References
- A. Biryukov and D. Khovratovich, textit>Related-key cryptanalysis of the full AES-192 and AES-256, Advances in Cryptology-ASIACRYPT2009, Lecture Notes in Computer Science 5912, Springer, Berlin, 2009, pp. 1–18.
- A. Bogdanov, D. Khovratovich, and C. Rechberger, Biclique cryptanalysis of the full AES, Advances in Cryptology-ASIACRYPT2011, Lecture Notes in Computer Science 7073, Springer, Berlin, 2011, pp. 344–371.
- J. Chen, M. Wang, and B. Preneel, Impossible differential cryptanalysis of the lightweight block ciphers TEA, XTEA and HIGHT, Progress in Cryptology-AFRICACRYPT2012, Lecture Notes in Computer Science 7374, Springer, Berlin, 2012, pp. 117–137.
- O. Dunkelman, N. Keller, and A. Shamir, A practical-time related-key attack on the KASUMI cryptosystem used in GSM and 3g telephony, Advances in Cryptology-CRYPTO2010, Lecture Notes in Computer Science 6223, Springer, Berlin, 2010, pp. 393–410.
- D. Hong, J. Sung, S. Hong, J. Lim, S. Lee, B. Koo, C. Lee, D. Chang, J. Lee, K. Jeong, H. Kim, J. Kim, and S. Chee, HIGHT: A new block cipher suitable for low-resource device, Cryptographic Hardware and Embedded Systems-CHES2006, Lecture Notes in Computer Science 4249, Springer, Berlin, 2006, pp. 46–59.
- D. Hong, B. Koo, and D. Kwon, Biclique attack on the full HIGHT, Information Security and Cryptology-ICISC2011, Lecture Notes in Computer Science 7259, Springer, Berlin, 2012, pp. 365–374.
- B. Koo, D. Hong, and D. Kwon, Related-key attack on the full HIGHT, Information Security and Cryptology-ICISC2010, Lecture Notes in Computer Science 6829, Springer, Berlin, 2011, pp. 49–67.
- J. Lu, Cryptanalysis of reduced versions of the hight block cipher from CHES 2006, Information Security and Cryptology-ICISC2007, Lecture Notes in Computer Science 4817, Springer, Berlin, 2007, pp. 11–26.
- O. Özen, K. Varıcı, C. Tezcan, and Ç. Kocair, Lightweight block ciphers revisited: Cryptanalysis of reduced round PRESENT and HIGHT, Information Security and Privacy, Lecture Notes in Computer Science 5594, Springer, Berlin, 2009, pp. 90–107.
- K. Shibutani, T. Isobe, H. Hiwatari, A. Mitsuda, T. Akishita, and T. Shirai, Piccolo: An ultra-lightweight blockcipher, Cryptographic Hardware and Embedded Systems-CHES2011, Lecture Notes in Computer Science 6917, Springer, Berlin, 2011, pp. 342–357.
- Y. Wang, W. Wu, and X. Yu, Biclique cryptanalysis of reduced-round piccolo block cipher, Information Security Practice and Experience, Lecture Notes in Computer Science 7232, Springer, Berlin, 2012, pp. 337–352.
- P. Zhang, B. Sun, and C. Li, Saturation attack on the block cipher hight, Cryptology and Network Security, Lecture Notes in Computer Science 5888, Springer, Berlin, 2009, pp. 76–86.