[[1]ALBRECHT. M.-CID, C.: Algebraic techniques in differential cryptanalysis, IACR Cryptology ePrint Archive, Report 2008/177. 10.1007/978-3-642-03317-9_12]Search in Google Scholar
[[2]GASECKI. A.- MISZTAL, M.: Application of algebraic techniques in differential crypt- analysis aganst block cipher DES, MUT Bulletin, Warsaw, 2011.]Search in Google Scholar
[[3]BIHAM, E.-SHAMIR, A.: Differential cryptanalysis of DES-like cryptosystems, in: Ad- vances in Cryptology-CRYPTO '90 (A. Menezes et al., eds.), Santa Barbara, USA, 1990, Lecture Notes in Comput. Sci., Vol. 537, Springer-Verlag, Berlin, 1990, pp. 2-21.10.1007/3-540-38424-3_1]Search in Google Scholar
[[4]NATIANAL INSTITUTE OF STANDARDS AND TECHNOLOGY: Data Encryption Standard, FIPS PUB 46-3, 1999.]Search in Google Scholar
[[5]COURTOIS, N. T.-BARD, G. V.: Algebraic cryptanalysis of the data encryption stan- dard. IACR Cryptology ePrint Archive, Report 2006/402. ]Search in Google Scholar
[[6] COURTOIS, N. T.: Examples of equations generated for experiments with algebraic crypt- analysis of DES, <http://www.cryptosystem.net/aes/toyciphers.html>.]Search in Google Scholar
[[7]FAUGERE, .J.-C.-PERRET, L- SPAENLEHAUER, P.-.J.: Algebraic-differential crypt- analysis of DES. in: Western European Workshop on Research in Crypt.-WEWoRC ’09 (C. Rechberger, ed.), Graz, Austria, 2009, Lecture Notes in Comput. Sci., Vol. 6429, Springer-Verlag, Berlin, 2009, pp. 1-5.]Search in Google Scholar
[[8]KNUDSEN, L. R.: Truncated and higher order differentials, in: Fast Software Encryp- tion, 2nd Internat. Workshop (B. Preneel, ed.), Leuven, Belgium, 1994, Lecture Notes in Comput. Sci., Vol. 1008, Springer-Verlag, Berlin, 1995, pp. 196-211. ]Search in Google Scholar
[[9]MATSUI, M.: Linear cryptanalysis method for DES cipher, in: Advances in Cryptology- -Eurocrypt ’93 (T. Helleseth, ed.). Lofthus, Norway. 1993. Lecture Notes in Comput. Sci.. Vol. 765. Springer-Verlag, Berlin, 1993, pp. 386-397.]Search in Google Scholar
[[10]COURTOIS, N. T.-GAVYINECKI, A.-SONG, G.: Contradiction immunity and guess- then-determine attacks on GOST. Tatra Mt. Math. Publ. 53 (2012), 65-79.]Search in Google Scholar
[[11]BIHAM, E.-SHAMIR, A.: Differential cryptanalysis of the full 16-rou.nd DES. in: Ad- vances in Cryptology-CRYPTO ’92 (E. Brickell, ed.), 12th Annual Internat. Cryptology Conf., Santa Barbara, CA, USA, 1992, Lecture Notes in Comput. Sci., Vol. 740, Springer, Berlin, 1993, pp. 487-496. ]Search in Google Scholar