1. Biryukov, A., Bouillaguet, C., Khovratovich, D.: Cryptographic schemes based on the ASASA structure: black-box, white-box, and public-key. Cryptology ePrint Archive, Report 2014/474 (2014). https://eprint.iacr.org/2014/474
2. Daemen, J.: Cipher and hash function design strategies based on linear and differential cryptanalysis. Ph.D. thesis, Doctoral dissertation, March 1995, KU Leuven (1995)
3. Dobraunig, C., Eichlseder, M., Mendel, F., Schläffer, M.: Ascon v1.2: lightweight authenticated encryption and hashing. J. Cryptol. 34(3), 33 (2021). https://doi.org/10.1007/s00145-021-09398-9
4. Graner, A.M., Kriepke, B., Krompholz, L., Kyureghyan, G.M.: On the bijectivity of the map $$\chi $$. Cryptology ePrint Archive, Paper 2024/187 (2024). https://eprint.iacr.org/2024/187
5. Liu, F., Sarkar, S., Meier, W., Isobe, T.: The inverse of $$\chi $$ and its applications to Rasta-like ciphers. J. Cryptol. 35(4), 28 (2022). https://doi.org/10.1007/s00145-022-09439-x