{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T17:36:12Z","timestamp":1760204172847},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540333548"},{"type":"electronic","value":"9783540333555"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11734727_20","type":"book-chapter","created":{"date-parts":[[2006,7,10]],"date-time":"2006-07-10T11:57:27Z","timestamp":1152532647000},"page":"229-241","source":"Crossref","is-referenced-by-count":12,"title":["Integral Cryptanalysis of Reduced FOX Block Cipher"],"prefix":"10.1007","author":[{"given":"Wenling","family":"Wu","sequence":"first","affiliation":[]},{"given":"Wentao","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Dengguo","family":"Feng","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1007\/3-540-36178-2_16","volume-title":"Advances in Cryptology - ASIACRYPT 2002","author":"E. Biham","year":"2002","unstructured":"Biham, E., Biryukov, A., Shamir, A.: Enhancing differential-linear cryptanalysis. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol.\u00a02501, pp. 254\u2013266. Springer, Heidelberg (2002)"},{"key":"20_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1007\/3-540-44987-6_21","volume-title":"Advances in Cryptology - EUROCRYPT 2001","author":"E. Biham","year":"2001","unstructured":"Biham, E., Dunkelman, O., Keller, N.: The rectangle attack - rectangling the Serpent. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.\u00a02045, pp. 340\u2013357. Springer, Heidelberg (2001)"},{"key":"20_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1007\/3-540-48910-X_2","volume-title":"Advances in Cryptology - EUROCRYPT \u201999","author":"E. Biham","year":"1999","unstructured":"Biham, E., Biryukov, A., Shamir, A.: Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol.\u00a01592, pp. 12\u201323. Springer, Heidelberg (1999)"},{"key":"20_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/3-540-48519-8_18","volume-title":"Fast Software Encryption","author":"A. Biryukov","year":"1999","unstructured":"Biryukov, A., Wagner, D.: Slide attacks. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol.\u00a01636, pp. 245\u2013259. Springer, Heidelberg (1999)"},{"key":"20_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"589","DOI":"10.1007\/3-540-45539-6_41","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"A. Biryukov","year":"2000","unstructured":"Biryukov, A., Wagner, D.: Advanced slide attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 589\u2013606. Springer, Heidelberg (2000)"},{"key":"20_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/3-540-36178-2_17","volume-title":"Advances in Cryptology - ASIACRYPT 2002","author":"N. Courtois","year":"2002","unstructured":"Courtois, N., Pieprzyk, J.: Cryptanalysis of block ciphers with overdefined systems of equations. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol.\u00a02501, pp. 267\u2013287. Springer, Heidelberg (2002)"},{"key":"20_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/BFb0052331","volume-title":"Fast Software Encryption","author":"C. Harpes","year":"1997","unstructured":"Harpes, C., Massey, J.: Partitioning cryptanalysis. In: Biham, E. (ed.) FSE 1997. LNCS, vol.\u00a01267, pp. 13\u201327. Springer, Heidelberg (1997)"},{"doi-asserted-by":"crossref","unstructured":"Hu, Y., Zhang, Y., Xiao, G.: Integral cryptanalysis of SAFER++. Electronics Letters\u00a035(17), 1458\u20131459","key":"20_CR8","DOI":"10.1049\/el:19990979"},{"key":"20_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/978-3-540-30564-4_8","volume-title":"Selected Areas in Cryptography","author":"P. Junod","year":"2004","unstructured":"Junod, P., Vaudenay, S.: FOX: a new family of block ciphers. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol.\u00a03357, pp. 114\u2013129. Springer, Heidelberg (2004), http:\/\/crypto.junod.info"},{"key":"20_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/978-3-540-30564-4_6","volume-title":"Selected Areas in Cryptography","author":"P. Junod","year":"2005","unstructured":"Junod, P., Vaudenay, S.: Perfect diffusion primitives for block ciphers\u2014building efficient MDS matrices. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol.\u00a03357, pp. 84\u201399. Springer, Heidelberg (2005)"},{"key":"20_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1007\/BFb0052332","volume-title":"Fast Software Encryption","author":"T. Jakobsen","year":"1997","unstructured":"Jakobsen, T., Knudsen, L.: The interpolation attack against block ciphers. In: Biham, E. (ed.) FSE 1997. LNCS, vol.\u00a01267, pp. 28\u201340. Springer, Heidelberg (1997)"},{"key":"20_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1007\/3-540-60590-8_16","volume-title":"Fast Software Encryption-FSE 1995","author":"L. Knudsen","year":"1995","unstructured":"Knudsen, L.: Truncated and higher order differentials. In: Fast Software Encryption-FSE 1995. LNCS, vol.\u00a02595, pp. 196\u2013211. Springer, Heidelberg (1995)"},{"key":"20_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1007\/3-540-45661-9_9","volume-title":"Fast Software Encryption","author":"L. Knudsen","year":"2002","unstructured":"Knudsen, L., Wagner, D.: Integral cryptanalysis (extended abstract). In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol.\u00a02365, pp. 112\u2013127. Springer, Heidelberg (2002)"},{"key":"20_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1007\/3-540-46877-3_35","volume-title":"Advances in Cryptology - EUROCRYPT \u201990","author":"X. Lai","year":"1991","unstructured":"Lai, X., Massey, J.: A proposal for a new block encryption standard. In: Damg\u00e5rd, I.B. (ed.) EUROCRYPT 1990. LNCS, vol.\u00a0473, pp. 389\u2013404. Springer, Heidelberg (1991)"},{"doi-asserted-by":"crossref","unstructured":"Luby, M., Rackoff, C.: How to construct pseudorandom permutations from pseudorandom functions. SIAM Journal on Computing\u00a017(2), 373\u2013386","key":"20_CR15","DOI":"10.1137\/0217022"},{"key":"20_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1007\/3-540-48658-5_3","volume-title":"Advances in Cryptology - CRYPTO 1994","author":"K. Lanford","year":"1994","unstructured":"Lanford, K., Hellman, E.: Differential-linear cryptanalysis. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol.\u00a0839, pp. 17\u201325. Springer, Heidelberg (1994)"},{"unstructured":"Minier, M.: An integral cryptanalysis against a five rounds version of FOX. In: Western European Workshop on Research in Cryptography-WEWoRC, July 5-7, Leuven, Belgium (2005)","key":"20_CR17"},{"doi-asserted-by":"crossref","unstructured":"Murphy, S., Robshaw, M.: Comments on the security of the AES and the XSL technique. Electronic Letters\u00a039(1), 36\u201338","key":"20_CR18","DOI":"10.1049\/el:20030015"},{"key":"20_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1007\/978-3-540-48000-6_2","volume-title":"Advances in Cryptology - ASIACRYPT 1999","author":"S. Vaudenay","year":"1999","unstructured":"Vaudenay, S.: On the Lai-Massey scheme. In: Lam, K.-Y., Okamoto, E., Xing, C. (eds.) ASIACRYPT 1999. LNCS, vol.\u00a01716, pp. 8\u201319. Springer, Heidelberg (1999)"},{"key":"20_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/3-540-48519-8_12","volume-title":"Fast Software Encryption","author":"D. Wagner","year":"1999","unstructured":"Wagner, D.: The boomerang attack. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol.\u00a01636, pp. 157\u2013170. Springer, Heidelberg (1999)"},{"key":"20_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1007\/3-540-36159-6_38","volume-title":"Information and Communications Security","author":"H. Wu","year":"2002","unstructured":"Wu, H.: Related-cipher attacks. In: Deng, R.H., Qing, S., Bao, F., Zhou, J. (eds.) ICICS 2002. LNCS, vol.\u00a02513, pp. 447\u2013455. Springer, Heidelberg (2002)"},{"key":"20_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"256","DOI":"10.1007\/11535409","volume-title":"Selected Areas in Cryptography","author":"W. Wu","year":"2005","unstructured":"Wu, W., Feng, D., Chen, H.: Collision attack and pseudorandomness of reduced-round Camellia. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol.\u00a03357, pp. 256\u2013270. Springer, Heidelberg (2005)"},{"key":"20_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/3-540-45661-9_7","volume-title":"Fast Software Encryption","author":"Y. Yeom","year":"2002","unstructured":"Yeom, Y., Park, S., Kim, I.: On the security of Camellia against the square attack. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol.\u00a02365, pp. 89\u201399. Springer, Heidelberg (2002)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology - ICISC 2005"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11734727_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,19]],"date-time":"2019-04-19T19:12:10Z","timestamp":1555701130000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11734727_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540333548","9783540333555"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/11734727_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}