{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T16:36:22Z","timestamp":1755794182066,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031230974"},{"type":"electronic","value":"9783031230981"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-23098-1_4","type":"book-chapter","created":{"date-parts":[[2023,1,3]],"date-time":"2023-01-03T14:04:12Z","timestamp":1672754652000},"page":"55-67","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Differential Cryptanalysis of\u00a0Lightweight Block Ciphers SLIM and\u00a0LCB"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6069-4927","authenticated-orcid":false,"given":"Yen Yee","family":"Chan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3715-0451","authenticated-orcid":false,"given":"Cher-Yin","family":"Khor","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5571-4148","authenticated-orcid":false,"given":"Je Sen","family":"Teh","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2427-9945","authenticated-orcid":false,"given":"Wei Jian","family":"Teng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7363-1466","authenticated-orcid":false,"given":"Norziana","family":"Jamil","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,4]]},"reference":[{"key":"4_CR1","doi-asserted-by":"publisher","first-page":"203747","DOI":"10.1109\/ACCESS.2020.3036589","volume":"8","author":"B Aboushosha","year":"2020","unstructured":"Aboushosha, B., Ramadan, R.A., Dwivedi, A.D., El-Sayed, A., Dessouky, M.M.: SLIM: a lightweight block cipher for internet of health things. IEEE Access 8, 203747\u2013203757 (2020)","journal-title":"IEEE Access"},{"key":"4_CR2","doi-asserted-by":"publisher","first-page":"107418","DOI":"10.1016\/j.compeleceng.2021.107418","volume":"95","author":"MAF Al-Husainy","year":"2021","unstructured":"Al-Husainy, M.A.F., Al-Shargabi, B., Aljawarneh, S.: Lightweight cryptography system for IoT devices using DNA. Comput. Electr. Engi. 95, 107418 (2021)","journal-title":"Comput. Electr. Engi."},{"key":"4_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1007\/978-3-662-48800-3_17","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2015","author":"S Banik","year":"2015","unstructured":"Banik, S., et al.: Midori: a block cipher for low energy. In: Iwata, T., Cheon, J.H. (eds.) ASIACRYPT 2015. LNCS, vol. 9453, pp. 411\u2013436. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-48800-3_17"},{"key":"4_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/978-3-662-53008-5_5","volume-title":"Advances in Cryptology \u2013 CRYPTO 2016","author":"C Beierle","year":"2016","unstructured":"Beierle, C., et al.: The SKINNY family of block ciphers and its low-latency variant MANTIS. In: Robshaw, M., Katz, J. (eds.) CRYPTO 2016. LNCS, vol. 9815, pp. 123\u2013153. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53008-5_5"},{"key":"4_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1007\/978-3-540-74735-2_31","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"A Bogdanov","year":"2007","unstructured":"Bogdanov, A., et al.: PRESENT: an ultra-lightweight block cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 450\u2013466. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-74735-2_31"},{"key":"4_CR6","unstructured":"Burkhalter, M.: Recent data leak highlights the importance of IoT back-end security (2019). https:\/\/www.perle.com\/articles\/recent-data-leak-highlights-the-importance-of-iot-back-end-security-40185881.shtml"},{"key":"4_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1007\/978-3-642-04138-9_20","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2009","author":"C De Canni\u00e8re","year":"2009","unstructured":"De Canni\u00e8re, C., Dunkelman, O., Kne\u017eevi\u0107, M.: KATAN and KTANTAN \u2014 a family of small and efficient hardware-oriented block ciphers. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 272\u2013288. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-04138-9_20"},{"issue":"1","key":"4_CR8","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1007\/s10623-021-00970-9","volume":"90","author":"S Chen","year":"2022","unstructured":"Chen, S., et al.: SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations. Des. Codes Crypt. 90(1), 155\u2013198 (2022)","journal-title":"Des. Codes Crypt."},{"issue":"3","key":"4_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11704-020-0115-9","volume":"16","author":"J Feng","year":"2022","unstructured":"Feng, J., Li, L.: SCENERY: a lightweight block cipher based on Feistel structure. Front. Comp. Sci. 16(3), 1\u201310 (2022). https:\/\/doi.org\/10.1007\/s11704-020-0115-9","journal-title":"Front. Comp. Sci."},{"key":"4_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1007\/978-3-642-23951-9_22","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2011","author":"J Guo","year":"2011","unstructured":"Guo, J., Peyrin, T., Poschmann, A., Robshaw, M.: The LED block cipher. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 326\u2013341. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-23951-9_22"},{"issue":"16","key":"4_CR11","doi-asserted-by":"publisher","first-page":"13014","DOI":"10.1109\/JIOT.2021.3064203","volume":"8","author":"Y Guo","year":"2021","unstructured":"Guo, Y., Li, L., Liu, B.: Shadow: a lightweight block cipher for IoT nodes. IEEE Internet Things J. 8(16), 13014\u201313023 (2021)","journal-title":"IEEE Internet Things J."},{"key":"4_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1007\/3-540-44706-7_7","volume-title":"Fast Software Encryption","author":"LR Knudsen","year":"2001","unstructured":"Knudsen, L.R., Meier, W.: Correlations in RC6 with a reduced number of rounds. In: Goos, G., Hartmanis, J., van Leeuwen, J., Schneier, B. (eds.) FSE 2000. LNCS, vol. 1978, pp. 94\u2013108. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-44706-7_7"},{"issue":"11","key":"4_CR13","doi-asserted-by":"publisher","first-page":"4122","DOI":"10.3837\/tiis.2021.11.014","volume":"15","author":"S Roy","year":"2021","unstructured":"Roy, S., Roy, S., Biswas, A., Baishnab, K.: LCB: light cipher block an ultrafast lightweight block cipher for resource constrained IoT security applications. KSII Trans. Internet Inf. Syst. 15(11), 4122\u20134144 (2021). https:\/\/doi.org\/10.3837\/tiis.2021.11.014","journal-title":"KSII Trans. Internet Inf. Syst."},{"key":"4_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1007\/978-3-642-23951-9_23","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2011","author":"K Shibutani","year":"2011","unstructured":"Shibutani, K., Isobe, T., Hiwatari, H., Mitsuda, A., Akishita, T., Shirai, T.: Piccolo: an ultra-lightweight Blockcipher. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 342\u2013357. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-23951-9_23"},{"key":"4_CR15","unstructured":"Stefan K\u00f6lbl: CryptoSMT: an easy to use tool for cryptanalysis of symmetric primitives. https:\/\/github.com\/kste\/cryptosmt"},{"key":"4_CR16","first-page":"103129","volume":"66","author":"JS Teh","year":"2022","unstructured":"Teh, J.S., Tham, L.J., Jamil, N., Yap, W.S.: New differential cryptanalysis results for the lightweight block cipher BORON. J. Inf. Secur. Appl. 66, 103129 (2022)","journal-title":"J. Inf. Secur. Appl."},{"key":"4_CR17","series-title":"Lecture Notes in Electrical Engineering","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/978-981-15-0058-9_27","volume-title":"Computational Science and Technology","author":"W-Z Yeoh","year":"2020","unstructured":"Yeoh, W.-Z., Teh, J.S., Sazali, M.I.S.B.M.: $$\\upmu $$2\u202f: a lightweight block cipher. In: Alfred, R., Lim, Y., Haviluddin, H., On, C.K. (eds.) Computational Science and Technology. LNEE, vol. 603, pp. 281\u2013290. Springer, Singapore (2020). https:\/\/doi.org\/10.1007\/978-981-15-0058-9_27"}],"container-title":["Communications in Computer and Information Science","Emerging Information Security and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-23098-1_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,3]],"date-time":"2023-01-03T16:09:42Z","timestamp":1672762182000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-23098-1_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031230974","9783031230981"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-23098-1_4","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"4 January 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EISA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Emerging Information Security and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 October 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eisa2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eisa.compute.dtu.dk\/2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"35","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"13","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"37% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to COVID-19, EISA 2022 was held fully online.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}