1. Biham, E., & Shamir, A. (1990). Differential cryptanalysis of DES-like cryptosystems, Advances in Cryptology—CRYPT0 90 (Vol. 537, pp. 2–21). Santa Barbara: Lecture Notes in Computer Science.
2. Courtois, N. T., & Pieprzyk, J. (2002). Cryptanalysis of block ciphers with over defined systems of equations, ASI-ACRYPT’02. Lecture Notes in Computer Science (Vol. 2501, pp. 267–287). Berlin: Springer.
3. Cui, L., & Cao, Y. (2007). A new S-box structure named affine-power-affine. International Journal of Innovative Computing, Information and Control, 3, 751–759.
4. Daemen, J., & Rijmen, V. (2002). The design of Rijndael-AES: The advanced encryption standard. Berlin: Springer.
5. Hussain, I., Shah, T., Gondal, M. A., Khan, W. A., & Mahmood, H. (2012). A group theoretic approach to construct cryptographically strong substitution boxes. Neural Computing and Applications,. doi: 10.1007/s00521-012-0914-5 .