1. Abed, F., Forler, C., List, E., Lucks, S., Wenzel, J.: Biclique cryptanalysis of PRESENT, LED, And KLEIN. Cryptology ePrint Archive, Report 2012/591 (2012).
http://eprint.iacr.org/2012/591
2. Anderson, R.J., Biham, E.: Two practical and provably secure block ciphers: BEARS and LION. In: Gollmann [10], pp. 113–120
3. Biham, E., Dunkeman, O.: The SHAvite-3 Hash Function. Submission to NIST SHA-3 competition.
www.cs.technion.ac.il/orrd/SHAvite-3/
4. Bogdanov, A.: On the differential and linear efficiency of balanced Feistel networks. Inf. Process. Lett. 110(20), 861–866 (2010)
5. Lecture Notes in Computer Science;A Bogdanov,2011