[1] S. Vaudenay, “On the Lai-Massey Scheme,” ASIACRYPT, vol. 1716, 1999.##
[2] H. K. Verma, A. Kumar, and K. Sharma, “Study and Performance Analysis of IDEA with Variable Rounds,” International Journal of Advanced Research in Compute Science and Software Engineering, vol. 02, no. 05, 2012.##
|
[3] A. Malekian, “Security of Datas,” Nas, 2015.##
|
[4] A. Selcuk and E. Ayaz, “Improved DST Cryptanalysis of IDEA,” Lecture Notes in Computer Science (LNCS), vol. 4356, 2006.##
|
[5] O. Dunkelman, N. Keller, and E. Biham, “New cryptanalytic results on IDEA,” Lecture Notes in Computer Science (LNCS), vol. 4284, pp. 412–427, 2006.##
|
[6] O. Dunkelman, N. Keller, and E. Biham, “A new attack on 6-round IDEA,” in FSE, 2007.##
|
[7] X. Lia and X. Sun, “The key-dependent attack on block ciphers,” in ASIACRYPT, 2009.##
|
[8] O. Dunkelman, N. Keller, A. Shamir, and E. Biham, “New Attacks on IDEA with at Least 6 Rounds,” Cryptology, pp. 209-239, 2013.##
|
[9] J. Kelsey, B. Schneier, D. Wagner, and C. Hall, “Side Channel Cryptanalysis of Product Ciphers,” Journal of Computer Security, vol. 8, no. 2-3, pp. 141-158, 2000.##
|
[10] S. Bandyopadhyay and K. Das, “Analysis of Side Channel Attacks on Various Cryptographic Algorithms,” Journal for Research, vol. 2, no. 5, pp. 36-41, 2016.##
[11] Francois Koeune, and Francois-Xavier Standaert, “A Tutorial on Physical Security and Side-Channel Attacks,” LNCS, vol. 3655, 2005.##
|