{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T13:58:32Z","timestamp":1775829512572,"version":"3.50.1"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030842512","type":"print"},{"value":"9783030842529","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-84252-9_9","type":"book-chapter","created":{"date-parts":[[2021,8,10]],"date-time":"2021-08-10T23:04:26Z","timestamp":1628636666000},"page":"247-277","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":38,"title":["Differential-Linear Cryptanalysis from an Algebraic Perspective"],"prefix":"10.1007","author":[{"given":"Meicheng","family":"Liu","sequence":"first","affiliation":[]},{"given":"Xiaojuan","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Dongdai","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,11]]},"reference":[{"key":"9_CR1","unstructured":"Anderson, R., Biham, E., Knudsen, L.R.: Serpent: a proposal for the advanced encryption standard. NIST AES Proposal (1998). https:\/\/www.cl.cam.ac.uk\/~rja14\/Serpent.html"},{"key":"9_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/978-3-319-08344-5_3","volume-title":"Information Security and Privacy","author":"S Banik","year":"2014","unstructured":"Banik, S.: Some insights into differential cryptanalysis of Grain v1. In: Susilo, W., Mu, Y. (eds.) ACISP 2014. LNCS, vol. 8544, pp. 34\u201349. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-08344-5_3"},{"issue":"1","key":"9_CR3","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/s12095-015-0146-5","volume":"8","author":"S Banik","year":"2016","unstructured":"Banik, S.: Conditional differential cryptanalysis of 105 round Grain v1. Cryptograph. Commun. 8(1), 113\u2013137 (2016)","journal-title":"Cryptograph. Commun."},{"key":"9_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1007\/3-540-48329-2_17","volume-title":"Advances in Cryptology \u2014 CRYPTO 1993","author":"I Ben-Aroya","year":"1994","unstructured":"Ben-Aroya, I., Biham, E.: Differential cryptanalysis of Lucifer. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 187\u2013199. Springer, Heidelberg (1994). https:\/\/doi.org\/10.1007\/3-540-48329-2_17"},{"key":"9_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/3-540-45473-X_2","volume-title":"Fast Software Encryption","author":"E Biham","year":"2002","unstructured":"Biham, E., Dunkelman, O., Keller, N.: Linear cryptanalysis of reduced round Serpent. In: Matsui, M. (ed.) FSE 2001. LNCS, vol. 2355, pp. 16\u201327. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45473-X_2"},{"key":"9_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1007\/3-540-36178-2_16","volume-title":"Advances in Cryptology \u2014 ASIACRYPT 2002","author":"E Biham","year":"2002","unstructured":"Biham, E., Dunkelman, O., Keller, N.: Enhancing differential-linear cryptanalysis. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 254\u2013266. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-36178-2_16"},{"key":"9_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1007\/978-3-540-39887-5_2","volume-title":"Fast Software Encryption","author":"E Biham","year":"2003","unstructured":"Biham, E., Dunkelman, O., Keller, N.: Differential-linear cryptanalysis of Serpent. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 9\u201321. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-39887-5_2"},{"key":"9_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1007\/978-3-030-17653-2_11","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2019","author":"A Bar-On","year":"2019","unstructured":"Bar-On, A., Dunkelman, O., Keller, N., Weizman, A.: DLCT: a new tool for differential-linear cryptanalysis. In: Ishai, Y., Rijmen, V. (eds.) EUROCRYPT 2019. LNCS, vol. 11476, pp. 313\u2013342. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-17653-2_11"},{"key":"9_CR9","unstructured":"Bertoni, G., Daemen, J., Peeters, M.,Van Assche, G.: The Keccak reference. http:\/\/keccak.noekeon.org, January 2011. Version 3.0"},{"issue":"3","key":"9_CR10","doi-asserted-by":"publisher","first-page":"859","DOI":"10.1007\/s00145-016-9237-5","volume":"30","author":"C Blondeau","year":"2017","unstructured":"Blondeau, C., Leander, G., Nyberg, K.: Differential-linear cryptanalysis revisited. J. Cryptol. 30(3), 859\u2013888 (2017)","journal-title":"J. Cryptol."},{"key":"9_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/978-3-030-56877-1_12","volume-title":"Advances in Cryptology \u2013 CRYPTO 2020","author":"C Beierle","year":"2020","unstructured":"Beierle, C., Leander, G., Todo, Y.: Improved differential-linear attacks with applications to ARX ciphers. In: Micciancio, D., Ristenpart, T. (eds.) CRYPTO 2020. LNCS, vol. 12172, pp. 329\u2013358. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-56877-1_12"},{"issue":"3","key":"9_CR12","doi-asserted-by":"publisher","first-page":"215","DOI":"10.46586\/tosc.v2018.i3.215-264","volume":"2018","author":"E Biham","year":"2018","unstructured":"Biham, E., Perle, S.: Conditional linear cryptanalysis - cryptanalysis of DES with less than $$2^{42}$$ complexity. IACR Trans. Symmetric Cryptol. 2018(3), 215\u2013264 (2018)","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"9_CR13","unstructured":"Canteaut, A., et al.: On the differential-linear connectivity table of vectorial Boolean functions. CoRR, abs\/1908.07445 (2019)"},{"key":"9_CR14","first-page":"848","volume":"2019","author":"A Canteaut","year":"2019","unstructured":"Canteaut, A., K\u00f6lsch, L., Wiemer, F.: Observations on the DLCT and absolute indicators. IACR Cryptol. ePrint Arch. 2019, 848 (2019)","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"9_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1007\/978-3-319-16715-2_20","volume-title":"Topics in Cryptology \u2014 CT-RSA 2015","author":"C Dobraunig","year":"2015","unstructured":"Dobraunig, C., Eichlseder, M., Mendel, F., Schl\u00e4ffer, M.: Cryptanalysis of Ascon. In: Nyberg, K. (ed.) CT-RSA 2015. LNCS, vol. 9048, pp. 371\u2013387. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-16715-2_20"},{"key":"9_CR16","unstructured":"Dobraunig, C., Eichlseder, M., Mendel, F., Schl\u00e4ffer, M.: Ascon v1.2. Submission to the CAESAR Competition (2016)"},{"key":"9_CR17","unstructured":"Dobraunig, C., Eichlseder, M.,Mendel, F., Schl\u00e4ffer, M.: Ascon v1.2. Submission to the NIST Lightweight Cryptography competition (2019)"},{"key":"9_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1007\/978-3-540-89754-5_24","volume-title":"Progress in Cryptology - INDOCRYPT 2008","author":"O Dunkelman","year":"2008","unstructured":"Dunkelman, O., Indesteege, S., Keller, N.: A differential-linear attack on 12-round Serpent. In: Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. LNCS, vol. 5365, pp. 308\u2013321. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-89754-5_24"},{"key":"9_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/978-3-540-68351-3_14","volume-title":"New Stream Cipher Designs","author":"M Hell","year":"2008","unstructured":"Hell, M., Johansson, T., Maximov, A., Meier, W.: The Grain family of stream ciphers. In: Robshaw, M., Billet, O. (eds.) New Stream Cipher Designs. LNCS, vol. 4986, pp. 179\u2013190. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-68351-3_14"},{"key":"9_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/978-3-642-17373-8_8","volume-title":"Advances in Cryptology - ASIACRYPT 2010","author":"S Knellwolf","year":"2010","unstructured":"Knellwolf, S., Meier, W., Naya-Plasencia, M.: Conditional differential cryptanalysis of NLFSR-based cryptosystems. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 130\u2013145. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-17373-8_8"},{"issue":"1","key":"9_CR21","doi-asserted-by":"publisher","first-page":"175","DOI":"10.46586\/tosc.v2017.i1.175-202","volume":"2017","author":"Z Li","year":"2017","unstructured":"Li, Z., Dong, X., Wang, X.: Conditional cube attack on round-reduced ASCON. IACR Trans. Symmetric Cryptol. 2017(1), 175\u2013202 (2017)","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"9_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1007\/978-3-662-49890-3_14","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2016","author":"G Leurent","year":"2016","unstructured":"Leurent, G.: Improved differential-linear cryptanalysis of 7-round Chaskey with partitioning. In: Fischlin, M., Coron, J.-S. (eds.) EUROCRYPT 2016. LNCS, vol. 9665, pp. 344\u2013371. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-49890-3_14"},{"issue":"2","key":"9_CR23","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1049\/iet-ifs.2018.5180","volume":"13","author":"J-Z Li","year":"2019","unstructured":"Li, J.-Z., Guan, J.: Advanced conditional differential attack on Grain-like stream cipher and application on Grain v1. IET Informat. Secur. 13(2), 141\u2013148 (2019)","journal-title":"IET Informat. Secur."},{"key":"9_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-3-642-16342-5_3","volume-title":"Information Security and Cryptology","author":"Z Liu","year":"2010","unstructured":"Liu, Z., Gu, D., Zhang, J., Li, W.: Differential-multiple linear cryptanalysis. In: Bao, F., Yung, M., Lin, D., Jing, J. (eds.) Inscrypt 2009. LNCS, vol. 6151, pp. 35\u201349. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-16342-5_3"},{"key":"9_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/3-540-48658-5_3","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201994","author":"SK Langford","year":"1994","unstructured":"Langford, S.K., Hellman, M.E.: Differential-linear cryptanalysis. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 17\u201325. Springer, Heidelberg (1994). https:\/\/doi.org\/10.1007\/3-540-48658-5_3"},{"key":"9_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/s10623-014-9985-x","volume-title":"Fast Software Encryption","author":"J Lu","year":"2012","unstructured":"Lu, J.: A methodology for differential-linear cryptanalysis and its applications - (extended abstract). In: Canteaut, A. (ed.) FSE 2012. LNCS, vol. 7549, pp. 69\u201389. (2012). https:\/\/doi.org\/10.1007\/s10623-014-9985-x"},{"issue":"1","key":"9_CR27","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/s10623-014-9985-x","volume":"77","author":"L Jiqiang","year":"2015","unstructured":"Jiqiang, L.: A methodology for differential-linear cryptanalysis and its applications. Des. Codes Cryptogr. 77(1), 11\u201348 (2015)","journal-title":"Des. Codes Cryptogr."},{"issue":"1","key":"9_CR28","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1049\/iet-ifs.2015.0427","volume":"11","author":"Z Ma","year":"2017","unstructured":"Ma, Z., Tian, T., Qi, W.-F.: Improved conditional differential attacks on Grain v1. IET Informat. Secur. 11(1), 46\u201353 (2017)","journal-title":"IET Informat. Secur."},{"key":"9_CR29","doi-asserted-by":"crossref","unstructured":"Sel\u00e7uk, A.A.: On probability of success in linear and differential cryptanalysis. J. Cryptology 21(1), 131\u2013147 (2008)","DOI":"10.1007\/s00145-007-9013-7"},{"key":"9_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/978-3-319-96881-0_5","volume-title":"Advances in Cryptology \u2013 CRYPTO 2018","author":"Y Todo","year":"2018","unstructured":"Todo, Y., Isobe, T., Meier, W., Aoki, K., Zhang, B.: Fast correlation attack revisited - cryptanalysis on full Grain-128a, Grain-128, and Grain-v1. In: Shacham, H., Boldyreva, A. (eds.) CRYPTO 2018. LNCS, Part II, vol. 10992, pp. 129\u2013159. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-96881-0_5"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 CRYPTO 2021"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-84252-9_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,11]],"date-time":"2024-08-11T00:08:26Z","timestamp":1723334906000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-84252-9_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030842512","9783030842529"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-84252-9_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"11 August 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CRYPTO","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Annual International Cryptology Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 August 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 August 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"41","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"crypto2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/crypto.iacr.org\/2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"HotCRP","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"426","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"103","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20.9","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1 invited paper is also included.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}