptanalysis of Block Ciphers with Overdefined Systems of Equations A New Efficient Algorithm for Computing Gröbner bases without reduction to zero (F5), Ideals, Varieties, and Algorithms: An Introduction to Computational Algebraic Geometry and Commutative Algebra EUROCRYPT ASIACRYPTFau99] Jean-Charles Faugère. A New Efficient Algorithm for Computing Gröbner bases Journal of Pure and Applied Algebra Proceedings of the 2002 International Symposium on Symbolic and Algebraic Computation , ISSAC '02, pp.345-359, 1999.

[. Faugère, F. Levy, L. Vehel, W. Fischer, and . Meier, Cryptanalysis of MinRank Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems Using Gröbner Bases Algebraic Immunity of S-Boxes and Augmented Functions [FP06a] Jean-Charles Faugère and Ludovic Perret. Cryptanalysis of 2R -Schemes, CRYPTO FSE CRYPTOFP06b] Jean-Charles Faugère and Ludovic Perret. Polynomial Equivalence Problems: Algorithmic and Theoretical Aspects EUROCRYPT Selected Areas in Cryptography, pp.280-296, 2003.

[. Moradi, O. Mischke, and T. Eisenbarth, Correlation-Enhanced Power Analysis Collision Attack, CHES'10, 2010.
DOI : 10.1007/978-3-642-15031-9_9

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.187.6607

[. Mangard, E. Oswald, and T. Popp, Power Analysis Attacks : Revealing the Secrets of Smart Cards [Off06] Office of State Commercial Cryptography Administration . The SMS4 block cipher, 2006.

[. Oren, M. Kirschbaum, T. Popp, A. Renauld, and F. Standaert, Algebraic Side-Channel Analysis in the Presence of Errors DPA Attacks and S-Boxes Algebraic Side-Channel Attacks Representation-, leakage-and cipher-dependencies in algebraic side-channel attacks, CHES'10, 2010. [Pro05] Emmanuel Prouff FSE Inscrypt 2009 ACNS 2010 Industrial Track, pp.424-441, 2005.

[. Renauld, F. Standaert, and N. Veyrat-charvillon, Algebraic Side- Channel Attacks on the AES: Why Time also Matters in DPA, CHES'09, pp.97-111, 2009.

[. Schramm, G. Leander, P. Felke, and C. Paar, A Collision-Attack on AES Combining Side Channel and Differential Attack A new class of collision attacks and its application to DES, CHES'04SNC09] Mate Soos, Karsten Nohl, and Claude Castelluccia . Extending SAT Solvers to Cryptographic Problems. In SAT Fast Software Encryption FSE 03, volume LNCS 2887 of LNCS, pp.163-175, 2003.