[1]
G. Liu, M. Ghosh, and L. Song, “Security Analysis of SKINNY under Related-Tweakey Settings”,
ToSC
, vol. 2017, no. 3, pp. 37–72, Sep. 2017,
doi: 10.13154/tosc.v2017.i3.37-72.