D. Augot and M. Finiasz, Direct Construction of Recursive MDS Diffusion Layers Using Shortened BCH Codes, Fast Software Encryption -FSE 2014, 2014.
DOI : 10.1007/978-3-662-46706-0_1

URL : https://hal.archives-ouvertes.fr/hal-01044597

T. D. Bending and D. Fon-der-flaass, Crooked Functions, Bent Functions, and Distance Regular Graphs, Electr. J. Comb, vol.5, 1998.

T. P. Berger, Construction of Recursive MDS Diffusion Layers from Gabidulin Codes, Progress in Cryptology -INDOCRYPT 2013s, pp.274-285, 2013.
DOI : 10.1007/978-3-319-03515-4_18

URL : https://hal.archives-ouvertes.fr/hal-00913852

E. Biham and A. Shamir, Differential cryptanalysis of DES-like cryptosystems, Journal of Cryptology, pp.3-72, 1991.

A. Bogdanov, L. R. Knudsen, G. Leander, C. Paar, A. Poschmann et al., PRESENT: An Ultra-Lightweight Block Cipher, Cryptographic Hardware and Embedded Systems -CHES 2007, pp.450-466, 2007.
DOI : 10.1007/978-3-540-74735-2_31

M. Brinkmann and G. Leander, On the classification of APN functions up to dimension five, Designs, Codes and Cryptography, vol.2, issue.1-3, pp.273-288, 2008.
DOI : 10.1007/s10623-008-9194-6

A. Canteaut and P. Charpin, Decomposing bent functions, IEEE Transactions on Information Theory, vol.49, issue.8, pp.2004-2023, 2003.
DOI : 10.1109/TIT.2003.814476

A. Canteaut and J. Roué, On the Behaviors of Affine Equivalent Sboxes Regarding Differential and Linear Attacks, Advances in Cryptology -EUROCRYPT 2015, part I. LNCS, 2015.
DOI : 10.1007/978-3-662-46800-5_3

URL : https://hal.archives-ouvertes.fr/hal-01104051

K. Chun, S. Kim, S. Lee, S. H. Sung, and S. Yoon, Differential and linear cryptanalysis for 2-round SPNs, Information Processing Letters, vol.87, issue.5, pp.277-282, 2003.
DOI : 10.1016/S0020-0190(03)00333-8

J. Daemen, Cipher and hash function design strategies based on linear and differential cryptanalysis, 1995.

J. Daemen and V. Rijmen, The Wide Trail Design Strategy, IMA International Conference -Coding and Cryptography 2001, pp.222-238, 2001.
DOI : 10.1007/3-540-45325-3_20

J. Daemen and V. Rijmen, The Design of Rijndael: AES -The Advanced Encryption Standard, Information Security and Cryptography, 2002.
DOI : 10.1007/978-3-662-04722-4

J. Daemen and V. Rijmen, Understanding Two-Round Differentials in AES, Security and Cryptography for Networks -SCN 2006, pp.78-94, 2006.
DOI : 10.1007/11832072_6

J. Daemen and V. Rijmen, Advanced Linear Cryptanalysis of Block and Stream Ciphers , chap. Correlation Analysis in GF (2 n ) Cryptology and information security, pp.115-131, 2011.

S. Hong, S. Lee, J. Lim, J. Sung, D. H. Cheon et al., Provable Security against Differential and Linear Cryptanalysis for the SPN Structure, Fast Software Encryption -FSE 2000, pp.273-283, 1978.
DOI : 10.1007/3-540-44706-7_19

L. Keliher and J. Sui, Exact maximum expected differential and linear probability for two-round Advanced Encryption Standard, IET Information Security, vol.1, issue.2, pp.53-57, 2007.
DOI : 10.1049/iet-ifs:20060161

G. M. Kyureghyan, Crooked maps in <mml:math altimg="si1.gif" overflow="scroll" xmlns:xocs="http://www.elsevier.com/xml/xocs/dtd" xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.elsevier.com/xml/ja/dtd" xmlns:ja="http://www.elsevier.com/xml/ja/dtd" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:tb="http://www.elsevier.com/xml/common/table/dtd" xmlns:sb="http://www.elsevier.com/xml/common/struct-bib/dtd" xmlns:ce="http://www.elsevier.com/xml/common/dtd" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:cals="http://www.elsevier.com/xml/common/cals/dtd"><mml:msub><mml:mi mathvariant="double-struck">F</mml:mi><mml:msup><mml:mn>2</mml:mn><mml:mi>n</mml:mi></mml:msup></mml:msub></mml:math>, Finite Fields and Their Applications, vol.13, issue.3, pp.713-726, 2007.
DOI : 10.1016/j.ffa.2006.03.003

X. Lai, J. L. Massey, and S. Murphy, Markov Ciphers and Differential Cryptanalysis, Advances in Cryptology -EUROCRYPT'91, pp.17-38, 1991.
DOI : 10.1007/3-540-46416-6_2

F. Macwilliams and N. Sloane, The Theory of Error-Correcting Codes, 1977.

S. Park, S. H. Sung, S. Lee, and J. Lim, Improving the Upper Bound on the Maximum Differential and the Maximum Linear Hull Probability for SPN Structures and AES, Fast Software Encryption -FSE 2003, pp.247-260, 2003.
DOI : 10.1007/978-3-540-39887-5_19

M. Sajadieh, M. Dakhilalian, H. Mala, and P. Sepehrdad, Efficient Recursive Diffusion Layers for Block Ciphers and Hash Functions, Journal of Cryptology, vol.5, issue.1, pp.240-256, 2015.
DOI : 10.1007/s00145-013-9163-8

K. Shibutani and A. Bogdanov, Towards the optimality of Feistel ciphers with substitution-permutation functions, Designs, Codes and Cryptography, vol.73, issue.2, pp.667-682, 2014.
DOI : 10.1007/s10623-014-9970-4