Linear Distinguishing Attack on Shannon

Reference:

Risto M. Hakala and Kaisa Nyberg. Linear distinguishing attack on Shannon. In Yi Mu, Willy Susilo, and Jennifer Seberry, editors, Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings, volume 5107 of Lecture Notes in Computer Science, pages 297–305. Springer, 2008.

Suggested BibTeX entry:

@inproceedings{hakala:acisp08,
    author = {Risto M. Hakala and Kaisa Nyberg},
    booktitle = {Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings},
    editor = {Yi Mu and Willy Susilo and Jennifer Seberry},
    pages = {297-305},
    publisher = {Springer},
    series = {Lecture Notes in Computer Science},
    title = {Linear Distinguishing Attack on {S}hannon},
    volume = {5107},
    year = {2008},
}

See dx.doi.org ...