[1. Angelova, V., Y. Borissov. Plaintext Recovery in DES-Like Cryptosystems Based on S-Boxes with Embedded Parity Check. - Serdica Journal of Computing, Vol. 7, 2013, No 3, pp. 257-270.10.55630/sjc.2013.7.257-270]Search in Google Scholar
[2. Biham, E., A. Shamir. Differential Cryptanalysis of DES-Like Cryptosystems. - Journal of Cryptology, Vol. 4, 1991, No 1, Springer, pp. 3-72.10.1007/BF00630563]Search in Google Scholar
[3. Borissov, Y., P. Boyvalenkov, R. Tsenko v. Linear Cryptanalysis and Modified DESwith Parity Check in the S-Boxes. - In: 2nd Conference on Cryptography and Information Security in the Balkans, LNCS, Vol. 9540, Springer, 2016, pp. 60-78.]Search in Google Scholar
[4. Coppersmith, D. The Data Encryption Standard (DES) and Its Strength Against Attacks. - IBM Journal of Research and Development, Vol. 38, 1994, No 3, pp. 243-250.10.1147/rd.383.0243]Search in Google Scholar
[5. Cusick, T. W., P. Stanic a. Cryptographic Boolean Functions and Applications. San Diego, Academic Press, Elsevier Inc., 2009.10.1016/B978-0-12-374890-4.00009-4]Search in Google Scholar
[6. Hellman, M., R. Merkle, R. Schroeppel, L. Wash ington, W. Diffie, S. Pohlig, P. Schweitzer. Results of an Initial Attempt to Cryptanalyze the NBS Data Encryption Standard. - SEL 76-042, 9 September 1976.]Search in Google Scholar
[7. Konheim, A. G. Computer Security and Cryptography. New Jersey, John Wiley & Sons, Inc., 2007.10.1002/0470083980]Search in Google Scholar
[8. Matsui, M. Linear Cryptanalysis Method of DES Cipher. - Advances in Cryptology-EUROCRYPT’93, LNCS, Vol. 765, Springer, 1994, pp. 386-397.10.1007/3-540-48285-7_33]Search in Google Scholar
[9. Matsui, M. Linear Cryptanalysis of DES Cipher (I), Version 1.03. http://www.cs.bilkent.edu.tr/~selcuk/teaching/cs519/Matsui-LC.pdf]Search in Google Scholar
[10. Matsui, M. The First Experimental Cryptanalysis of the Data Encryption Standard. - In: Advances in Cryptology-CRYPTO’94, LNCS, Vol. 839, Springer, 1994, pp. 1-11.10.1007/3-540-48658-5_1]Search in Google Scholar
[11. Nyberg, K. On the Construction of Highly Nonlinear Permutation. - In: Advances in Cryptology-EUROCRYPT’92, LNCS, Vol. 658, Springer, 1993, pp. 92-98.10.1007/3-540-47555-9_8]Search in Google Scholar
[12. Pieprzyk, J., C. Charnes, J. Seberr y. On the Immunity of S-Boxes Against Linear Cryptanalysis. citeseerx.ist.psu.edu]Search in Google Scholar
[13. Schneier, B. Applied Cryptography. Second Edition. New Jersey, John Wiley & Sons, Inc., 1996. ]Search in Google Scholar