1. W. Diffie and M. E. Hellman, “Special feature exhaustive cryptanalysis of t e NBS encryption standard,” Computer, vol. 10, no. 6, pp. 74-84, June 1977.
  2. Y. Sasaki, “Meet-in-the-Middle preimage attacks on AES as ing modes and application to w irlpool,” In Antoine Joux, editor, Fast Software Encryption, vol. 6733 of LNCS, pp. 378-396, Springer Berlin/Heidelberg, 2011.
  3. A. Bogdanov, D. Khovratovich, and C. Rechberger, “Biclique Cryptanalysis of t e Full AES,” ASIACRYPT 2011, LNCS, vol. 7073, pp. 344-371, Springer, Heidelberg 2011.
  4. W. Wu and L. Zang, “LBlock: A Lig tweig t block cip er,” In Javier Lopez and Gene Tsudik, editors, Applied Cryptography and Network Security, vol. 6715 of LNCS, pp. 327-344, Springer Berlin/Heidelberg, 2011.
  5. S. Ahmadi, Z. Ahmadian, J. Mohajeri, and M. D. Aref, “Low-Data Complexity Biclique Cryptanalysis of Block Cip ers Wit Application to Piccolo and HIGHT,” IEEE Transzctions on Information Forensics and Security,” Vol. 9, no. 10, October 2014.
  6. Y. Wang, W. Wu, X. Yu, and L. Zang, “Security on LBlock against biclique cryptanalysis,” in Information Security Applications, vol. 7690, Heidelberg, Germany:Springer- Verlag, pp. 1-14, 2012.
  7. F. Karakoç, H. Demirci, and A. E. Harmanci, “Impossible Differential Cryptanalysis of Reduced-Rund LBlock,” In: Askoxylakis, I. G., Pöhls, H. C. ,Posegga, J. (eds.) WISTP 2012 LNCS, vol. 7322, pp. 179–188, Springer 2012.
  8. H. Soleimany and K. Nyberg, “Zero-correlation linear cryptanalysis of reduced-round LBlock Des,” Codes Cryptography, vol. 73, no. 2, pp. 683–698, 2014.
  9. Y. Wang and W. Wu, “Improved multidimensional zero-correlation linear cryptanalysis and applications to LBlock and TWINE,” In Information Security and Privacy - ACISP 2014, LNCS 8544, pp. 1 -16, Springer 2014.