[2]I. Dinur and A. Shamir, “Cube attacks on tweakable black-box polynomials,” In: Advances in Cryptology – EUROCRYT, vol. 5479, pp. 278–299, 2009.
[3]P. C. Kocher, J. Jaffe and B. Jun, “Differential power analysis,” In: Advances in CryptologyCRYPTO 1999, LNCS, vol. 1666, pp. 388–397, 1999.
[4]J. J. Quisquater and D. Samyde, “A new tool for non-intrusive analysis of smart cards based on electro-magnetic emissions: the SEMA and DEMA methods,” In: Eurocrypt Rump Session.
[5]P. C. Kocher, “Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems,” In: Advances in Cryptology CRYPTO 1996, LNCS, vol. 1109, pp. 104–113, 1996.
[6]A. Bogdanov, L. R. Knudsen, G. Leander, C. Paar, A. Poschmann, M. J. B. Robshaw, Y. Seurin and C. Vikkelsoe, “PRESENT: an ultra-lightweight block cipher”, In: Paillier, CHES 2007. LNCS, vol. 4727, pp. 450–466, 2007.
[7]J. Daemon and V. Rijnemn, “AES proposal: Rijndael. technical evaluation,” CD-1: Documentation, 1198.
[8]L. Yang, M. Wang and S. Qiao, “Side channel cube attack on PRESENT,” In Proceeding of the 8th International Conference on Cryptology and Network Security, vol. 5888, pp. 379- 391, 2009.
[9]S. F. Abdul-Latip, M. R. Reyhanitabar, W. Susilo and J. Seberry, “Extended cubes enhancing the cube attack by extracting low-degree non-linear equations,” In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security – ASIACCS 2011, ACM Society, pp. 296–305, 2011.
[10]
X. Zhao,
S. Guo,
F. Zhang,
T. Wang,
Z. Shi,
H. Liu,
K. Ji and
J. Huang, ”Efficient hamming weight-based side-channel cube attacks on PRESENT,”
Journal of Systems and Software, vol. 86, no. 3, pp. 728–743, March 2013.
[12]
X. Zhao,
S. Guo,
F. Zhang ,
T. Wang,
Z. Shi,
H. Liu,
K. Ji and
J. Huang, “Black-box side-channel cube attacks on Present-like ciphers,” IMCCC '13 Proceedings of the 2013 Third International Conference on Instrumentation, Measurement, Computer, Communication and Control, pp. 1352-1358, 2013.
[14]S. F. Abdul-Latip, M. R. Reyhanitabar, W. Susilo and J. Seberry, “On the security of NOEKEON against side channel cube attacks,” In: Proceedings of the 5th InformationSecurity Practice and Experience Conference. Future Conference – ISPEC2010, LNCS, vol. 6047, pp. 45–55, 2010.
[15]G. V. Bard, N. T. Courtois, J. Nakahara, P. Sepehrdad and B. Zhang, “Algebraic, AIDA/cube and side channel analysis of KATAN family of block ciphers,” In: Progress in Cryptology-indocryt, LNCS, vol. 6498, pp. 176–196, 2010.
[16]X. Fan and G. Gong, “On the security of Hummingbird-2 against side channel cube attacks,” In: Proceedings of WEWoRC 2011, pp. 100–104, 2011.
[17]y – ICISC 2012, Lecture Notes in Computer Science, vol. 7839, pp. 141-155, 2013.
[18]S. Islam, M. Afzal and A. Rashdi, “On the security of LBlock against the cube attack and side channel cube attack,” Security Engineering and Intelligence Informatics, Lecture Notes in Computer Science, vol. 8128, pp. 105-121, 2013.
[19]S. F. Abdul-Latip, M. R. Reyhanitabar, W. Susilo and J. Seberry, “Extended cubes enhancing the cube attack by extracting low-degree non-linear equations,” In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, pp. 296–305, 2011.
[21]S. Mangard, E. Oswald and T. Popp, Power analysis attacks, Springer, Berlin Heidelberg, 2007.
[23]M. Blum, M. Luby and R. Rubinfeld, “Self-testing/correcting with applications to numerical problems,” Journal of Computer and System Sciences, vol. 47, pp. 549–595, 1993.