The QARMA block cipher family, IACR Trans. Symmetric Cryptol, vol.2017, issue.1, pp.4-44, 2017. ,
Midori: A Block Cipher for Low Energy, ASIACRYPT 2015, Part II, pp.411-436, 2015. ,
DOI : 10.1007/978-3-662-48800-3_17
The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS, CRYPTO 2016, Part II, pp.123-153, 2016. ,
DOI : 10.1007/978-3-642-21599-5_13
PRINCE -A low-latency block cipher for pervasive computing applications -extended abstract, ASIACRYPT 2012, pp.208-225, 2012. ,
DOI : 10.1007/978-3-642-34961-4_14
URL : http://orbit.dtu.dk/en/publications/prince--a-lowlatency-block-cipher-for-pervasive-computing-applications-extended-abstract(f7c39395-2294-475d-8fe4-102655401c00).html
Boolean Functions for Cryptography and Error Correcting Codes Boolean Methods and Models, 2007. ,
DOI : 10.1017/cbo9780511780448.011
URL : http://www-rocq.inria.fr/codes/Claude.Carlet/chap-fcts-Bool.pdf
Cryptanalysis of NORX v2.0, IACR Trans. Symmetric Cryptol, vol.2017, issue.1, pp.156-174, 2017. ,
On the linear structure of symmetric Boolean functions, Australasian Journal of Combinatorics, vol.16, pp.239-243, 1997. ,
Abstract algebra, 2004. ,
The theory of matrices, 1959. ,
Nearly Optimal Algorithms for Canonical Matrix Forms, SIAM Journal on Computing, vol.24, issue.5, pp.948-969, 1995. ,
DOI : 10.1137/S0097539793252687
URL : ftp://ftp.csd.uwo.ca/pub/mwg/frob.ps.Z
Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs, IACR Trans. Symmetric Cryptol, vol.2016, issue.1, pp.33-56, 2016. ,
The LED Block Cipher, CHES 2011, pp.326-341, 2011. ,
DOI : 10.1007/978-3-642-23951-9_22
Topics in Algebra, 1975. ,
Cryptanalysis of Haraka, IACR Trans. Symmetric Cryptol, vol.2016, issue.1, pp.1-12, 2016. ,
Additive and linear structures of cryptographic functions, FSE'94, pp.75-85, 1995. ,
DOI : 10.1007/3-540-60590-8_6
A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack, CRYPTO 2011, pp.206-221, 2011. ,
DOI : 10.1007/978-3-642-22792-9_12
A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro, EUROCRYPT 2015, Part I. LNCS, pp.254-283, 2015. ,
DOI : 10.1007/978-3-662-46800-5_11
Finite Fields, 1983. ,
DOI : 10.1017/CBO9780511525926
Invariant subspaces in Simpira Cryptology ePrint Archive, Report, vol.2016248, p.248, 2016. ,
Nonlinear invariant attack -practical attack on full SCREAM, iSCREAM, and Midori64, ASIACRYPT 2016, Part II, pp.3-33, 2016. ,