1. Albrecht, M., Cid, C.: Algebraic techniques in differential cryptanalysis. In: Dunkelman (ed.) [9], pp. 193–208 (2009)
2. Bailey, D.V., Batina, L., Bernstein, D.J., Birkner, P., Bos, J.W., Chen, H.-C., Cheng, C.-M., Damme, G.: v., Meulenaer, G.d., Perez, L.J.D., Fan, J., Güneysu, T., Gurkaynak, F., Kleinjung, T., Lange, T., Mentens, N., Niederhagen, R., Paar, C., Regazzoni, F., Schwabe, P., Uhsadel, L., Herrewege, A.V., Yang, B.-Y.: Breaking ecc2k-130. Cryptology ePrint Archive, Report 2009/541 (2009), http://eprint.iacr.org/
3. Blondeau, C., Gérard, B.: Links between theoretical and effective differential probabilities: Experiments on present. Cryptology ePrint Archive, Report 2010/261 (2010), http://eprint.iacr.org/
4. Lecture Notes in Computer Science;A. Bogdanov,2007
5. Lecture Notes in Computer Science;J.Y. Cho,2010