1. Akshima C.D., Ghosh M., Goel A., Sanadhya S.K.: Single key recovery attacks on 9-round Kalyna-128/256 and Kalyna-256/512. In: Information Security and Cryptology (ICISC 2015)—18th International Conference, Seoul, South Korea, 25–27 November 2015, Revised Selected Papers, pp. 119–135 (2015).
2. AlTawy R., Abdelkhalek A., Youssef A.M.: A meet-in-the-middle attack on reduced-round Kalyna-b/2b. IEICE Trans. 99–D(4), 1246–1250 (2016).
3. Daemen J., Rijmen V.: The Design of Rijndael: AES—The Advanced Encryption Standard. Information Security and Cryptography. Springer, Berlin (2002).
4. Daemen J., Rijmen V.: Understanding two-round differentials in AES. In: Security and Cryptography for Networks, 5th International Conference (SCN 2006), Maiori, Italy, 6–8 September 2006, Proceedings, pp. 78–94 (2006).
5. Demirci H., Selçuk A.A.: A meet-in-the-middle attack on 8-round AES. In: Fast Software Encryption, 15th International Workshop (FSE 2008), Lausanne, Switzerland, 10–13 February 2008. Revised Selected Papers, pp. 116–126 (2008).