{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T23:19:28Z","timestamp":1773962368594,"version":"3.50.1"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031334870","type":"print"},{"value":"9783031334887","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-33488-7_5","type":"book-chapter","created":{"date-parts":[[2023,5,28]],"date-time":"2023-05-28T16:01:43Z","timestamp":1685289703000},"page":"119-148","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["A Novel Automatic Technique Based on\u00a0MILP to\u00a0Search for\u00a0Impossible Differentials"],"prefix":"10.1007","author":[{"given":"Yong","family":"Liu","sequence":"first","affiliation":[]},{"given":"Zejun","family":"Xiang","sequence":"additional","affiliation":[]},{"given":"Siwei","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Shasha","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xiangyong","family":"Zeng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,29]]},"reference":[{"key":"5_CR1","doi-asserted-by":"publisher","unstructured":"Banik, S., et al.: Midori: A block cipher for low energy. In: Iwata, T., Cheon, J.H. (eds.) Advances in Cryptology - ASIACRYPT 2015\u201321st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part II. Lecture Notes in Computer Science, vol. 9453, pp. 411\u2013436. Springer (2015), https:\/\/doi.org\/10.1007\/978-3-662-48800-3_17","DOI":"10.1007\/978-3-662-48800-3_17"},{"key":"5_CR2","doi-asserted-by":"publisher","unstructured":"Beierle, C., et al.: The SKINNY family of block ciphers and its low-latency variant MANTIS. In: Robshaw, M., Katz, J. (eds.) Advances in Cryptology - CRYPTO 2016\u201336th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14\u201318, 2016, Proceedings, Part II. Lecture Notes in Computer Science, vol. 9815, pp. 123\u2013153. Springer (2016) https:\/\/doi.org\/10.1007\/978-3-662-53008-5_5","DOI":"10.1007\/978-3-662-53008-5_5"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Beierle, C., Leander, G., Moradi, A., Rasoolzadeh, S.: CRAFT: lightweight tweakable block cipher with efficient protection against DFA attacks. IACR Trans. Symmetric Cryptol. 2019(1), 5\u201345 (2019), https:\/\/doi.org\/10.13154\/tosc.v2019.i1.5-45","DOI":"10.46586\/tosc.v2019.i1.5-45"},{"key":"5_CR4","doi-asserted-by":"publisher","unstructured":"Biham, E., Biryukov, A., Shamir, A.: Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials. In: Stern, J. (ed.) Advances in Cryptology - EUROCRYPT \u201999, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2\u20136, 1999, Proceeding. Lecture Notes in Computer Science, vol. 1592, pp. 12\u201323. Springer (1999), https:\/\/doi.org\/10.1007\/3-540-48910-X_2","DOI":"10.1007\/3-540-48910-X_2"},{"key":"5_CR5","doi-asserted-by":"publisher","unstructured":"Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. In: Menezes, A., Vanstone, S.A. (eds.) Advances in Cryptology - CRYPTO \u201990, 10th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11\u201315, 1990, Proceedings. Lecture Notes in Computer Science, vol. 537, pp. 2\u201321. Springer (1990), https:\/\/doi.org\/10.1007\/3-540-38424-3_1","DOI":"10.1007\/3-540-38424-3_1"},{"key":"5_CR6","doi-asserted-by":"publisher","unstructured":"Biryukov, A.: Miss-in-the-middle attack. In: van Tilborg, H.C.A. (ed.) Encyclopedia of Cryptography and Security. Springer (2005). https:\/\/doi.org\/10.1007\/0-387-23483-7_256","DOI":"10.1007\/0-387-23483-7_256"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Chen, Z., Wang, X.Y.: Impossible differential cryptanalysis of Midori. IACR Cryptol. ePrint Arch. p. 535 (2016), http:\/\/eprint.iacr.org\/2016\/535, withdrawn","DOI":"10.1142\/9789813208537_0028"},{"key":"5_CR8","unstructured":"Cui, T., Jia, K., Fu, K., Chen, S., Wang, M.: New automatic search tool for impossible differentials and zero-correlation linear approximations. IACR Cryptol. ePrint Arch. p. 689 (2016), http:\/\/eprint.iacr.org\/2016\/689"},{"key":"5_CR9","unstructured":"Hu, K., Peyrin, T., Wang, M.: Finding all impossible differentials when considering the DDT. Cryptology ePrint Archive, Paper 2022\/1034 (2022), https:\/\/eprint.iacr.org\/2022\/1034"},{"key":"5_CR10","doi-asserted-by":"publisher","unstructured":"Kim, J., Hong, S., Sung, J., Lee, C., Lee, S.: Impossible differential cryptanalysis for block cipher structures. In: Johansson, T., Maitra, S. (eds.) Progress in Cryptology - INDOCRYPT 2003, 4th International Conference on Cryptology in India, New Delhi, India, December 8\u201310, 2003, Proceedings. Lecture Notes in Computer Science, vol. 2904, pp. 82\u201396. Springer (2003), https:\/\/doi.org\/10.1007\/978-3-540-24582-7_6","DOI":"10.1007\/978-3-540-24582-7_6"},{"key":"5_CR11","unstructured":"Knudsen, L.: DEAL-a 128-bit block cipher. complexity 258(2), 216 (1998)"},{"key":"5_CR12","unstructured":"Li, M., Guo, J., Cui, J., et al.: Truncated impossible differential cryptanalysis of Midori-64. (in Chinese). J. Softw. 30(8), 2337\u20132348 (2019)"},{"key":"5_CR13","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/j.ins.2013.08.051","volume":"263","author":"Y Luo","year":"2014","unstructured":"Luo, Y., Lai, X., Wu, Z., Gong, G.: A unified method for finding impossible differentials of block cipher structures. Inf. Sci. 263, 211\u2013220 (2014). https:\/\/doi.org\/10.1016\/j.ins.2013.08.051","journal-title":"Inf. Sci."},{"key":"5_CR14","doi-asserted-by":"publisher","unstructured":"Sasaki, Y., Todo, Y.: New impossible differential search tool from design and cryptanalysis aspects - revealing structural properties of several ciphers. In: Coron, J., Nielsen, J.B. (eds.) Advances in Cryptology - EUROCRYPT 2017\u201336th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part III. Lecture Notes in Computer Science, vol. 10212, pp. 185\u2013215 (2017), https:\/\/doi.org\/10.1007\/978-3-319-56617-7_7","DOI":"10.1007\/978-3-319-56617-7_7"},{"key":"5_CR15","doi-asserted-by":"publisher","unstructured":"Shahmirzadi, A.R., Azimi, S.A., Salmasizadeh, M., Mohajeri, J., Aref, M.R.: Impossible differential cryptanalysis of reduced-round Midori64 block cipher. In: 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, ISCISC 2017, Shiraz, Iran, September 6\u20137, 2017, pp. 99\u2013104. IEEE (2017), https:\/\/doi.org\/10.1109\/ISCISC.2017.8488362","DOI":"10.1109\/ISCISC.2017.8488362"},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"Sun, L., G\u00e9rault, D., Wang, W., Wang, M.: On the usage of deterministic (related-key) truncated differentials and multidimensional linear approximations for SPN ciphers. IACR Trans. Symmetric Cryptol. 2020(3), 262\u2013287 (2020), https:\/\/doi.org\/10.13154\/tosc.v2020.i3.262-287","DOI":"10.46586\/tosc.v2020.i3.262-287"},{"key":"5_CR17","doi-asserted-by":"publisher","unstructured":"Wu, S., Wang, M.: Automatic search of truncated impossible differentials for word-oriented block ciphers. In: Galbraith, S.D., Nandi, M. (eds.) Progress in Cryptology - INDOCRYPT 2012, 13th International Conference on Cryptology in India, Kolkata, India, December 9\u201312, 2012. Proceedings. Lecture Notes in Computer Science, vol. 7668, pp. 283\u2013302. Springer (2012), https:\/\/doi.org\/10.1007\/978-3-642-34931-7_17","DOI":"10.1007\/978-3-642-34931-7_17"}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-33488-7_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,28]],"date-time":"2023-05-28T16:02:25Z","timestamp":1685289745000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-33488-7_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031334870","9783031334887"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-33488-7_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"29 May 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACNS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applied Cryptography and Network Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kyoto","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 June 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 June 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acns2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sulab-sever.u-aizu.ac.jp\/ACNS2023\/committees.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"263","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"53","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.9","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14.2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}