Voir la notice de l'article provenant de la source Math-Net.Ru
[1] Biryukov A., Perrin L., Udovenko A., “Reverse-engineering the S-box of Streebog, Kuznyechik and Stribobr1”, EUROCRYPT 2016, Lect. Notes Comput. Sci., 9665, 2016, 372–402 | DOI | MR | Zbl
[2] Perrin L., Cryptanalysis, Reverse-Engineering and Design of Symmetric Cryptographic Algorithms, Univ. Luxembourg, 2017, 368 pp.
[3] Perrin L., Udovenko A., Biryukov A., “Cryptanalysis of a theorem: Decomposing the only known solution to the big APN problem”, CRYPTO 2016, Lect. Notes Comput. Sci., 9815, 2016, 93–122 | DOI | MR | Zbl
[4] Fomin D. B., “New classes of $8$-bit permutations based on a butterfly structure”, Matematicheskie voprosy kriptografii, 10:2 (2019), 169–180 | MR
[5] Fomin D. B., Trifonov D. I., “Ob apparatnoi realizatsii odnogo klassa baitovykh podstanovok”, Prikladnaya diskretnaya matematika. Prilozhenie, 12 (2019), 134–137
[6] Fomin D. B., “O sposobe postroeniya podstanovok prostranstva $V_{2m}$ s ispolzovaniem $(2m,m)$-funktsii”, Matematicheskie voprosy kriptografii, 11:3 (2020), 121–138 | MR
[7] Carlet C., Crama Y., Hammer P. L., “Vectorial Boolean Functions for Cryptography”, Boolean Models and Methods, Cambridge Univ. Press, 2010, 398–470