1 |
Romulus, https://csrc.nist.gov/CSRC/media/Projects/lightweight-cryptography/documents/finalist-round/updatedspec-doc/romulus-spec-final.pdf
|
2 |
J.H Park, H.G Kim, and J.S Kim, "Improved SITM Attack on the PRESENTBlockcipher," Journal of the Korea Institute of Information Security & Cryptology, 32(2), pp. 155-162, Apr. 2022.
|
3 |
J. Breier, D. Jap, and S. Bhasin, "SCADPA: Side-channel assisted differential-plaintext attack on bit permutation based ciphers," 2018 Design, Automation & Test in Europe Conference&Exhibition, IEEE, pp. 1129-1134, Mar.2018.
|
4 |
P. Kocher, J. Jaffe and B. Jun, "Differential power analysis," In: Annual international cryptology conference, LNCS 1666, pp. 388-397, Dec. 1999.
|
5 |
E. Biham, and A. Shamir, "Differential cryptanalysis of DES-like cryptosystems," Journal of CRYPTOLOGY, vol. 4, no. 1, pp.3-72, Jan. 1991.
DOI
|
6 |
S. Nikova, C. Rechberger, andV. Rijmen, "Threshold Implementations Against Side-Channel Attacks andGlitches," International conference oninformation and communications security, LNCS 4307, no. 1, pp. 529-545, Dec. 2006.
|
7 |
C. Beierle, et al. "The SKINNYfamilyof block ciphers and its low-latencyvariant MANTIS," In Annual International Cryptology Conference, pp. 123-153, Aug. 2016
|
8 |
S. Bhasin, J. Breier, X. Hou, D. Jap,R. Poussier and S. M. Sim, "Sitm: Seein-the-middle side-channel assistedmiddle round differential cryptanalysis onspn block ciphers," IACR TransactionsonCryptographic Hardware and EmbeddedSystems, vol. 2020, no. 1, pp. 95-122, Nov. 2019.
|