1. Adams C, Tavares S (1990) The structured design of cryptographically good s-boxes. J Cryptol 3(1):27–41
2. Alvarez-Cubero JA, Zufiria PJ (2010) A c++ class for analysing vector boolean functions from a cryptographic perspective. In: 2010 International Conference on Security and Cryptography (SECRYPT). IEEE, pp 1–9
3. Andrea I, Chrysostomou C, Hadjichristofi G (2015) Internet of things: Security vulnerabilities and challenges. In: 2015 IEEE Symposium on Computers and Communication (ISCC). IEEE, pp 180–187
4. Ashur T, Bodden D (2016) Linear cryptanalysis of reduced-round speck. In: Proceedings of the 37th Symposium on Information Theory in the Benelux
5. Beaulieu R, Shors D, Smith J, Treatman-Clark S, Weeks B, Wingers L (2013) The Simon and Speck families of lightweight block ciphers cryptology eprint archive