1. Differential Cryptanalysis of DES-like Cryptosystems;Biham,1990
2. Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA;Kelsey,1997
3. The Boomerang Attack;Wagner,1999
4. Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent;Kelsey,2000
5. The Rectangle Attack - Rectangling the Serpent;Biham,2001