1. Abdul-Latip S.F., Reyhanitabar M.R., Susilo W., Seberry J.: Extended cubes: enhancing the cube attack by extracting low-degree non-linear equations. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS ’11, pp. 296–305 (2011).
2. Aumasson J.-P., Dinur I., Meier W., Shamir A.: Cube testers and key recovery attacks on reduced-round MD6 and Trivium. In: Fast Software Encryption—16th International Workshop, FSE, pp. 1–22 (2009).
3. Carlitz L.: Some inverse relations. Duke Math. J. 40(4), 893–901 (1973).
4. Chaum D., Evertse J.-H.: Cryptanalysis of DES with a reduced number of rounds. In: Proceedings of Crypto ’85, pp. 192–211 (1985).
5. Dinur I., Shamir A.: Cube attacks on tweakable black box polynomials. In: EUROCRYPT, pp. 278–299 (2009).