1. R. V. Oliynykov, I. D. Gorbenko, O. V. Kazymyrov, et al., “A new encryption standard of Ukraine: The Kalyna block cipher,” Cryptology ePrint Archive, http://eprint.iacr.org/2015/650 .
2. R. V. Oliynykov, I. D. Gorbenko, O. V. Kazymyrov, et al., “Principles of construction and basic properties of a new national Ukrainian standard of block encryption,” Ukrainian Information Security Research Journal, 17, No. 2, 142–157 (2015).
3. R. Al Tawy, A. Abdelkhalek, and A. M. Youssef, “A meet-in-the-middle attack on reduced-round Kalyna-b/2b,” Cryptology ePrint Archive, http://eprint.iacr.org/2015/762 .
4. A. S. Maslov, “On sufficient conditions to generate the alternating group by SA-permutations,” Trudy Instituta Matematiki, 15, No. 2, 58–68 (2007).
5. J. Daemen, Cipher and Hash Function Design Strategies Based on Linear and Differential Cryptanalysis, Ph. D. Thesis, Katholieke Univ. Leuven (1995).