1. On immunity against Biham and Shamir’s “differential cryptanalysis";Adams;Inf Process Lett,1992
2. Constructing symmetric ciphers using the CAST design procedure;Adams;Des Codes Crypt,1997
3. Generating and counting binary bent sequences;Adams;IEEE Trans Inform Theory,1990
4. Foundations of the theory of linear selection. A code channel division;Ageev,1935
5. How far can we go beyond linear cryptanalysis?;Baignères,2004