Voir la notice de l'article provenant de la source Math-Net.Ru
[1] Biham E., Shamir A., “Differential cryptoanalysis of DES-like cryptosystems”, Proc. CRYPTO' 90, Lect. Notes Comput. Sci., 537, 1991, 2–21 | DOI | MR | Zbl
[2] Matsui M., “Linear cryptanalysis method for DES cipher”, Proc. EUROCRYPT' 93, Lect. Notes Comput. Sci., 765, 1994, 386–397 | DOI | Zbl
[3] Matsui M., “On correlation between the order of $S$-boxes and the strength of DES”, Proc. EUROCRYPT' 94, Lect. Notes Comput. Sci., 950, 1995, 366–375 | DOI | MR | Zbl
[4] Daemen J., Cipher and hash function design strategies based on linear and differential cryptanalysis, Doctoral Dissertation, K. U. Leuven, March, 1995
[5] Daemen J., Rijmen V., The Design of Rijndael: AES – The Advanced Encryption Standard, Springer Verlag, 2002 | MR
[6] Rijmen V., Cryptanalysis and design of iterated block ciphers, Doctoral Dissertation, Katholieke Univ. Leuven, 1997