[1]
“Security Analysis of SKINNY under Related-Tweakey Settings”, ToSC, vol. 2017, no. 3, pp. 37–72, Sep. 2017, doi: 10.13154/tosc.v2017.i3.37-72.