R. Avanzi, The QARMA block cipher family, IACR Trans. Symmetric Cryptol, vol.2017, issue.1, pp.4-44, 2017.

S. Banik, A. Bogdanov, T. Isobe, K. Shibutani, H. Hiwatari et al., Midori: A Block Cipher for Low Energy, ASIACRYPT 2015, Part II, pp.411-436, 2015.
DOI : 10.1007/978-3-662-48800-3_17

C. Beierle, J. Jean, S. Kölbl, G. Leander, A. Moradi et al., The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS, CRYPTO 2016, Part II, pp.123-153, 2016.
DOI : 10.1007/978-3-642-21599-5_13

J. Borghoff, A. Canteaut, T. Güneysu, E. B. Kavun, M. Kne?evi´kne?evi´c et al., PRINCE -A low-latency block cipher for pervasive computing applications -extended abstract, ASIACRYPT 2012, pp.208-225, 2012.
DOI : 10.1007/978-3-642-34961-4_14

URL : http://orbit.dtu.dk/en/publications/prince--a-lowlatency-block-cipher-for-pervasive-computing-applications-extended-abstract(f7c39395-2294-475d-8fe4-102655401c00).html

C. Carlet, Boolean Functions for Cryptography and Error Correcting Codes Boolean Methods and Models, 2007.
DOI : 10.1017/cbo9780511780448.011

URL : http://www-rocq.inria.fr/codes/Claude.Carlet/chap-fcts-Bool.pdf

C. Chaigneau, T. Fuhr, H. Gilbert, J. Jean, and J. R. Reinhard, Cryptanalysis of NORX v2.0, IACR Trans. Symmetric Cryptol, vol.2017, issue.1, pp.156-174, 2017.

E. Dawson and C. Wu, On the linear structure of symmetric Boolean functions, Australasian Journal of Combinatorics, vol.16, pp.239-243, 1997.

D. S. Dummit and R. M. Foote, Abstract algebra, 2004.

F. R. Gantmacher, The theory of matrices, 1959.

M. Giesbrecht, Nearly Optimal Algorithms for Canonical Matrix Forms, SIAM Journal on Computing, vol.24, issue.5, pp.948-969, 1995.
DOI : 10.1137/S0097539793252687

URL : ftp://ftp.csd.uwo.ca/pub/mwg/frob.ps.Z

J. Guo, J. Jean, I. Nikolic, K. Qiao, Y. Sasaki et al., Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs, IACR Trans. Symmetric Cryptol, vol.2016, issue.1, pp.33-56, 2016.

J. Guo, T. Peyrin, A. Poschmann, and M. J. Robshaw, The LED Block Cipher, CHES 2011, pp.326-341, 2011.
DOI : 10.1007/978-3-642-23951-9_22

I. N. Herstein, Topics in Algebra, 1975.

J. Jean, Cryptanalysis of Haraka, IACR Trans. Symmetric Cryptol, vol.2016, issue.1, pp.1-12, 2016.

X. Lai, Additive and linear structures of cryptographic functions, FSE'94, pp.75-85, 1995.
DOI : 10.1007/3-540-60590-8_6

G. Leander, M. A. Abdelraheem, H. Alkhzaimi, and E. Zenner, A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack, CRYPTO 2011, pp.206-221, 2011.
DOI : 10.1007/978-3-642-22792-9_12

G. Leander, B. Minaud, and S. Rønjom, A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro, EUROCRYPT 2015, Part I. LNCS, pp.254-283, 2015.
DOI : 10.1007/978-3-662-46800-5_11

R. Lidl and H. Niederreiter, Finite Fields, 1983.
DOI : 10.1017/CBO9780511525926

S. Rønjom, Invariant subspaces in Simpira Cryptology ePrint Archive, Report, vol.2016248, p.248, 2016.

Y. Todo, G. Leander, and Y. Sasaki, Nonlinear invariant attack -practical attack on full SCREAM, iSCREAM, and Midori64, ASIACRYPT 2016, Part II, pp.3-33, 2016.