1. E. Biham and A. Shamir, “Differential cryptanalysis of DES-like cryptosystems,≓ Journal of Cryptology, Vol. 4, No. 1, 1991, pp. 3–72.
2. J. Daemen, “Cipher and hash function design strategies based on linear and differential cryptanalysis,≓ Doctoral Dissertation, March 1995, K.U.Leuven.
3. J. Daemen and V. Rijmen, “Self-reciprocal cipher structures,≓ COSIC internal report 96-3, 1996.
4. T. Jakobsen and L.R. Knudsen, “The interpolation attack on block ciphers,≓ these proceedings.
5. J. Kelsey, B. Schneier and D. Wagner, “Key-schedule cryptanalysis of IDEA, GDES, GOST, SAFER, and Triple-DES,≓ Advances in Cryptology, Proceedings Crypto’96, LNCS 1109, N. Koblitz, Ed., Springer-Verlag, 1996, pp. 237–252.