The KHAZAD legacy-level block cipher, 2000. ,
Fast Software Encryption, 4th International Workshop, FSE '97 Proceedings, 1997. ,
DOI : 10.1007/BFb0052329
Differential Cryptanalysis of DES-like Cryptosystems, Lecture Notes in Computer Science, vol.537, pp.2-21, 1990. ,
DOI : 10.1007/3-540-38424-3_1
Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware, pp.142-158 ,
DOI : 10.1007/978-3-642-40349-1_9
Slide Attacks, pp.245-259 ,
DOI : 10.1007/3-540-48519-8_18
PRESENT: An Ultra-Lightweight Block Cipher, Lecture Notes in Computer Science, vol.4727, pp.450-466, 2007. ,
DOI : 10.1007/978-3-540-74735-2_31
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.122.2536
Higher-Order Differential Properties of Keccak and Luffa, Lecture Notes in Computer Science, vol.6733, pp.252-269, 2011. ,
DOI : 10.1007/978-3-642-13858-4_15
URL : https://hal.archives-ouvertes.fr/inria-00537741
A New Combinational Logic Minimization Technique with Applications to Cryptology, Lecture Notes in Computer Science, vol.6049, pp.178-189, 2010. ,
DOI : 10.1007/978-3-642-13193-6_16
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.405.9210
Small Scale Variants of the AES, Lecture Notes in Computer Science, vol.3557, pp.145-162, 2005. ,
DOI : 10.1007/11502760_10
Higher Order Masking of Look-Up Tables, Cryptology ePrint Archive, vol.700, 2013. ,
DOI : 10.1007/978-3-642-55220-5_25
Limitations of the Even-Mansour construction, pp.495-498 ,
DOI : 10.1007/3-540-57332-1_46
The block cipher Square, pp.149-165 ,
DOI : 10.1007/BFb0052343
Bitslice Ciphers and Power Analysis Attacks, Lecture Notes in Computer Science, pp.134-149, 1978. ,
DOI : 10.1007/3-540-44706-7_10
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.11.1116
The Wide Trail Design Strategy, Lecture Notes in Computer Science, vol.2260, pp.222-238, 2001. ,
DOI : 10.1007/3-540-45325-3_20
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.85.2588
Key Recovery Attacks on 3- round Even-Mansour, 8-step LED-128, and Full AES 2 . Cryptology ePrint Archive, 2013. ,
DOI : 10.1007/978-3-642-42033-7_18
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.310.7504
Minimalism in Cryptography: The Even-Mansour Scheme Revisited, Lecture Notes in Computer Science, vol.7237, pp.336-354, 2012. ,
DOI : 10.1007/978-3-642-29011-4_21
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.295.8836
A Construction of a Cipher From a Single Pseudorandom Permutation, pp.210-224 ,
Block Ciphers That Are Easier to Mask: How Far Can We Go?, pp.383-399 ,
DOI : 10.1007/978-3-642-40349-1_22
Bounds on the minimum distance of linear codes and quantum codes, 2007. ,
Masking vs. Multiparty Computation: How Large Is the Gap for AES?, pp.400-416 ,
Cryptanalysis of Zorro, Cryptology ePrint Archive Report, vol.2013713713, 2013. ,
A Formal Basis for the Heuristic Determination of Minimum Cost Paths, IEEE Transactions on Systems Science and Cybernetics, vol.4, issue.2, pp.100-107, 1968. ,
DOI : 10.1109/TSSC.1968.300136
Advances in Cryptology -ASI- ACRYPT '91, International Conference on the Theory and Applications of Cryptology, Fujiyoshida, Japan, Proceedings, 1991. ,
Private Circuits: Securing Hardware against Probing Attacks, Lecture Notes in Computer Science, vol.2729, pp.463-481, 2003. ,
DOI : 10.1007/978-3-540-45146-4_27
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.115.9436
Security Analysis of the Lightweight Block Ciphers XTEA, LED and Piccolo, Lecture Notes in Computer Science, vol.7372, pp.71-86, 2012. ,
DOI : 10.1007/978-3-642-31448-3_6
Faster and Timing-Attack Resistant AES-GCM, Lecture Notes in Computer Science, vol.5747, pp.1-17, 2009. ,
DOI : 10.1007/978-3-642-04138-9_1
Towards Green Cryptography: A Comparison of Lightweight Ciphers from the Energy Viewpoint, Lecture Notes in Computer Science, vol.7428, pp.390-407, 2012. ,
DOI : 10.1007/978-3-642-33027-8_23
Rotational Cryptanalysis of ARX, Lecture Notes in Computer Science, vol.6147, pp.333-346, 2010. ,
DOI : 10.1007/978-3-642-13858-4_19
A Fast and Provably Secure Higher-Order Masking of AES S-Box, pp.95-107 ,
DOI : 10.1007/978-3-642-23951-9_7
Fast Software Encryption, 6th International Workshop, FSE '99 Proceedings, 1999. ,
DOI : 10.1007/3-540-48519-8
Linear Cryptanalysis Method for DES Cipher, Lecture Notes in Computer Science, vol.765, pp.386-397, 1993. ,
DOI : 10.1007/3-540-48285-7_33
On correlation between the order of S-boxes and the strength of DES, pp.366-375 ,
DOI : 10.1007/BFb0053451
New block encryption algorithm MISTY, pp.54-68 ,
DOI : 10.1007/BFb0052334
Differential Analysis of the LED Block Cipher, Lecture Notes in Computer Science, vol.7658, pp.190-207, 2012. ,
DOI : 10.1007/978-3-642-34961-4_13
Cryptanalysis of Round-Reduced LED, 2013. ,
Secure Hardware Implementation of Nonlinear Functions in the Presence of Glitches, Journal of Cryptology, vol.22, issue.11, pp.292-321, 2011. ,
DOI : 10.1007/s00145-010-9085-7
Linear approximation of block ciphers, pp.439-444 ,
DOI : 10.1007/BFb0053460
PICARO ??? A Block Cipher Allowing Efficient Higher-Order Side-Channel Resistance, Lecture Notes in Computer Science, vol.7341, pp.311-328, 2012. ,
DOI : 10.1007/978-3-642-31284-7_19
Higher-Order Glitches Free Implementation of the AES Using Secure Multi-party Computation Protocols, pp.63-78 ,
DOI : 10.1007/978-3-642-23951-9_5
Nessie proposal: WHIRLPOOL (2000) Available online at https ,
Provably Secure Higher-Order Masking of AES, Lecture Notes in Computer Science, vol.6225, pp.413-427, 2010. ,
DOI : 10.1007/978-3-642-15031-9_28
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.400.7885
Advances in Cryptology -EUROCRYPT '94, Workshop on the Theory and Application of Cryptographic Techniques, Proceedings, 1994. ,
Reversible computing, Lecture Notes in Computer Science, vol.85, pp.632-644, 1980. ,
DOI : 10.1007/3-540-10003-2_104
Finding Optimal Bitsliced Implementations of 4 x 4-bit S-boxes, Symmetric Key Encryption Workshop, p.20, 2011. ,
Security Evaluations beyond Computing Power, Lecture Notes in Computer Science, vol.7881, pp.126-141, 2013. ,
DOI : 10.1007/978-3-642-38348-9_8
URL : http://hdl.handle.net/2078.1/133720
The Boomerang Attack, pp.156-170 ,
DOI : 10.1007/3-540-48519-8_12
The Myth of Generic DPA???and the Magic of Learning, Lecture Notes in Computer Science, vol.8366, pp.183-205, 2014. ,
DOI : 10.1007/978-3-319-04852-9_10