“…However, this group depends, strongly, on the key-schedule used to create the roundkeys. For this reason, usually, we study the properties of the group Γ ∞ (C) (see for instance [4,13,19,20,21]). But, as we showed above, we could have that even if the group Γ ∞ (C) is considered secure, the group Γ(C) may be not secure with respect to the trapdoors considered here.…”