1 |
S. Banik, S. K. Pandey, T. Peyrin, Y. Sasaki, S. M. Sim and Y. Todo, "GIFT: a small present," International Conference on Cryptographic Hardware and Embedded Systems, LNCS 10529, pp. 321-345, Sep. 2017.
|
2 |
W. Unger, L. Babinkostova, M. Borowczak, and R. Erbes, "Side-channel Leakage Assessment Metrics: A Case Study of GIFT Block Ciphers," IEEE Computer Society Annual Symposium on VLSI, IEEE, pp. 236-241, Jul. 2021.
|
3 |
R, Zong, X. Dong, H. Chen, Y. Luo, S. Wang, and Z. Li, "Towards Key- recovery-attack friendly distinguishers: Application to GIFT-128," IACR Trans- actions on Symmetric Cryptology, vol. 2021, no. 1, pp. 156-184, Mar. 2021.
|
4 |
HyENA, https://csrc.nist.gov/CSRC/media/Projects/lightweight-cryptography/documents/round-2/spec-doc-rnd2/hyena-spec-round2.pdf
|
5 |
GIFT-COFB, https://csrc.nist.gov/CSRC/media/Projects/lightweight-cryptography/documents/finalist-round/updated-spec-doc/gift-cofb-spec-final.pdf
|
6 |
E. Biham, and A. Shamir, "Differential cryptanalysis of DES-like cryptosystems," Journal of CRYPTOLOGY, vol. 4, no. 1, pp. 3-72, Jan. 1991.
DOI
|
7 |
P. Kocher, J. Jaffe and B. Jun, "Differential power analysis," In: Annual international cryptology conference, LNCS 1666, pp. 388-397, Dec. 1999.
|
8 |
S. Nikova, C. Rechberger, and V. Rijmen, "Threshold Implementations Against Side-Channel Attacks and Glitches," International conference on information and communications security, LNCS 4307, no. 1, pp. 529-545, Dec. 2006.
|
9 |
J. Breier, D. Jap, and S. Bhasin, "SCADPA: Side-channel assisted differential-plaintext attack on bit permutation based ciphers," 2018 Design, Automation & Test in Europe Conference & Exhibition, IEEE, pp. 1129-1134, Mar. 2018.
|
10 |
S. Bhasin, J. Breier, X. Hou, D. Jap, R. Poussier and S. M. Sim, "Sitm: See-in-the-middle side-channel assisted middle round differential cryptanalysis on spn block ciphers," IACR Transactions on Cryptographic Hardware and Embedded Systems, vol. 2020, no. 1, pp. 95-122, Nov. 2019.
|
11 |
A. Bogdanov, L. R. Knudsen, G. Leander, C. Paar, A. Poschmann, M. J. Robshaw, et al., "Present: An ultra-lightweight block cipher," International Workshop on Cryptographic Hardware and Embedded Systems, LNCS 4727, pp. 450-466, Sep. 2007
|
12 |
C. Blondeau and K. Nyberg, "Links between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities," In: EUROCRYPT 2014, LNCS 8441, pp. 165-182, May 2014.
|
13 |
C. Jooyeon, "Linear cryptanalysis of reduced-round PRESENT," In: CT-RSA 2010, LNCS, vol. 5985, pp. 302-317, 2010.
|
14 |
SUNDAE-GIFT, https://csrc.nist.gov/CSRC/media/Projects/lightweight-cryptography/documents/round-2/spec-doc-rnd2/SUNDAE-GIFT-spec-round2.pdf
|
15 |
J.H Park, H.G Kim, and J.S Kim, "Improved SITM Attack on the PRESENT Blockcipher," Journal of the Korea Institute of Information Security & Cryptology, 32(2), pp. 155-162, Apr. 2022.
|
16 |
NIST Lightweight Cryptography Standar dization: Finalists Announced, https://csrc.nist.gov/News/2021/lightweight-crypto-finalists-announced
|
17 |
A. Adomnicai, Z. Najm, T. Peyrin, "Fixslicing: a new GIFT representation: fast constant-time implementations of GIFT and GIFT-COFB on ARM Cortex-M," IACR Transactions on Cryptographic Hardware and Embedded Systems, vol. 2020. no. 3, pp. 402-27, Jun, 2020.
|