[Bertoni, G., Breveglieri, L., Koren, I., Maistri, P. and Piuri, V. (2003a). Concurrent fault detection in a hardware implementation of the RC5 encryption algorithm, Proceedings of the IEEE International Conference on Application-Specific Systems, Architectures and Processors, The Hague, The Netherlands, pp. 410-419.]Search in Google Scholar
[Bertoni, G., Breveglieri, L., Koren, I., Maistri, P. and Piuri, V. (2003b). Error analysis and detection procedures for a hardware implementation of the advanced encryption standard, IEEE Transactions on Computers 52: 492-505.10.1109/TC.2003.1190590]Search in Google Scholar
[Biham, E. and Shamir, A. (1992). Differential cryptanalysis of the full 16-round DES, in E. F. Brickell (Ed.), CRYPTO, Lecture Notes in Computer Science, Vol. 740, Springer, Heidelberg, pp. 487-496.]Search in Google Scholar
[Biryukov, A. (2003). Analysis of involutional ciphers: Khazad and Anubis, in T. Johansson (Ed.), Fast Software Encryption, 10th International Workshop, FSE 2003, Lund, Sweden, February 24-26, 2003, Revised Papers, Lecture Notes in Computer Science, Vol. 2887, Springer, New York, NY, pp. 45-53.10.1007/978-3-540-39887-5_5]Search in Google Scholar
[Bucholc, K. and Idzikowska, E. (2007). Analysis of the influence of errors on the encryption and decryption in PP-1 block cipher, Studia z Automatyki i Informatyki 32: 17-22.]Search in Google Scholar
[Chmiel, K. (2006a). Distribution of the best nonzero differential and linear approximations of S-box functions, Journal of Telecommunications and Information Technology 3: 8-13.]Search in Google Scholar
[Chmiel, K. (2006b). Intermediate evaluation of block ciphers, Proceedings of the 13th International Multi-Conference on Advanced Computer Systems ACS 2006, Międzyzdroje, Poland, Vol. 1, pp. 331-342.]Search in Google Scholar
[Chmiel, K. (2006c). On differential and linear approximation of S-box functions, Biometrics, Computer Security Systems and Artificial Intelligence Applications, New York, NY, USA, pp. 111-120.10.1007/978-0-387-36503-9_11]Search in Google Scholar
[Chmiel, K., Grocholewska, A., Socha, P. and Stoklosa, J. (2008a). Involutional block cipher for limited resources, Global Communications Conference—GLOBECOM, New Orleans, LA, USA, pp. 1852-1856.10.1109/GLOCOM.2008.ECP.358]Search in Google Scholar
[Chmiel, K., Grocholewska, A., Socha, P. and Stoklosa, J. (2008b). Scalable cipher for limited resources, Polish Journal of Environmental Studies 17(4C): 371-377.]Search in Google Scholar
[Courtois, N. and Pieprzyk, J. (2002). Cryptanalysis of block ciphers with overdefined systems of equations, in Y. Zheng (Ed.), ASIACRYPT, Lecture Notes in Computer Science, Vol. 2501, Springer, Berlin/Heidelberg, pp. 267-287.10.1007/3-540-36178-2_17]Search in Google Scholar
[Daemen, J. and Rijmen, V. (1999). AES proposal: Rijndael, Proceedings of the First Advanced Encryption Standard Candidate Conference, Ventura, CA, USA.]Search in Google Scholar
[Fuller, J. and Millan, W. (2002). On linear redundancy in the AES S-Box, Cryptology ePrint Archivehttp://eprint.iacr.org]Search in Google Scholar
[Fuller, J. and Millan, W. (2003). Linear redundancy in S-boxes, in T. Johansson (Ed.) Fast Software Encryption, 10th International Workshop, FSE 2003, Lund, Sweden, February 24-26, 2003, Revised Papers, Lecture Notes in Computer Science, Vol. 2887, Springer-Verlag, New York, NY, pp. 74-86.10.1007/978-3-540-39887-5_7]Search in Google Scholar
[Idzikowska, E. and Bucholc, K. (2007). Concurrent error detection in S-boxes, International Journal of Computer Science and Applications 4(1): 27-32.]Search in Google Scholar
[Johansson, T. (Ed.) (2003). Fast Software Encryption, 10th International Workshop, FSE 2003, Lund, Sweden, February 24-26, 2003, Revised Papers, Lecture Notes in Computer Science, Vol. 2887, Springer-Verlag, New York, NY.]Search in Google Scholar
[NIST (2005). Statistical test suite (version 1.8) http://csrc.nist.gov/rng/rng2.html]Search in Google Scholar
[Socha, P. (2008). Scalable PP-1 block cipher—Implementation, Report No. 558, Poznań University of Technology, Institute of Control and Information Engineering, Poznań.]Search in Google Scholar