1. [1] C. Adams and J. Gilchrist, “The CAST-256 encryption algorithm,” Network Working Group RFC 2612, June 1999.
2. [2] R.J. Anderson and E. Biham, “Two practical and provably secure block ciphers: BEAR and LION,” FSE, ed. D. Gollmann, Lect. Notes Comput. Sci., vol.1039, pp.113-120, Springer, 1996.
3. [4] E. Biham, A. Biryukov, and A. Shamir, “Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials,” EUROCRYPT, ed. J. Stern, Lect. Notes Comput. Sci., vol.1592, pp.12-23, Springer, 1999.
4. [5] E. Biham and A. Shamir, “Differential cryptanalysis of DES-like cryptosystems,” CRYPTO, ed. A. Menezes and S.A. Vanstone, Lect. Notes Comput. Sci., vol.537, pp.2-21, Springer, 1990.
5. [6] A. Bogdanov, “On unbalanced feistel networks with contracting MDS diffusion,” Des. Codes Cryptogr., vol.59, no.1-3, pp.35-58, 2011.