I Dinur, A Shamir - Cryptology ePrint Archive, 2009 - eprint.iacr.org
… the notion of leakage attacks on iterated block ciphers, in which the … attacks seem to be
an ideal generic key recovery technique in these situations. However, the original cube attack …