<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>2227-1899</journal-id>
<journal-title><![CDATA[Revista Cubana de Ciencias Informáticas]]></journal-title>
<abbrev-journal-title><![CDATA[RCCI]]></abbrev-journal-title>
<issn>2227-1899</issn>
<publisher>
<publisher-name><![CDATA[Editorial Ediciones Futuro]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S2227-18992022000400207</article-id>
<title-group>
<article-title xml:lang="es"><![CDATA[Estado del arte de los mecanismos de cambio de llaves en esquemas de cifrado en bloque]]></article-title>
<article-title xml:lang="en"><![CDATA[State of art of re-keying mechanisms in block cipher schemes]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Almeida Echevarria]]></surname>
<given-names><![CDATA[Daymé]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Rodríguez Aulet]]></surname>
<given-names><![CDATA[Ramses]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Domínguez Fiallo]]></surname>
<given-names><![CDATA[Ernesto]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universidad de La Habana Instituto de Criptografía ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Cuba</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>12</month>
<year>2022</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>12</month>
<year>2022</year>
</pub-date>
<volume>16</volume>
<numero>4</numero>
<fpage>207</fpage>
<lpage>232</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://scielo.sld.cu/scielo.php?script=sci_arttext&amp;pid=S2227-18992022000400207&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://scielo.sld.cu/scielo.php?script=sci_abstract&amp;pid=S2227-18992022000400207&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://scielo.sld.cu/scielo.php?script=sci_pdf&amp;pid=S2227-18992022000400207&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen En Criptografía, la cantidad de datos permitidos a cifrar con una sola llave en un algoritmo o esquema de cifrado es conocida como tiempo de vida de la llave. Esta cantidad debe ser limitada, ya que la probabilidad de e´xito durante la realizacio´n de ataques específicos aumenta con la obtencio´n de un mayor nu´mero de datos cifrados, lo cual conlleva al cambio frecuente de las mismas. Para evitar estos cambios regulares de llaves han surgido nuevas variantes en el caso de esquemas sime´tricos de cifrado en bloque que extienden el tiempo de vida y que son conocidos en la literatura como mecanismos de cambio de llave externos, internos y frescos, dependiendo de donde usados, ya que trabajan a nivel de protocolos, modos de operacio´n o en el propio algoritmo de cifrado. En este trabajo se realizo´ una revisio´n bibliogra´fica sobre el estado del arte de cada una de las variantes teniendo en cuenta el funcionamiento general de cada uno de ellos, sus características principales, los disen&#732;os ma´s recientes, la seguridad que aportan al cifrado y su aporte al tiempo de vida de las llaves. Los resultados de la revisio´n muestran las ventajas de uso de cada uno de estos mecanismos.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract In Cryptography, the amount of data allowed to be encrypted with a single key in an algorithm or encryption scheme is known as the lifetime of the key. This amount must be limited, since the probability of success during the execution of specific attacks increases with the obtaining of a greater number of encrypted data, which leads to their frequent change. To avoid these regular key changes, new variants have emerged in the case of symmetric block cipher schemes that extend the lifetime and are known in the literature as external key change mechanisms, internal and fresh key change mechanisms, depending on where they are used, since they work at the level of protocols, modes of operation or in the encryption algorithm itself. In this work, a bibliographic review was carried out on the state of the art of each of the variants, taking into account the general operation of each one of them, their main characteristics, the most recent designs, the security they provide to encryption and their contribution to encryption key lifetime. The results of the review show the advantages of using each of these mechanisms.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[Mecanismos de cambio de llave]]></kwd>
<kwd lng="es"><![CDATA[algoritmos de cifrado en bloque]]></kwd>
<kwd lng="es"><![CDATA[cambios de llave internos]]></kwd>
<kwd lng="es"><![CDATA[cambios de llave externos]]></kwd>
<kwd lng="es"><![CDATA[cambios de llave frescos]]></kwd>
<kwd lng="en"><![CDATA[Rekeying mechanisms]]></kwd>
<kwd lng="en"><![CDATA[Block cipher algorithms]]></kwd>
<kwd lng="en"><![CDATA[internal re-keying]]></kwd>
<kwd lng="en"><![CDATA[external re-keying]]></kwd>
<kwd lng="en"><![CDATA[fresh re- keying]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Abdalla]]></surname>
<given-names><![CDATA[Michel]]></given-names>
</name>
<name>
<surname><![CDATA[Bellare]]></surname>
<given-names><![CDATA[Mihir]]></given-names>
</name>
</person-group>
<source><![CDATA[Increasing the lifetime of a key: a comparative analysis of the security of re-keying techniques]]></source>
<year>2000</year>
<conf-name><![CDATA[ International Conference on the Theory and Application of Cryptology and Information Security]]></conf-name>
<conf-loc> </conf-loc>
<page-range>546-59</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Abdalla]]></surname>
<given-names><![CDATA[Michel]]></given-names>
</name>
<name>
<surname><![CDATA[Bellare]]></surname>
<given-names><![CDATA[Mihir]]></given-names>
</name>
</person-group>
<source><![CDATA[Increasing the lifetime of a key: a comparative analysis of the security of re-keying techniques]]></source>
<year>2021</year>
</nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Abdalla]]></surname>
<given-names><![CDATA[Michel]]></given-names>
</name>
<name>
<surname><![CDATA[Bela&#305;d]]></surname>
<given-names><![CDATA[Sonia]]></given-names>
</name>
<name>
<surname><![CDATA[Fouque]]></surname>
<given-names><![CDATA[Pierre-Alain]]></given-names>
</name>
</person-group>
<source><![CDATA[Leakage-resilient symmetric encryption via re- keying]]></source>
<year>2013</year>
<conf-name><![CDATA[ International Conference on Cryptographic Hardware and Embedded Systems]]></conf-name>
<conf-loc> </conf-loc>
<publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ahmetzyanova]]></surname>
<given-names><![CDATA[Liliya R]]></given-names>
</name>
<name>
<surname><![CDATA[Alekseev]]></surname>
<given-names><![CDATA[Evgeny Konstantinovich]]></given-names>
</name>
<name>
<surname><![CDATA[Oshkin]]></surname>
<given-names><![CDATA[Igor Borisovich]]></given-names>
</name>
<name>
<surname><![CDATA[Smyshlyaev]]></surname>
<given-names><![CDATA[Stanislav Vitale´vich]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Increasing the lifetime of symmetric keys for the gcm mode by internal re-keying]]></article-title>
<source><![CDATA[IACR Cryptol. ePrint Arch.]]></source>
<year>2017</year>
<volume>2017</volume>
<numero>697</numero>
<issue>697</issue>
</nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Akhmetzyanova]]></surname>
<given-names><![CDATA[Liliya R]]></given-names>
</name>
<name>
<surname><![CDATA[Alekseev]]></surname>
<given-names><![CDATA[Evgeny Konstantinovich]]></given-names>
</name>
<name>
<surname><![CDATA[Oshkin]]></surname>
<given-names><![CDATA[Igor Borisovich]]></given-names>
</name>
<name>
<surname><![CDATA[Smyshlyaev]]></surname>
<given-names><![CDATA[Stanislav Vitale´vich]]></given-names>
</name>
<name>
<surname><![CDATA[Sonina]]></surname>
<given-names><![CDATA[Lolita A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[On the properties of the ctr encryption mode of magma and kuznyechik block ciphers with re-keying method based on cryptopro key meshing]]></article-title>
<source><![CDATA[Mathematical Aspects of Crypto- graphy]]></source>
<year>2017</year>
<volume>8</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>39-50</page-range></nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Akhmetzyanova]]></surname>
<given-names><![CDATA[Liliya R]]></given-names>
</name>
<name>
<surname><![CDATA[Alekseev]]></surname>
<given-names><![CDATA[Evgeny Konstantinovich]]></given-names>
</name>
<name>
<surname><![CDATA[Smyshlyaev]]></surname>
<given-names><![CDATA[Stanislav Vitale´vich]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Security bound for ctr acpkm internally re-keyed encryption mode]]></article-title>
<source><![CDATA[IACR Cryptology ePrint Archive]]></source>
<year>2018</year>
<volume>2018</volume>
<numero>950</numero>
<issue>950</issue>
</nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Alekseev]]></surname>
<given-names><![CDATA[Evgeny K]]></given-names>
</name>
<name>
<surname><![CDATA[Goncharenko]]></surname>
<given-names><![CDATA[Kirill S]]></given-names>
</name>
<name>
<surname><![CDATA[Marshalko]]></surname>
<given-names><![CDATA[Grigory B]]></given-names>
</name>
</person-group>
<source><![CDATA[Provably secure counter mode with related-key-based internal re-keying]]></source>
<year>2018</year>
<conf-name><![CDATA[ 7 th Workshop on Current Trends in Cryptology (CTCrypt]]></conf-name>
<conf-loc> </conf-loc>
<page-range>161-80</page-range></nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Alekseev]]></surname>
<given-names><![CDATA[Evgeny K]]></given-names>
</name>
<name>
<surname><![CDATA[Goncharenko]]></surname>
<given-names><![CDATA[Kirill S]]></given-names>
</name>
<name>
<surname><![CDATA[Marshalko]]></surname>
<given-names><![CDATA[Grigory B]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Provably secure counter mode with related-key-based internal re-keying]]></article-title>
<source><![CDATA[Journal of Computer Virology and Hacking Techniques]]></source>
<year>2020</year>
<volume>16</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>285-94</page-range></nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Anand]]></surname>
<given-names><![CDATA[Mayuresh Vivekanand]]></given-names>
</name>
<name>
<surname><![CDATA[Targhi]]></surname>
<given-names><![CDATA[Ehsan Ebrahimi]]></given-names>
</name>
<name>
<surname><![CDATA[Tabia]]></surname>
<given-names><![CDATA[Gelo Noel]]></given-names>
</name>
<name>
<surname><![CDATA[Unruh]]></surname>
<given-names><![CDATA[Dominique]]></given-names>
</name>
</person-group>
<source><![CDATA[Post-quantum security of the cbc, cfb, ofb, ctr, and xts modes of operation]]></source>
<year>2016</year>
<conf-name><![CDATA[ Post-quantum Cryptography]]></conf-name>
<conf-loc> </conf-loc>
<page-range>44-63</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Avraham]]></surname>
<given-names><![CDATA[Uri]]></given-names>
</name>
<name>
<surname><![CDATA[Biham]]></surname>
<given-names><![CDATA[Eli]]></given-names>
</name>
<name>
<surname><![CDATA[Dunkelman]]></surname>
<given-names><![CDATA[Orr]]></given-names>
</name>
</person-group>
<source><![CDATA[ABC-A New Framewrok for Block Ciphers]]></source>
<year>2012</year>
<publisher-name><![CDATA[Computer Science Department, Technion]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Baksi]]></surname>
<given-names><![CDATA[Anubhab]]></given-names>
</name>
<name>
<surname><![CDATA[Bhasin]]></surname>
<given-names><![CDATA[Shivam]]></given-names>
</name>
<name>
<surname><![CDATA[Breier]]></surname>
<given-names><![CDATA[Jakub]]></given-names>
</name>
<name>
<surname><![CDATA[Khairallah]]></surname>
<given-names><![CDATA[Mustafa]]></given-names>
</name>
<name>
<surname><![CDATA[Peyrin]]></surname>
<given-names><![CDATA[Thomas]]></given-names>
</name>
</person-group>
<source><![CDATA[Protecting block ciphers against differential fault attacks without re-keying]]></source>
<year>2018</year>
<conf-name><![CDATA[ 2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)]]></conf-name>
<conf-loc> </conf-loc>
<publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Banerjee]]></surname>
<given-names><![CDATA[Utsav]]></given-names>
</name>
<name>
<surname><![CDATA[Ho]]></surname>
<given-names><![CDATA[Lisa]]></given-names>
</name>
<name>
<surname><![CDATA[Koppula]]></surname>
<given-names><![CDATA[Skanda]]></given-names>
</name>
</person-group>
<source><![CDATA[Power-based side-channel attack for aes key extraction on the atmega328 microcontroller]]></source>
<year>2022</year>
<publisher-name><![CDATA[arXiv preprint arXiv]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bariant]]></surname>
<given-names><![CDATA[Augustin]]></given-names>
</name>
<name>
<surname><![CDATA[Leurent]]></surname>
<given-names><![CDATA[Gae¨tan]]></given-names>
</name>
</person-group>
<source><![CDATA[Truncated boomerang attacks and application to aes-based ciphers]]></source>
<year>2022</year>
<publisher-name><![CDATA[Cryptology ePrint Archive]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bela&#305;d]]></surname>
<given-names><![CDATA[Sonia]]></given-names>
</name>
<name>
<surname><![CDATA[Santis]]></surname>
<given-names><![CDATA[Fabrizio De]]></given-names>
</name>
<name>
<surname><![CDATA[Heyszl]]></surname>
<given-names><![CDATA[Johann]]></given-names>
</name>
<name>
<surname><![CDATA[Mangard]]></surname>
<given-names><![CDATA[Stefan]]></given-names>
</name>
<name>
<surname><![CDATA[Medwed]]></surname>
<given-names><![CDATA[Marcel]]></given-names>
</name>
<name>
<surname><![CDATA[Schmidt]]></surname>
<given-names><![CDATA[Jo¨rn-Marc]]></given-names>
</name>
<name>
<surname><![CDATA[Standaert]]></surname>
<given-names><![CDATA[Franc¸ois-Xavier]]></given-names>
</name>
<name>
<surname><![CDATA[Tillich]]></surname>
<given-names><![CDATA[Stefan]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Towards fresh re-keying with leakage-resilient prfs: cipher design principles and analysis]]></article-title>
<source><![CDATA[Journal of Cryptographic Engineering]]></source>
<year>2014</year>
<volume>4</volume>
<numero>3</numero>
<issue>3</issue>
</nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bellare]]></surname>
<given-names><![CDATA[Mihir]]></given-names>
</name>
<name>
<surname><![CDATA[Kohno]]></surname>
<given-names><![CDATA[Tadayoshi]]></given-names>
</name>
</person-group>
<source><![CDATA[A theoretical treatment of related-key attacks: Rka-prps, rka-prfs and applications]]></source>
<year>2003</year>
<conf-name><![CDATA[ International Conference on the Theory and Applications of Cryptographic Techniques]]></conf-name>
<conf-loc> </conf-loc>
<page-range>491-506</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bellare]]></surname>
<given-names><![CDATA[Mihir]]></given-names>
</name>
<name>
<surname><![CDATA[Rogaway]]></surname>
<given-names><![CDATA[Phillip]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[chapter 4, symmetric encryption]]></article-title>
<source><![CDATA[Introduction to modern cryptography]]></source>
<year>2004</year>
</nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bellare]]></surname>
<given-names><![CDATA[Mihir]]></given-names>
</name>
<name>
<surname><![CDATA[Desai]]></surname>
<given-names><![CDATA[Anand]]></given-names>
</name>
<name>
<surname><![CDATA[Jokipii]]></surname>
<given-names><![CDATA[Eron]]></given-names>
</name>
<name>
<surname><![CDATA[Rogaway]]></surname>
<given-names><![CDATA[Phillip]]></given-names>
</name>
</person-group>
<source><![CDATA[A concrete security treatment of symmetric encryption]]></source>
<year>1997</year>
<conf-name><![CDATA[ Proceedings 38th Annual Symposium on Foundations of Computer Science]]></conf-name>
<conf-loc> </conf-loc>
<page-range>394-403</page-range><publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Black]]></surname>
<given-names><![CDATA[John]]></given-names>
</name>
<name>
<surname><![CDATA[Urtubia]]></surname>
<given-names><![CDATA[Hector]]></given-names>
</name>
</person-group>
<source><![CDATA[{Side-Channel} attacks on symmetric encryption schemes: The case for authenticated encryption]]></source>
<year>2002</year>
<conf-name><![CDATA[ 11th USENIX Security Symposium (USENIX Security 02)]]></conf-name>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bock]]></surname>
<given-names><![CDATA[Benedikt]]></given-names>
</name>
<name>
<surname><![CDATA[Matysik]]></surname>
<given-names><![CDATA[Jan-Tobias]]></given-names>
</name>
<name>
<surname><![CDATA[Krentz]]></surname>
<given-names><![CDATA[Konrad-Felix]]></given-names>
</name>
<name>
<surname><![CDATA[Meinel]]></surname>
<given-names><![CDATA[Christoph]]></given-names>
</name>
</person-group>
<source><![CDATA[Link layer key revocation and rekeying for the adaptive key establishment scheme]]></source>
<year>2019</year>
<conf-name><![CDATA[ 2019 IEEE 5th World Forum on Internet of Things (WF-IoT)]]></conf-name>
<conf-loc> </conf-loc>
<publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chakraborti]]></surname>
<given-names><![CDATA[Avik]]></given-names>
</name>
<name>
<surname><![CDATA[Datta]]></surname>
<given-names><![CDATA[Nilanjan]]></given-names>
</name>
<name>
<surname><![CDATA[Jha]]></surname>
<given-names><![CDATA[Ashwin]]></given-names>
</name>
<name>
<surname><![CDATA[Mancillas-Lo´pez]]></surname>
<given-names><![CDATA[Cuauhtemoc]]></given-names>
</name>
<name>
<surname><![CDATA[Nandi]]></surname>
<given-names><![CDATA[Mridul]]></given-names>
</name>
</person-group>
<source><![CDATA[Light- ocb: Parallel lightweight authenticated cipher with full security]]></source>
<year>2021</year>
<conf-name><![CDATA[ International Conference on Security, Privacy, and Applied Cryptography Engineering]]></conf-name>
<conf-loc> </conf-loc>
<page-range>22-41</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chakraborty]]></surname>
<given-names><![CDATA[Debrup]]></given-names>
</name>
<name>
<surname><![CDATA[Kundu]]></surname>
<given-names><![CDATA[Samir]]></given-names>
</name>
</person-group>
<source><![CDATA[{\sf TrCBC} is insecure]]></source>
<year>2022</year>
<publisher-name><![CDATA[Cryptology ePrint Archive]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[Lily]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Recommendation for key derivation using pseudorandom functions]]></article-title>
<source><![CDATA[NIST special publication]]></source>
<year>2008</year>
<volume>800</volume>
<numero>108</numero>
<issue>108</issue>
</nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Daemen]]></surname>
<given-names><![CDATA[Joan]]></given-names>
</name>
<name>
<surname><![CDATA[Rijmen]]></surname>
<given-names><![CDATA[Vincent]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Announcing the advanced encryption standard (aes)]]></article-title>
<source><![CDATA[Federal Information Processing Standards Publication]]></source>
<year>2001</year>
<volume>197</volume>
</nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Daemen]]></surname>
<given-names><![CDATA[Joan]]></given-names>
</name>
<name>
<surname><![CDATA[Rijmen]]></surname>
<given-names><![CDATA[Vincent]]></given-names>
</name>
</person-group>
<source><![CDATA[The design of Rijndael: AES the advanced encryption standard]]></source>
<year>2020</year>
<publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dini]]></surname>
<given-names><![CDATA[Gianluca]]></given-names>
</name>
<name>
<surname><![CDATA[Savino]]></surname>
<given-names><![CDATA[Ida M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Lark: a lightweight authenticated rekeying scheme for clustered wireless sensor networks]]></article-title>
<source><![CDATA[ACM Transactions onEmbedded Computing Systems (TECS)]]></source>
<year>2011</year>
<volume>10</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>1-35</page-range></nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dobraunig]]></surname>
<given-names><![CDATA[Christoph]]></given-names>
</name>
<name>
<surname><![CDATA[Eichlseder]]></surname>
<given-names><![CDATA[Maria]]></given-names>
</name>
<name>
<surname><![CDATA[Mangard]]></surname>
<given-names><![CDATA[Stefan]]></given-names>
</name>
<name>
<surname><![CDATA[Mendel]]></surname>
<given-names><![CDATA[Florian]]></given-names>
</name>
</person-group>
<source><![CDATA[On the security of fresh re- keying to counteract side-channel and fault attacks]]></source>
<year>2014</year>
<conf-name><![CDATA[ International Conference on Smart Card Research and Advanced Applications]]></conf-name>
<conf-loc> </conf-loc>
<publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dobraunig]]></surname>
<given-names><![CDATA[Christoph]]></given-names>
</name>
<name>
<surname><![CDATA[Koeune]]></surname>
<given-names><![CDATA[Franc¸ois]]></given-names>
</name>
<name>
<surname><![CDATA[Mangard]]></surname>
<given-names><![CDATA[Stefan]]></given-names>
</name>
<name>
<surname><![CDATA[Mendel]]></surname>
<given-names><![CDATA[Florian]]></given-names>
</name>
<name>
<surname><![CDATA[Standaert]]></surname>
<given-names><![CDATA[Franc¸ois-Xavier]]></given-names>
</name>
</person-group>
<source><![CDATA[Towards fresh and hybrid re-keying schemes with beyond birthday security]]></source>
<year>2015</year>
<conf-name><![CDATA[ International Conference on Smart Card Research and Advanced Applications]]></conf-name>
<conf-loc> </conf-loc>
<publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dworkin]]></surname>
<given-names><![CDATA[Morris]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Nist special publication 800-38a 2001 edition]]></article-title>
<source><![CDATA[NIST Special Publication]]></source>
<year>2001</year>
<volume>800</volume>
<numero>3</numero>
<issue>3</issue>
</nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gueron]]></surname>
<given-names><![CDATA[Shay]]></given-names>
</name>
<name>
<surname><![CDATA[Lindell]]></surname>
<given-names><![CDATA[Yehuda]]></given-names>
</name>
</person-group>
<source><![CDATA[Better bounds for block cipher modes of operation via nonce-based key de- rivation]]></source>
<year>2017</year>
<conf-name><![CDATA[ Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security]]></conf-name>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Guo]]></surname>
<given-names><![CDATA[Qian]]></given-names>
</name>
<name>
<surname><![CDATA[Johansson]]></surname>
<given-names><![CDATA[Thomas]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A new birthday-type algorithm for attacking the fresh re-keying counter- measure]]></article-title>
<source><![CDATA[Information Processing Letters]]></source>
<year>2019</year>
<volume>146</volume>
</nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jansen]]></surname>
<given-names><![CDATA[Cees JA]]></given-names>
</name>
<name>
<surname><![CDATA[Boekee]]></surname>
<given-names><![CDATA[Dick E]]></given-names>
</name>
</person-group>
<source><![CDATA[Modes of blockcipher algorithms and their protection against active eavesdropping]]></source>
<year>1987</year>
<conf-name><![CDATA[ Workshop on the Theory and Application of of Cryptographic Techniques]]></conf-name>
<conf-loc> </conf-loc>
<page-range>281-6</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Khairallah]]></surname>
<given-names><![CDATA[Mustafa]]></given-names>
</name>
</person-group>
<source><![CDATA[Weak keys in the rekeying paradigm: application to comet and mixfeed]]></source>
<year>2019</year>
<publisher-name><![CDATA[Cryptology ePrint Archive]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Knudsen]]></surname>
<given-names><![CDATA[Lars Ramkilde]]></given-names>
</name>
</person-group>
<source><![CDATA[Block ciphers-analysis, design and applications]]></source>
<year>1994</year>
<publisher-name><![CDATA[Citeseer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B34">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[IV]]></surname>
<given-names><![CDATA[Lavrikov]]></given-names>
</name>
<name>
<surname><![CDATA[Shishkin]]></surname>
<given-names><![CDATA[Vasily Alekseevich]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[How much data may be safely processed on one key in different modes?]]></article-title>
<source><![CDATA[Mathematical Aspects of Cryptography]]></source>
<year>2019</year>
<volume>10</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>125-34</page-range></nlm-citation>
</ref>
<ref id="B35">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[Wai-Kong]]></given-names>
</name>
<name>
<surname><![CDATA[Seo]]></surname>
<given-names><![CDATA[Seog Chung]]></given-names>
</name>
<name>
<surname><![CDATA[Seo]]></surname>
<given-names><![CDATA[Hwa Jeong ang]]></given-names>
</name>
<name>
<surname><![CDATA[Hwang]]></surname>
<given-names><![CDATA[Seong Oun]]></given-names>
</name>
</person-group>
<source><![CDATA[Efficient implementation of aes-ctr and aes-ecb on gpus with applications for high-speed frodokem and exhaustive key search]]></source>
<year>2022</year>
<volume>69</volume>
<page-range>2962-6</page-range></nlm-citation>
</ref>
<ref id="B36">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[Shengli]]></given-names>
</name>
</person-group>
<source><![CDATA[Information-theoretic secret key agreement]]></source>
<year>2002</year>
<publisher-name><![CDATA[Citeseer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B37">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Maram]]></surname>
<given-names><![CDATA[Varun]]></given-names>
</name>
<name>
<surname><![CDATA[Masny]]></surname>
<given-names><![CDATA[Daniel]]></given-names>
</name>
<name>
<surname><![CDATA[Patranabis]]></surname>
<given-names><![CDATA[Sikhar]]></given-names>
</name>
<name>
<surname><![CDATA[Raghuraman]]></surname>
<given-names><![CDATA[Srinivasan]]></given-names>
</name>
</person-group>
<source><![CDATA[On the quantum security of ocb]]></source>
<year>2022</year>
<publisher-name><![CDATA[IACR Transactions on Symmetric Cryptology]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B38">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Medwed]]></surname>
<given-names><![CDATA[Marcel]]></given-names>
</name>
<name>
<surname><![CDATA[Petit]]></surname>
<given-names><![CDATA[Christoph]]></given-names>
</name>
<name>
<surname><![CDATA[Regazzoni]]></surname>
<given-names><![CDATA[Francesco]]></given-names>
</name>
<name>
<surname><![CDATA[Renauld]]></surname>
<given-names><![CDATA[Mathieu]]></given-names>
</name>
<name>
<surname><![CDATA[Standaert]]></surname>
<given-names><![CDATA[Franc¸ois-Xavier]]></given-names>
</name>
</person-group>
<source><![CDATA[Fresh re-keying ii: Security multiple parties against side-channel and fault attacks]]></source>
<year></year>
<conf-name><![CDATA[ International Confe- rence on Smart Card Research and Advance Applications]]></conf-name>
<conf-loc> </conf-loc>
<page-range>115-32</page-range></nlm-citation>
</ref>
<ref id="B39">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Medwed]]></surname>
<given-names><![CDATA[Marcel]]></given-names>
</name>
<name>
<surname><![CDATA[Standaert]]></surname>
<given-names><![CDATA[Franc¸ois-Xavier]]></given-names>
</name>
<name>
<surname><![CDATA[Großscha¨dl]]></surname>
<given-names><![CDATA[Johann]]></given-names>
</name>
<name>
<surname><![CDATA[Regazzoni]]></surname>
<given-names><![CDATA[Francesco]]></given-names>
</name>
</person-group>
<source><![CDATA[Fresh re-keying: Security against side-channel and fault attacks for low-cost devices]]></source>
<year>2010</year>
<conf-name><![CDATA[ International Conference on Cry- ptology in Africa]]></conf-name>
<conf-loc> </conf-loc>
<page-range>279-96</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B40">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mennink]]></surname>
<given-names><![CDATA[Bart]]></given-names>
</name>
</person-group>
<source><![CDATA[Beyond birthday bound secure fresh rekeying: Application of authenticated encryption]]></source>
<year>2020</year>
<conf-name><![CDATA[ International Conference on the Theory and Application of Cryptology and Information Security]]></conf-name>
<conf-loc> </conf-loc>
<page-range>630-61</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B41">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mugal]]></surname>
<given-names><![CDATA[Muhammad arif]]></given-names>
</name>
<name>
<surname><![CDATA[Shi]]></surname>
<given-names><![CDATA[Peng]]></given-names>
</name>
<name>
<surname><![CDATA[Ullah]]></surname>
<given-names><![CDATA[Ata]]></given-names>
</name>
<name>
<surname><![CDATA[Mahmood]]></surname>
<given-names><![CDATA[Khalid]]></given-names>
</name>
<name>
<surname><![CDATA[Abid]]></surname>
<given-names><![CDATA[Muhammad]]></given-names>
</name>
<name>
<surname><![CDATA[Luo]]></surname>
<given-names><![CDATA[Xiong]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Logical tree based secure rekeying management for smart devices groups in iot enabled wsn]]></article-title>
<source><![CDATA[IEEE Access]]></source>
<year>2019</year>
<volume>7</volume>
<page-range>76699-711</page-range></nlm-citation>
</ref>
<ref id="B42">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Musale]]></surname>
<given-names><![CDATA[Vinayak]]></given-names>
</name>
<name>
<surname><![CDATA[Chaudhari]]></surname>
<given-names><![CDATA[Devendra]]></given-names>
</name>
</person-group>
<source><![CDATA[Efficient and secure keying mechanism for communication in sen- sor networks]]></source>
<year>2019</year>
<conf-name><![CDATA[ International Conference on Intelligent Data Communication Technologies and Internet of Things]]></conf-name>
<conf-loc> </conf-loc>
<publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B43">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nemoz]]></surname>
<given-names><![CDATA[Tristan]]></given-names>
</name>
<name>
<surname><![CDATA[Amblard]]></surname>
<given-names><![CDATA[Zoe´]]></given-names>
</name>
<name>
<surname><![CDATA[Dupin]]></surname>
<given-names><![CDATA[Aure´lien]]></given-names>
</name>
</person-group>
<source><![CDATA[Characterizing the qind-qcpa (in) security of the cbc, cfb, ofb and ctr modes of operation]]></source>
<year>2022</year>
<publisher-name><![CDATA[Cryptology ePrint Archive]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B44">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Noura]]></surname>
<given-names><![CDATA[Hassan]]></given-names>
</name>
<name>
<surname><![CDATA[Chehab]]></surname>
<given-names><![CDATA[Ali]]></given-names>
</name>
<name>
<surname><![CDATA[Couturier]]></surname>
<given-names><![CDATA[Raphael]]></given-names>
</name>
</person-group>
<source><![CDATA[Lightweight dynamic key-dependent and flexible cipher scheme for iot devices]]></source>
<year>2019</year>
<conf-name><![CDATA[ 2019 IEEE Wireless Communications and Networking conference (WCNC)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1-8</page-range><publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B45">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Noura]]></surname>
<given-names><![CDATA[Hassan N]]></given-names>
</name>
<name>
<surname><![CDATA[Chehab]]></surname>
<given-names><![CDATA[Ali]]></given-names>
</name>
<name>
<surname><![CDATA[Couturier]]></surname>
<given-names><![CDATA[Raphael]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Efficient &amp; secure cipher scheme with dynamic key- dependent mode of operation]]></article-title>
<source><![CDATA[Signal processing: Image communication]]></source>
<year>2019</year>
<volume>78</volume>
<page-range>448-64</page-range></nlm-citation>
</ref>
<ref id="B46">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pen&#732;ate]]></surname>
<given-names><![CDATA[Adria´n Alfonso]]></given-names>
</name>
<name>
<surname><![CDATA[Echevarria]]></surname>
<given-names><![CDATA[Dayme Almeida]]></given-names>
</name>
<name>
<surname><![CDATA[Argud&#305;n]]></surname>
<given-names><![CDATA[Laura Castro]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Statistical assessment of two rekeying mechanisms applied to the generation of random numbers]]></article-title>
<source><![CDATA[Journal of Science and Technology on Information security]]></source>
<year>2020</year>
<volume>2</volume>
<numero>12</numero>
<issue>12</issue>
<page-range>38-44</page-range></nlm-citation>
</ref>
<ref id="B47">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Perusheska]]></surname>
<given-names><![CDATA[Milena Gjorgjievska]]></given-names>
</name>
<name>
<surname><![CDATA[Trpceska]]></surname>
<given-names><![CDATA[Hristina Mihajloska]]></given-names>
</name>
<name>
<surname><![CDATA[Dimitrova]]></surname>
<given-names><![CDATA[Vesna]]></given-names>
</name>
</person-group>
<source><![CDATA[Deep learning-based cryptoanalysis of different aes modes of operation]]></source>
<year>2002</year>
<conf-name><![CDATA[ Future of Information and Communication Confe- rence]]></conf-name>
<conf-loc> </conf-loc>
<page-range>675-93</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B48">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Popov]]></surname>
<given-names><![CDATA[Vladimir]]></given-names>
</name>
<name>
<surname><![CDATA[I]]></surname>
<given-names><![CDATA[Kurepkin]]></given-names>
</name>
<name>
<surname><![CDATA[S]]></surname>
<given-names><![CDATA[Leontiev]]></given-names>
</name>
</person-group>
<source><![CDATA[Additional cryptographic algorithms for use with gost 28147-89, gost r 34.10-94, gost r 34.10-2001, and gost r 34.11-94 algorithms]]></source>
<year>2006</year>
</nlm-citation>
</ref>
<ref id="B49">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[A John]]></surname>
<given-names><![CDATA[Prakash]]></given-names>
</name>
<name>
<surname><![CDATA[V Rhymend]]></surname>
<given-names><![CDATA[Uthariaraj]]></given-names>
</name>
<name>
<surname><![CDATA[B Lydia]]></surname>
<given-names><![CDATA[Elizabeth]]></given-names>
</name>
</person-group>
<source><![CDATA[Efficient key management protocol with pre- dictive rekeying for dynamic networks]]></source>
<year>2016</year>
<conf-name><![CDATA[ 2016 2nd International Conference on Green High Performance Computing (ICGHPC)]]></conf-name>
<conf-loc> </conf-loc>
<publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B50">
<nlm-citation citation-type="">
<collab>FIPS PUB</collab>
<source><![CDATA[Des modes of operation]]></source>
<year>1980</year>
</nlm-citation>
</ref>
<ref id="B51">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Qin]]></surname>
<given-names><![CDATA[Chuan]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[Jingwei]]></given-names>
</name>
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[Patrick PC]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The design and implementation of a rekeying-aware encrypted deduplication storage system]]></article-title>
<source><![CDATA[ACM Transactions on Storage (TOS)]]></source>
<year>2017</year>
<volume>13</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1-30</page-range></nlm-citation>
</ref>
<ref id="B52">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rogaway]]></surname>
<given-names><![CDATA[Phillip]]></given-names>
</name>
</person-group>
<source><![CDATA[Evaluation of some blockcipher modes of operation]]></source>
<year>2011</year>
<publisher-name><![CDATA[Cryptography Research and Evaluation Committees (CRYPTREC) for the Government of Japan]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B53">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rohit]]></surname>
<given-names><![CDATA[Raghvendra]]></given-names>
</name>
<name>
<surname><![CDATA[Sarkar]]></surname>
<given-names><![CDATA[Santanu]]></given-names>
</name>
</person-group>
<source><![CDATA[Cryptanalysis of reduced round speedy]]></source>
<year>2022</year>
<publisher-name><![CDATA[Cryptology ePrint Archive]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B54">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Suga]]></surname>
<given-names><![CDATA[Yuji]]></given-names>
</name>
</person-group>
<source><![CDATA[Satatus survey of ssl/tls sites in 2018 after pointing out about &#8221;search form¨&#305;ssues]]></source>
<year>2018</year>
<conf-name><![CDATA[ 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>483-5</page-range><publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B55">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tsypyschev]]></surname>
<given-names><![CDATA[Vadim]]></given-names>
</name>
<name>
<surname><![CDATA[Morgasov]]></surname>
<given-names><![CDATA[Iliya]]></given-names>
</name>
</person-group>
<source><![CDATA[Provable security of cfb mode of operation with external re-keying]]></source>
<year>2022</year>
<publisher-name><![CDATA[Cryptology ePrint Archive]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B56">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Vuppala]]></surname>
<given-names><![CDATA[Satyanarayana]]></given-names>
</name>
<name>
<surname><![CDATA[Mady]]></surname>
<given-names><![CDATA[Alie El-Din]]></given-names>
</name>
<name>
<surname><![CDATA[Kuenzi]]></surname>
<given-names><![CDATA[Adam]]></given-names>
</name>
</person-group>
<source><![CDATA[Rekeying-based moving target defence me- chanism for side-channel attacks]]></source>
<year>2019</year>
<conf-name><![CDATA[ 2019 Global IoT Summit (GIoTS)]]></conf-name>
<conf-loc> </conf-loc>
<publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B57">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yadav]]></surname>
<given-names><![CDATA[Tarun]]></given-names>
</name>
<name>
<surname><![CDATA[Kumar]]></surname>
<given-names><![CDATA[Manoj]]></given-names>
</name>
<name>
<surname><![CDATA[Kumar]]></surname>
<given-names><![CDATA[Amit]]></given-names>
</name>
<name>
<surname><![CDATA[Pal]]></surname>
<given-names><![CDATA[Saibal K]]></given-names>
</name>
</person-group>
<source><![CDATA[A pratical-quantum differential attack on block ciphers]]></source>
<year>2022</year>
<publisher-name><![CDATA[Cryptology ePrint Archive]]></publisher-name>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
