1. Cid C. Leurent G.: ‘An analysis of the XSL algorithm’.2005 Proc. 11th Int. Conf. on the Theory and Application of Cryptology and Information Security Advances in Cryptology – (ASIACRYPT 2005) Chennai India 4–8 December2005 pp.333–352. Available athttps://doi.org/10.1007/11593447_18
2. Courtois N.: ‘Higher order correlation attacks XL algorithm and cryptanalysis of toyocrypt’.5th Int. Conf. on Information Security and Cryptology (ICISC 2002) Seoul Korea 28–29 November2002 pp.182–199. Revised Papers 2002. Available athttps://doi.org/10.1007/3‐540‐36552‐4_13
3. Courtois N. Pieprzyk J.: ‘Cryptanalysis of block ciphers with overdefined systems of equations’.2002 Proc. 8th Int. Conf. on the Theory and Application of Cryptology and Information Security Advances in Cryptology (ASIACRYPT 2002) Queenstown New Zealand 1–5 December2002 pp.267–287. Available athttps://doi.org/10.1007/3‐540‐36178‐2_17
4. Courtois N.T. Sepehrdad P. Susil P.et al: ‘Elimlin algorithm revisited’.19th Int. Workshop Fast Software Encryption (FSE 2012) Washington DC USA 19–21 March2012 pp.306–325. Revised Selected Papers 2012. Available athttps://doi.org/10.1007/978‐3‐642‐34047‐5_18