T. Mourouzis, “Optimizations in Algebraic and Differential Cryptanalysis,” Ph.D. Thesis, Department of Computer Science University College London, January 2015.
J. P. Degabriele, “Authenticated Encryption in Theory and in Practice,” Ph.D. Thesis, Department of Mathematics, Royal Holloway, University of London. 2014.
P. Junod, “Statistical cryptanalysis of block cipher,” Ph.D. Thesis, EPFL Switzerland. 2005.
M. Matsui, “Linear cryptanalysis method for DES cipher,” Advanced in Cryptology-EOUROCRYPT‘93 LNCS 765, pp. 3-72, 1993.
E. Biham and A. Shamir, “Differential cryptanalysis of DES-like cryptosystems,” Journal of Cryptology, vol. 4, no. 1, pp. 3-72, 1991.
J. Daemen and V. Rijmen, “The Design of Rijndael: AES - The Advanced Encryption Standard,” Springer-Verlag, Berlin, 2002.
J. Daemen and V. Rijmen, “The Wide Trail Design Strategy,” Cryptography and Coding 2001, LCNS 2260, pp. 222-238, 2001.
National Bureau of Standards, “Data Encryption Standard,” Federal Information Processing Standard 46, 1977.
M. Schläffer, “Cryptanalysis of AES-Based Hash Functions,” Ph.D. thesis, Graz University of Technology, Austria, March 2011.
G. Seirksma, “Linear and Integer Programming,” Theory and Practice, Second Edition, 2001.
T. Suzaki and K. Minemats, “Improving the Generalized Feistel,” Fast Software Encryption (FSE) 2010, LNCS 6147, pp. 19–39, 2010.
X. Lai and J. L. Massey, “Markov ciphers and differential cryptanalysis,” Advances in cryptology, Proceeding of Eurocrypt ’91, LCNS 547, D. W. Davies, Ed., Springer-Verlag, pp. 17-38, 1991.
http://lpsolve.sourceforge.net/5.5/
S. Hong, S. Lee, J. Lim, J. Sung, D. Cheon, and I. Cho, “Provable Security against Differential and Linear Cryptanalysis for the SPN Structure,” FSE 2000, LNCS 1978, pp. 273–283, 2001.
Y. Nawaz, K. C. Gupta, and G. Gong, “Algebraic Immunity of S-boxes Based on Power Mappings: Analysis and Construction,” 2007.