{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T00:08:57Z","timestamp":1769299737410,"version":"3.49.0"},"publisher-location":"Cham","reference-count":45,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031158018","type":"print"},{"value":"9783031158025","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-15802-5_1","type":"book-chapter","created":{"date-parts":[[2022,10,11]],"date-time":"2022-10-11T16:59:52Z","timestamp":1665507592000},"page":"3-32","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["Rotational Differential-Linear Distinguishers of ARX Ciphers with Arbitrary Output Linear Masks"],"prefix":"10.1007","author":[{"given":"Zhongfeng","family":"Niu","sequence":"first","affiliation":[]},{"given":"Siwei","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Yunwen","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Chao","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,12]]},"reference":[{"key":"1_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1007\/978-3-662-46706-0_27","volume-title":"Fast Software Encryption","author":"F Abed","year":"2015","unstructured":"Abed, F., List, E., Lucks, S., Wenzel, J.: Differential cryptanalysis of round-reduced Simon and Speck. In: Cid, C., Rechberger, C. (eds.) FSE 2014. LNCS, vol. 8540, pp. 525\u2013545. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-46706-0_27"},{"issue":"1","key":"1_CR2","doi-asserted-by":"publisher","first-page":"57","DOI":"10.46586\/tosc.v2016.i1.57-70","volume":"2016","author":"T Ashur","year":"2016","unstructured":"Ashur, T., Liu, Y.: Rotational cryptanalysis in the presence of constants. IACR Trans. Symmetric Cryptol. 2016(1), 57\u201370 (2016)","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"1_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1007\/978-3-642-34931-7_28","volume-title":"Progress in Cryptology - INDOCRYPT 2012","author":"J-P Aumasson","year":"2012","unstructured":"Aumasson, J.-P., Bernstein, D.J.: SipHash: a fast short-input PRF. In: Galbraith, S., Nandi, M. (eds.) INDOCRYPT 2012. LNCS, vol. 7668, pp. 489\u2013508. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-34931-7_28"},{"key":"1_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"470","DOI":"10.1007\/978-3-540-71039-4_30","volume-title":"Fast Software Encryption","author":"J-P Aumasson","year":"2008","unstructured":"Aumasson, J.-P., Fischer, S., Khazaei, S., Meier, W., Rechberger, C.: New features of Latin dances: analysis of Salsa, ChaCha, and Rumba. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 470\u2013488. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-71039-4_30"},{"key":"1_CR5","unstructured":"Aumasson, J.-P., Henzen, L., Meier, W., Phan, R.C.-W.: SHA-3 proposal BLAKE. Submission to NIST (2010)"},{"key":"1_CR6","unstructured":"Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., Wingers, L.: The SIMON and SPECK families of lightweight block ciphers. IACR Cryptology ePrint Archive, p. 404 (2013)"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Beierle, C., et al.: Alzette: a 64-bit ARX-box - (Feat. CRAX and TRAX). In: Advances in Cryptology - CRYPTO 2020\u201340th Annual International Cryptology Conference, CRYPTO 2020, 17\u201321 August 2020, Proceedings, Part III, pp. 419\u2013448 (2020)","DOI":"10.1007\/978-3-030-56877-1_15"},{"issue":"S1","key":"1_CR8","doi-asserted-by":"publisher","first-page":"208","DOI":"10.46586\/tosc.v2020.iS1.208-261","volume":"2020","author":"C Beierle","year":"2020","unstructured":"Beierle, C., et al.: Lightweight AEAD and hashing using the SPARKLE permutation family. IACR Trans. Symmetric Cryptol. 2020(S1), 208\u2013261 (2020)","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"1_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/978-3-030-56877-1_12","volume-title":"Advances in Cryptology \u2013 CRYPTO 2020","author":"C Beierle","year":"2020","unstructured":"Beierle, C., Leander, G., Todo, Y.: Improved differential-linear attacks with applications to ARX ciphers. In: Micciancio, D., Ristenpart, T. (eds.) CRYPTO 2020, Part III. LNCS, vol. 12172, pp. 329\u2013358. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-56877-1_12"},{"key":"1_CR10","unstructured":"Bernstein, D.J.: ChaCha, a variant of Salsa20. In: Workshop Record of SASC, vol. 8, pp. 3\u20135 (2008)"},{"key":"1_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/978-3-540-68351-3_8","volume-title":"New Stream Cipher Designs","author":"DJ Bernstein","year":"2008","unstructured":"Bernstein, D.J.: The Salsa20 family of stream ciphers. In: Robshaw, M., Billet, O. (eds.) New Stream Cipher Designs. LNCS, vol. 4986, pp. 84\u201397. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-68351-3_8"},{"key":"1_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/978-3-319-04852-9_12","volume-title":"Topics in Cryptology \u2013 CT-RSA 2014","author":"A Biryukov","year":"2014","unstructured":"Biryukov, A., Velichkov, V.: Automatic search for differential trails in ARX ciphers. In: Benaloh, J. (ed.) CT-RSA 2014. LNCS, vol. 8366, pp. 227\u2013250. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-04852-9_12"},{"key":"1_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/978-3-662-52993-5_15","volume-title":"Fast Software Encryption","author":"A Biryukov","year":"2016","unstructured":"Biryukov, A., Velichkov, V., Le Corre, Y.: Automatic search for the best trails in ARX: application to block cipher Speck. In: Peyrin, T. (ed.) FSE 2016. LNCS, vol. 9783, pp. 289\u2013310. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-52993-5_15"},{"issue":"2","key":"1_CR14","first-page":"261","volume":"2016","author":"AR Choudhuri","year":"2016","unstructured":"Choudhuri, A.R., Maitra, S.: Significantly improved multi-bit differentials for reduced round Salsa and ChaCha. IACR Trans. Symmetric Cryptol. 2016(2), 261\u2013287 (2016)","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"1_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"711","DOI":"10.1007\/978-3-030-77870-5_25","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2021","author":"M Coutinho","year":"2021","unstructured":"Coutinho, M., Souza Neto, T.C.: Improved linear approximations to ARX ciphers and attacks against ChaCha. In: Canteaut, A., Standaert, F.-X. (eds.) EUROCRYPT 2021, Part I. LNCS, vol. 12696, pp. 711\u2013740. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-77870-5_25"},{"key":"1_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1007\/3-540-60590-8_29","volume-title":"Fast Software Encryption","author":"DJ Wheeler","year":"1995","unstructured":"Wheeler, D.J., Needham, R.M.: TEA, a tiny encryption algorithm. In: Preneel, B. (ed.) FSE 1994. LNCS, vol. 1008, pp. 363\u2013366. Springer, Heidelberg (1995). https:\/\/doi.org\/10.1007\/3-540-60590-8_29"},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Dey, S., Dey, C., Sarkar, S., Meier, W.: Revisiting cryptanalysis on ChaCha from Crypto 2020 and Eurocrypt 2021. IACR Cryptology ePrint Archive, p. 1059 (2021)","DOI":"10.1109\/TIT.2022.3171865"},{"issue":"3","key":"1_CR18","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/s13389-018-0193-x","volume":"9","author":"D Dinu","year":"2019","unstructured":"Dinu, D., Le Corre, Y., Khovratovich, D., Perrin, L., Gro\u00dfsch\u00e4dl, J., Biryukov, A.: Triathlon of lightweight block ciphers for the Internet of things. J. Cryptogr. Eng. 9(3), 283\u2013302 (2019)","journal-title":"J. Cryptogr. Eng."},{"key":"1_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"484","DOI":"10.1007\/978-3-662-53887-6_18","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2016","author":"D Dinu","year":"2016","unstructured":"Dinu, D., Perrin, L., Udovenko, A., Velichkov, V., Gro\u00dfsch\u00e4dl, J., Biryukov, A.: Design strategies for ARX with provable bounds: Sparx and LAX. In: Cheon, J.H., Takagi, T. (eds.) ASIACRYPT 2016, Part I. LNCS, vol. 10031, pp. 484\u2013513. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53887-6_18"},{"key":"1_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/978-3-319-13051-4_10","volume-title":"Selected Areas in Cryptography \u2013 SAC 2014","author":"C Dobraunig","year":"2014","unstructured":"Dobraunig, C., Mendel, F., Schl\u00e4ffer, M.: Differential cryptanalysis of SipHash. In: Joux, A., Youssef, A. (eds.) SAC 2014. LNCS, vol. 8781, pp. 165\u2013182. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-13051-4_10"},{"key":"1_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/978-3-030-23696-0_14","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2019","author":"M ElSheikh","year":"2019","unstructured":"ElSheikh, M., Abdelkhalek, A., Youssef, A.M.: On MILP-based automatic search for differential trails through modular additions with application to Bel-T. In: Buchmann, J., Nitaj, A., Rachidi, T. (eds.) AFRICACRYPT 2019. LNCS, vol. 11627, pp. 273\u2013296. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-23696-0_14"},{"key":"1_CR22","unstructured":"Ferguson, N., et al.: The Skein Hash Function Family. Submission to NIST (2010)"},{"key":"1_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1007\/978-3-662-52993-5_14","volume-title":"Fast Software Encryption","author":"K Fu","year":"2016","unstructured":"Fu, K., Wang, M., Guo, Y., Sun, S., Hu, L.: MILP-based automatic search algorithms for differential and linear trails for Speck. In: Peyrin, T. (ed.) FSE 2016. LNCS, vol. 9783, pp. 268\u2013288. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-52993-5_14"},{"key":"1_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-05149-9_1","volume-title":"Information Security Applications","author":"D Hong","year":"2014","unstructured":"Hong, D., Lee, J.-K., Kim, D.-C., Kwon, D., Ryu, K.H., Lee, D.-G.: LEA: a 128-bit block cipher for fast encryption on common processors. In: Kim, Y., Lee, H., Perrig, A. (eds.) WISA 2013. LNCS, vol. 8267, pp. 3\u201327. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-05149-9_1"},{"key":"1_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1007\/11894063_4","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2006","author":"D Hong","year":"2006","unstructured":"Hong, D., et al.: HIGHT: a new block cipher suitable for low-resource device. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 46\u201359. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11894063_4"},{"key":"1_CR26","doi-asserted-by":"crossref","unstructured":"Kim, D., Kwon, D., Song, J.: Efficient computation of boomerang connection probability for ARX-based block ciphers with application to SPECK and LEA. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A(4), 677\u2013685 (2020)","DOI":"10.1587\/transfun.2019EAP1083"},{"key":"1_CR27","unstructured":"Leurent, G.: https:\/\/who.paris.inria.fr\/Gaetan.Leurent\/arxtools.html"},{"key":"1_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1007\/978-3-642-34961-4_15","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2012","author":"G Leurent","year":"2012","unstructured":"Leurent, G.: Analysis of differential attacks in ARX constructions. In: Wang, X., Sako, K. (eds.) ASIACRYPT 2012. LNCS, vol. 7658, pp. 226\u2013243. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-34961-4_15"},{"key":"1_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/978-3-642-40041-4_14","volume-title":"Advances in Cryptology \u2013 CRYPTO 2013","author":"G Leurent","year":"2013","unstructured":"Leurent, G.: Construction of differential characteristics in ARX designs application to Skein. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part I. LNCS, vol. 8042, pp. 241\u2013258. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40041-4_14"},{"key":"1_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1007\/978-3-662-49890-3_14","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2016","author":"G Leurent","year":"2016","unstructured":"Leurent, G.: Improved differential-linear cryptanalysis of 7-Round Chaskey with partitioning. In: Fischlin, M., Coron, J.-S. (eds.) EUROCRYPT 2016, Part I. LNCS, vol. 9665, pp. 344\u2013371. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-49890-3_14"},{"key":"1_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1007\/3-540-45473-X_28","volume-title":"Fast Software Encryption","author":"H Lipmaa","year":"2002","unstructured":"Lipmaa, H., Moriai, S.: Efficient algorithms for computing differential properties of addition. In: Matsui, M. (ed.) FSE 2001. LNCS, vol. 2355, pp. 336\u2013350. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45473-X_28"},{"key":"1_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"741","DOI":"10.1007\/978-3-030-77870-5_26","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2021","author":"Y Liu","year":"2021","unstructured":"Liu, Y., Sun, S., Li, C.: Rotational cryptanalysis from\u00a0a\u00a0differential-linear perspective. In: Canteaut, A., Standaert, F.-X. (eds.) EUROCRYPT 2021, Part I. LNCS, vol. 12696, pp. 741\u2013770. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-77870-5_26"},{"issue":"3","key":"1_CR33","doi-asserted-by":"publisher","first-page":"24","DOI":"10.46586\/tosc.v2017.i3.24-36","volume":"2017","author":"Y Liu","year":"2017","unstructured":"Liu, Y., De Witte, G., Ranea, A., Ashur, T.: Rotational-XOR cryptanalysis of reduced-round SPECK. IACR Trans. Symmetric Cryptol. 2017(3), 24\u201336 (2017)","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"1_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/978-3-662-43933-3_13","volume-title":"Fast Software Encryption","author":"P Morawiecki","year":"2014","unstructured":"Morawiecki, P., Pieprzyk, J., Srebrny, M.: Rotational cryptanalysis of round-reduced Keccak. In: Moriai, S. (ed.) FSE 2013. LNCS, vol. 8424, pp. 241\u2013262. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-43933-3_13"},{"key":"1_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1007\/978-3-319-13051-4_19","volume-title":"Selected Areas in Cryptography \u2013 SAC 2014","author":"N Mouha","year":"2014","unstructured":"Mouha, N., Mennink, B., Van Herrewege, A., Watanabe, D., Preneel, B., Verbauwhede, I.: Chaskey: an efficient MAC algorithm for 32-bit microcontrollers. In: Joux, A., Youssef, A. (eds.) SAC 2014. LNCS, vol. 8781, pp. 306\u2013323. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-13051-4_19"},{"key":"1_CR36","unstructured":"Mouha, N., Preneel, B.: Towards finding optimal differential characteristics for ARX: application to Salsa20. Cryptology ePrint Archive, Report 2013\/328 (2013). https:\/\/ia.cr\/2013\/328"},{"key":"1_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/978-3-642-19574-7_3","volume-title":"Selected Areas in Cryptography","author":"N Mouha","year":"2011","unstructured":"Mouha, N., Velichkov, V., De Canni\u00e8re, C., Preneel, B.: The differential analysis of S-functions. In: Biryukov, A., Gong, G., Stinson, D.R. (eds.) SAC 2010. LNCS, vol. 6544, pp. 36\u201356. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-19574-7_3"},{"key":"1_CR38","unstructured":"National Institute of Standards and Technology. Preliminary state standard of republic of Belarus (STBP 34.101.312011) (2011). https:\/\/apmi.bsu.by\/assets\/files\/std\/belt-spec27.pdf"},{"key":"1_CR39","doi-asserted-by":"crossref","unstructured":"Niu, Z., Sun, S., Liu, Y., Li, C.: Rotational differential-linear distinguishers of ARX ciphers with arbitrary output linear masks (2022). https:\/\/eprint.iacr.org\/2022\/765","DOI":"10.1007\/978-3-031-15802-5_1"},{"key":"1_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/11799313_10","volume-title":"Fast Software Encryption","author":"K Nyberg","year":"2006","unstructured":"Nyberg, K., Wall\u00e9n, J.: Improved linear distinguishers for SNOW 2.0. In: Robshaw, M. (ed.) FSE 2006. LNCS, vol. 4047, pp. 144\u2013162. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11799313_10"},{"key":"1_CR41","unstructured":"Needham, R.M., Wheeler, D.J.: TEA extensions. Report, Cambridge University (1997)"},{"key":"1_CR42","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/3-540-39118-5_24","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 1987","author":"A Shimizu","year":"1988","unstructured":"Shimizu, A., Miyaguchi, S.: Fast data encipherment algorithm FEAL. In: Chaum, D., Price, W.L. (eds.) EUROCRYPT 1987. LNCS, vol. 304, pp. 267\u2013278. Springer, Heidelberg (1988). https:\/\/doi.org\/10.1007\/3-540-39118-5_24"},{"key":"1_CR43","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1007\/978-3-319-40367-0_24","volume-title":"Information Security and Privacy","author":"L Song","year":"2016","unstructured":"Song, L., Huang, Z., Yang, Q.: Automatic differential analysis of ARX block ciphers with application to SPECK and LEA. In: Liu, J.K., Steinfeld, R. (eds.) ACISP 2016, Part II. LNCS, vol. 9723, pp. 379\u2013394. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-40367-0_24"},{"key":"1_CR44","doi-asserted-by":"publisher","unstructured":"Wall\u00e9n, Johan: Linear approximations of addition modulo 2n. In: Johansson, Thomas (ed.) FSE 2003. LNCS, vol. 2887, pp. 261\u2013273. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-39887-5_20","DOI":"10.1007\/978-3-540-39887-5_20"},{"key":"1_CR45","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1007\/978-3-030-88052-1_12","volume-title":"Information and Communications Security","author":"Y Xu","year":"2021","unstructured":"Xu, Y., Wu, B., Lin, D.: Rotational-linear attack: a new framework of cryptanalysis on ARX ciphers with applications to Chaskey. In: Gao, D., Li, Q., Guan, X., Liao, X. (eds.) ICICS 2021, Part II. LNCS, vol. 12919, pp. 192\u2013209. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-88052-1_12"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 CRYPTO 2022"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-15802-5_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T22:06:43Z","timestamp":1760134003000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-15802-5_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031158018","9783031158025"],"references-count":45,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-15802-5_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"12 October 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CRYPTO","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Annual International Cryptology Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Santa Barbara, CA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 August 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 August 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"42","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"crypto2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/crypto.iacr.org\/2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}