{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T15:55:18Z","timestamp":1725897318403},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642341588"},{"type":"electronic","value":"9783642341595"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34159-5_2","type":"book-chapter","created":{"date-parts":[[2012,10,6]],"date-time":"2012-10-06T07:34:12Z","timestamp":1349508852000},"page":"18-29","source":"Crossref","is-referenced-by-count":9,"title":["On the Security of Hummingbird-2 against Side Channel Cube Attacks"],"prefix":"10.1007","author":[{"given":"Xinxin","family":"Fan","sequence":"first","affiliation":[]},{"given":"Guang","family":"Gong","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/978-3-642-12827-1_4","volume-title":"Information Security, Practice and Experience","author":"S.F. Abdul-Latip","year":"2010","unstructured":"Abdul-Latip, S.F., Reyhanitabar, M.R., Susilo, W., Seberry, J.: On the Security of NOEKEON against Side Channel Cube Attacks. In: Kwak, J., Deng, R.H., Won, Y., Wang, G. (eds.) ISPEC 2010. LNCS, vol.\u00a06047, pp. 45\u201355. Springer, Heidelberg (2010)"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Abdul-Latip, S.F., Reyhanitabar, M., Susilo, W., Seberry, J.: Extended Cubes: Enhancing the Cube Attack by Extracting Low-Degree Non-Linear Equations. In: The 6th ACM Symposium on Information, Computer and Communications Security - ASIACCS 2011, pp. 296\u2013305. ACM Press (2011)","DOI":"10.1145\/1966913.1966952"},{"key":"2_CR3","unstructured":"Aumasson, J.-P., Dinur, I., Henzen, L., Meier, W., Shamir, A.: Efficient FPGA Implementations of High-Dimensional Cube Tester on the Stream Cipher Grain-128. In: The 4th International Workshop on Special-purpose Hardware for Attacking Cryptographic Systems - SHARCS 2009 (2009), \n                  \n                    http:\/\/www.131002.net\/data\/papers\/ADHMS09.pdf"},{"key":"2_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-03317-9_1","volume-title":"Fast Software Encryption","author":"J.-P. Aumasson","year":"2009","unstructured":"Aumasson, J.-P., Dinur, I., Meier, W., Shamir, A.: Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium. In: Dunkelman, O. (ed.) FSE 2009. LNCS, vol.\u00a05665, pp. 1\u201322. Springer, Heidelberg (2009)"},{"key":"2_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/978-3-642-17401-8_14","volume-title":"Progress in Cryptology - INDOCRYPT 2010","author":"G.V. Bard","year":"2010","unstructured":"Bard, G.V., Courtois, N.T., Nakahara Jr., J., Sepehrdad, P., Zhang, B.: Algebraic, AIDA\/Cube and Side Channel Analysis of KATAN Family of Block Ciphers. In: Gong, G., Gupta, K.C. (eds.) INDOCRYPT 2010. LNCS, vol.\u00a06498, pp. 176\u2013196. Springer, Heidelberg (2010)"},{"key":"2_CR6","unstructured":"Anderson, R., Biham, E., Knudsen, L.R.: Serpent: A Proposal for the Advanced Encryption Standard (1999), \n                  \n                    http:\/\/www.cl.cam.ac.uk\/~rja14\/Papers\/serpent.pdf"},{"key":"2_CR7","unstructured":"Dinur, I., Shamir, A.: Cube Attacks on Tweakable Black Box Polynomials, Cryptology ePrint Archive, Report 2008\/385 (2008), \n                  \n                    http:\/\/eprint.iacr.org\/2008\/385"},{"key":"2_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1007\/978-3-642-01001-9_16","volume-title":"Advances in Cryptology - EUROCRYPT 2009","author":"I. Dinur","year":"2009","unstructured":"Dinur, I., Shamir, A.: Cube Attacks on Tweakable Black Box Polynomials. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol.\u00a05479, pp. 278\u2013299. Springer, Heidelberg (2009)"},{"key":"2_CR9","unstructured":"Dinur, I., Shamir, A.: Side Channel Cube Attacks on Block Ciphers, Cryptology ePrint Archive, Report 2009\/127 (2009), \n                  \n                    http:\/\/eprint.iacr.org\/2009\/127"},{"key":"2_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/978-3-642-21702-9_10","volume-title":"Fast Software Encryption","author":"I. Dinur","year":"2011","unstructured":"Dinur, I., Shamir, A.: Breaking Grain-128 with Dynamic Cube Attacks. In: Joux, A. (ed.) FSE 2011. LNCS, vol.\u00a06733, pp. 167\u2013187. Springer, Heidelberg (2011)"},{"key":"2_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-642-14992-4_2","volume-title":"Financial Cryptography and Data Security","author":"D. Engels","year":"2010","unstructured":"Engels, D., Fan, X., Gong, G., Hu, H., Smith, E.M.: Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices. In: Sion, R., Curtmola, R., Dietrich, S., Kiayias, A., Miret, J.M., Sako, K., Seb\u00e9, F. (eds.) FC 2010 Workshops. LNCS, vol.\u00a06054, pp. 3\u201318. Springer, Heidelberg (2010)"},{"key":"2_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-642-25286-0_2","volume-title":"RFID. Security and Privacy","author":"D. Engels","year":"2012","unstructured":"Engels, D., Saarinen, M.-J.O., Schweitzer, P., Smith, E.M.: The Hummingbird Lightweight Authenticated Encryption Algorithm. In: Juels, A., Paar, C. (eds.) RFIDSec 2011. LNCS, vol.\u00a07055, pp. 19\u201331. Springer, Heidelberg (2012)"},{"key":"2_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1007\/3-540-60590-8_16","volume-title":"Fast Software Encryption","author":"L.R. Knudsen","year":"1995","unstructured":"Knudsen, L.R.: Truncated and High Order Differentials. In: Preneel, B. (ed.) FSE 1994. LNCS, vol.\u00a01008, pp. 196\u2013211. Springer, Heidelberg (1995)"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Lai, X.: Higher Order Derivatives and Differential Cryptanalysis. In: Communications and Cryptography: Two Sides of One Tapestry, pp. 227\u2013233. Kluwer Academic Publishers (1994)","DOI":"10.1007\/978-1-4615-2694-0_23"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Le, T.-H., Canovas, C., Cl\u00e9di\u00e8re, J.: An Overview of Side Channel Analysis Attacks. In: The 2008 ACM Symposium on Information, Computer and Communications Security - ASIACCS 2008, pp. 33\u201343. ACM Press (2008)","DOI":"10.1145\/1368310.1368319"},{"key":"2_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1007\/978-3-642-21702-9_19","volume-title":"Fast Software Encryption","author":"M.-J.O. Saarinen","year":"2011","unstructured":"Saarinen, M.-J.O.: Cryptanalysis of Hummingbird-1. In: Joux, A. (ed.) FSE 2011. LNCS, vol.\u00a06733, pp. 328\u2013341. Springer, Heidelberg (2011)"},{"key":"2_CR17","unstructured":"Vielhaber, M.: Breaking ONE.FIVIUM by AIDA \u2013 an Algebraic IV Differential Attack, Cryptology ePrint Archive, Report 2007\/413 (2007), \n                  \n                    http:\/\/eprint.iacr.org\/2007\/413"},{"key":"2_CR18","unstructured":"Vielhaber, M.: AIDA Breaks BIVIUM (A&B) in 1 Minute Dual Core CPU Time, Cryptology ePrint Archive, Report 2009\/402 (2009), \n                  \n                    http:\/\/eprint.iacr.org\/2009\/402"},{"key":"2_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1007\/978-3-642-10433-6_25","volume-title":"Cryptology and Network Security","author":"L. Yang","year":"2009","unstructured":"Yang, L., Wang, M., Qiao, S.: Side Channel Cube Attack on PRESENT. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol.\u00a05888, pp. 379\u2013391. Springer, Heidelberg (2009)"},{"key":"2_CR20","unstructured":"Zhao, X., Wang, T., Guo, S.: Improved Side Channel Cube Attacks on PRESENT, Cryptology ePrint Archive, Report 2011\/165 (2011), \n                  \n                    http:\/\/eprint.iacr.org\/2011\/165"},{"key":"2_CR21","unstructured":"Zhu, B., Yu, W., Wang, T.: A Practical Platform for Cube-Attack-Like Cryptanalyses, Cryptology ePrint Archive, Report 2010\/644 (2010), \n                  \n                    http:\/\/eprint.iacr.org\/2010\/644"}],"container-title":["Lecture Notes in Computer Science","Research in Cryptology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34159-5_2.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T12:46:30Z","timestamp":1620132390000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34159-5_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642341588","9783642341595"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34159-5_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}