{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T09:06:57Z","timestamp":1742980017778,"version":"3.40.3"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031533679"},{"type":"electronic","value":"9783031533686"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-53368-6_11","type":"book-chapter","created":{"date-parts":[[2024,2,18]],"date-time":"2024-02-18T19:02:15Z","timestamp":1708282935000},"page":"213-232","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Probabilistic Related-Key Statistical Saturation Cryptanalysis"],"prefix":"10.1007","author":[{"given":"Muzhou","family":"Li","sequence":"first","affiliation":[]},{"given":"Nicky","family":"Mouha","sequence":"additional","affiliation":[]},{"given":"Ling","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Meiqin","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,19]]},"reference":[{"key":"11_CR1","doi-asserted-by":"publisher","unstructured":"Ahangarkolaei, M.Z., Najarkolaei, S.R.H., Ahmadi, S., Aref, M.R.: Zero correlation linear attack on reduced round Piccolo-80. In: ISCISC 2016, pp. 66\u201371. IEEE (2016). https:\/\/doi.org\/10.1109\/ISCISC.2016.7736453","DOI":"10.1109\/ISCISC.2016.7736453"},{"key":"11_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-030-20951-3_2","volume-title":"Cyber Security Cryptography and Machine Learning","author":"T Ashur","year":"2019","unstructured":"Ashur, T., Dunkelman, O., Masalha, N.: Linear cryptanalysis reduced round of Piccolo-80. In: Dolev, S., Hendler, D., Lodha, S., Yung, M. (eds.) CSCML 2019. LNCS, vol. 11527, pp. 16\u201332. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-20951-3_2"},{"key":"11_CR3","doi-asserted-by":"publisher","unstructured":"Avanzi, R.: The QARMA block cipher family. Almost MDS matrices over rings with zero divisors, nearly symmetric Even-Mansour constructions with non-involutory central rounds, and search heuristics for low-latency S-boxes. IACR Trans. Symmetric Cryptol. 2017(1), 4\u201344 (2017). https:\/\/doi.org\/10.13154\/tosc.v2017.i1.4-44","DOI":"10.13154\/tosc.v2017.i1.4-44"},{"key":"11_CR4","doi-asserted-by":"publisher","unstructured":"Azimi, S.A., Ahmadian, Z., Mohajeri, J., Aref, M.R.: Impossible differential cryptanalysis of Piccolo lightweight block cipher. In: ISCISC 2014, pp. 89\u201394. IEEE (2014). https:\/\/doi.org\/10.1109\/ISCISC.2014.6994028","DOI":"10.1109\/ISCISC.2014.6994028"},{"key":"11_CR5","doi-asserted-by":"publisher","unstructured":"Barrett, C.W., Sebastiani, R., Seshia, S.A., Tinelli, C.: Satisfiability modulo theories. In: Biere, A., Heule, M., van Maaren, H., Walsh, T. (eds.) Handbook of Satisfiability, Frontiers in Artificial Intelligence and Applications, vol. 185, pp. 825\u2013885. IOS Press (2009). https:\/\/doi.org\/10.3233\/978-1-58603-929-5-825","DOI":"10.3233\/978-1-58603-929-5-825"},{"key":"11_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/978-3-642-42033-7_19","volume-title":"Advances in Cryptology - ASIACRYPT 2013","author":"A Bogdanov","year":"2013","unstructured":"Bogdanov, A., Boura, C., Rijmen, V., Wang, M., Wen, L., Zhao, J.: Key difference invariant bias in block ciphers. In: Sako, K., Sarkar, P. (eds.) ASIACRYPT 2013. LNCS, vol. 8269, pp. 357\u2013376. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-42033-7_19"},{"key":"11_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/978-3-642-00862-7_13","volume-title":"Topics in Cryptology \u2013 CT-RSA 2009","author":"B Collard","year":"2009","unstructured":"Collard, B., Standaert, F.-X.: A statistical saturation attack against the block cipher PRESENT. In: Fischlin, M. (ed.) CT-RSA 2009. LNCS, vol. 5473, pp. 195\u2013210. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-00862-7_13"},{"key":"11_CR8","doi-asserted-by":"publisher","unstructured":"Cook, S.A.: The complexity of theorem-proving procedures. In: Harrison, M.A., Banerji, R.B., Ullman, J.D. (eds.) Proceedings of the 3rd Annual ACM Symposium on Theory of Computing, Shaker Heights, Ohio, USA, 3\u20135 May 1971, pp. 151\u2013158. ACM (1971). https:\/\/doi.org\/10.1145\/800157.805047","DOI":"10.1145\/800157.805047"},{"key":"11_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/BFb0052343","volume-title":"Fast Software Encryption","author":"J Daemen","year":"1997","unstructured":"Daemen, J., Knudsen, L., Rijmen, V.: The block cipher square. In: Biham, E. (ed.) FSE 1997. LNCS, vol. 1267, pp. 149\u2013165. Springer, Heidelberg (1997). https:\/\/doi.org\/10.1007\/BFb0052343"},{"key":"11_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The Design of Rijndael: AES - The Advanced Encryption Standard. Information Security and Cryptography","author":"J Daemen","year":"2002","unstructured":"Daemen, J., Rijmen, V.: The Design of Rijndael: AES - The Advanced Encryption Standard. Information Security and Cryptography. Springer, Cham (2002). https:\/\/doi.org\/10.1007\/978-3-662-04722-4"},{"issue":"3","key":"11_CR11","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1515\/JMC.2007.011","volume":"1","author":"J Daemen","year":"2007","unstructured":"Daemen, J., Rijmen, V.: Probability distributions of correlation and differentials in block ciphers. J. Math. Cryptol. 1(3), 221\u2013242 (2007). https:\/\/doi.org\/10.1515\/JMC.2007.011","journal-title":"J. Math. Cryptol."},{"key":"11_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-75971-5","volume-title":"Asymptotic Theory of Statistics and Probability","author":"A DasGupta","year":"2008","unstructured":"DasGupta, A.: Asymptotic Theory of Statistics and Probability. Springer, New York (2008). https:\/\/doi.org\/10.1007\/978-0-387-75971-5"},{"key":"11_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"500","DOI":"10.1007\/978-3-319-39555-5_27","volume-title":"Applied Cryptography and Network Security","author":"C Dobraunig","year":"2016","unstructured":"Dobraunig, C., Eichlseder, M., Mendel, F.: Square attack on 7-round Kiasu-BC. In: Manulis, M., Sadeghi, A.-R., Schneider, S. (eds.) ACNS 2016. LNCS, vol. 9696, pp. 500\u2013517. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-39555-5_27"},{"key":"11_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1007\/978-3-642-45239-0_15","volume-title":"Cryptography and Coding","author":"P-A Fouque","year":"2013","unstructured":"Fouque, P.-A., Karpman, P.: Security amplification against meet-in-the-middle attacks using whitening. In: Stam, M. (ed.) IMACC 2013. LNCS, vol. 8308, pp. 252\u2013269. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-45239-0_15"},{"issue":"17","key":"11_CR15","doi-asserted-by":"publisher","first-page":"4520","DOI":"10.1002\/sec.1644","volume":"9","author":"L Fu","year":"2016","unstructured":"Fu, L., Jin, C., Li, X.: Multidimensional zero-correlation linear cryptanalysis of lightweight block cipher Piccolo-128. Secur. Commun. Netw. 9(17), 4520\u20134535 (2016). https:\/\/doi.org\/10.1002\/sec.1644","journal-title":"Secur. Commun. Netw."},{"key":"11_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/978-3-642-31448-3_6","volume-title":"Information Security and Privacy","author":"T Isobe","year":"2012","unstructured":"Isobe, T., Shibutani, K.: Security analysis of the lightweight block ciphers XTEA, LED and Piccolo. In: Susilo, W., Mu, Y., Seberry, J. (eds.) ACISP 2012. LNCS, vol. 7372, pp. 71\u201386. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-31448-3_6"},{"key":"11_CR17","unstructured":"Jeong, K., Kang, H., Lee, C., Sung, J., Hong, S.: Biclique cryptanalysis of lightweight block ciphers PRESENT, Piccolo and LED. Cryptology ePrint Archive, Paper 2012\/621 (2012). https:\/\/eprint.iacr.org\/2012\/621"},{"key":"11_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1007\/3-540-45661-9_9","volume-title":"Fast Software Encryption","author":"L Knudsen","year":"2002","unstructured":"Knudsen, L., Wagner, D.: Integral cryptanalysis. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol. 2365, pp. 112\u2013127. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45661-9_9"},{"key":"11_CR19","doi-asserted-by":"publisher","unstructured":"Li, M., Hu, K., Wang, M.: Related-tweak statistical saturation cryptanalysis and its application on QARMA. IACR Trans. Symmetric Cryptol. 2019(1), 236\u2013263 (2019). https:\/\/doi.org\/10.13154\/tosc.v2019.i1.236-263","DOI":"10.13154\/tosc.v2019.i1.236-263"},{"key":"11_CR20","unstructured":"Li, M., Mouha, N., Sun, L., Wang, M.: Probabilistic related-key statistical saturation cryptanalysis. IACR Cryptology ePrint Archive, p. 1245 (2023). https:\/\/eprint.iacr.org\/2023\/1245"},{"key":"11_CR21","doi-asserted-by":"publisher","unstructured":"Liu, Y., Cheng, L., Liu, Z., Li, W., Wang, Q., Gu, D.: Improved meet-in-the-middle attacks on reduced-round Piccolo. Sci. China Inf. Sci. 61(3), 032108:1\u2013032108:13 (2018). https:\/\/doi.org\/10.1007\/s11432-016-9157-y","DOI":"10.1007\/s11432-016-9157-y"},{"issue":"9","key":"11_CR22","doi-asserted-by":"publisher","first-page":"4727","DOI":"10.3837\/tiis.2019.09.022","volume":"13","author":"Y Liu","year":"2019","unstructured":"Liu, Y., et al.: New analysis of reduced-version of Piccolo in the single-key scenario. KSII Trans. Internet Inf. Syst. 13(9), 4727\u20134741 (2019). https:\/\/doi.org\/10.3837\/tiis.2019.09.022","journal-title":"KSII Trans. Internet Inf. Syst."},{"key":"11_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume-title":"Advances in Cryptology \u2014 EUROCRYPT \u201993","author":"M Matsui","year":"1994","unstructured":"Matsui, M.: Linear cryptanalysis method for DES cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 386\u2013397. Springer, Heidelberg (1994). https:\/\/doi.org\/10.1007\/3-540-48285-7_33"},{"key":"11_CR24","doi-asserted-by":"publisher","first-page":"651","DOI":"10.1192\/bjp.116.535.651","volume":"116","author":"AE Maxwell","year":"1970","unstructured":"Maxwell, A.E.: Comparing the classification of subjects by two independent judges. Br. J. Psychiatry 116, 651\u2013655 (1970). https:\/\/doi.org\/10.1192\/bjp.116.535.651","journal-title":"Br. J. Psychiatry"},{"key":"11_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1007\/978-3-319-03515-4_21","volume-title":"Progress in Cryptology \u2013 INDOCRYPT 2013","author":"M Minier","year":"2013","unstructured":"Minier, M.: On the security of Piccolo lightweight block cipher against related-key impossible differentials. In: Paul, G., Vaudenay, S. (eds.) INDOCRYPT 2013. LNCS, vol. 8250, pp. 308\u2013318. Springer, Cham (2013). https:\/\/doi.org\/10.1007\/978-3-319-03515-4_21"},{"key":"11_CR26","unstructured":"Mouha, N., Preneel, B.: Towards finding optimal differential characteristics for ARX: application to Salsa20. Cryptology ePrint Archive, Paper 2013\/328 (2013). https:\/\/eprint.iacr.org\/2013\/328"},{"key":"11_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1007\/BFb0053460","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u201994","author":"K Nyberg","year":"1995","unstructured":"Nyberg, K.: Linear approximation of block ciphers. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 439\u2013444. Springer, Heidelberg (1995). https:\/\/doi.org\/10.1007\/BFb0053460"},{"issue":"4","key":"11_CR28","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1080\/0161-110291890948","volume":"26","author":"RC Phan","year":"2002","unstructured":"Phan, R.C.: Mini advanced encryption standard (Mini-AES): a testbed for cryptanalysis students. Cryptologia 26(4), 283\u2013306 (2002). https:\/\/doi.org\/10.1080\/0161-110291890948","journal-title":"Cryptologia"},{"key":"11_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1007\/978-3-642-23951-9_23","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2011","author":"K Shibutani","year":"2011","unstructured":"Shibutani, K., Isobe, T., Hiwatari, H., Mitsuda, A., Akishita, T., Shirai, T.: Piccolo: an ultra-lightweight blockcipher. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 342\u2013357. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-23951-9_23"},{"key":"11_CR30","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1093\/biomet\/42.3-4.412","volume":"42","author":"A Stuart","year":"1955","unstructured":"Stuart, A.: A test for homogeneity of the marginal distribution of a two-way classification. Biometrika 42, 412\u2013416 (1955). https:\/\/doi.org\/10.1093\/biomet\/42.3-4.412","journal-title":"Biometrika"},{"key":"11_CR31","doi-asserted-by":"publisher","unstructured":"Todo, Y.: Impossible differential attack against 14-round Piccolo-80 without relying on full code book. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(1), 154\u2013157 (2016). https:\/\/doi.org\/10.1587\/transfun.E99.A.154","DOI":"10.1587\/transfun.E99.A.154"},{"key":"11_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-29078-2_1","volume-title":"Lightweight Cryptography for Security and Privacy","author":"M Tolba","year":"2016","unstructured":"Tolba, M., Abdelkhalek, A., Youssef, A.M.: Meet-in-the-middle attacks on reduced round Piccolo. In: G\u00fcneysu, T., Leander, G., Moradi, A. (eds.) LightSec 2015. LNCS, vol. 9542, pp. 3\u201320. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-29078-2_1"},{"key":"11_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1007\/978-3-662-52993-5_20","volume-title":"Fast Software Encryption","author":"M Wang","year":"2016","unstructured":"Wang, M., Cui, T., Chen, H., Sun, L., Wen, L., Bogdanov, A.: Integrals go statistical: cryptanalysis of full skipjack variants. In: Peyrin, T. (ed.) FSE 2016. LNCS, vol. 9783, pp. 399\u2013415. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-52993-5_20"},{"key":"11_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/978-3-642-29101-2_23","volume-title":"Information Security Practice and Experience","author":"Y Wang","year":"2012","unstructured":"Wang, Y., Wu, W., Yu, X.: Biclique cryptanalysis of reduced-round piccolo block cipher. In: Ryan, M.D., Smyth, B., Wang, G. (eds.) ISPEC 2012. LNCS, vol. 7232, pp. 337\u2013352. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-29101-2_23"}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography \u2013 SAC 2023"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-53368-6_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,18]],"date-time":"2024-02-18T19:03:27Z","timestamp":1708283007000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-53368-6_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031533679","9783031533686"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-53368-6_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"19 February 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Selected Areas in Cryptography","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Fredericton, NB","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 August 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 August 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sacrypt2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sac-workshop.github.io\/sac-2023\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"45","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"47% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.09","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.56","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}