{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,6]],"date-time":"2026-05-06T10:58:54Z","timestamp":1778065134731,"version":"3.51.4"},"publisher-location":"Cham","reference-count":48,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031683848","type":"print"},{"value":"9783031683855","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-68385-5_2","type":"book-chapter","created":{"date-parts":[[2024,8,16]],"date-time":"2024-08-16T08:02:51Z","timestamp":1723795371000},"page":"38-72","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Revisiting Differential-Linear Attacks via\u00a0a\u00a0Boomerang Perspective with Application to\u00a0AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and\u00a0SERPENT"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3820-3765","authenticated-orcid":false,"given":"Hosein","family":"Hadipour","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0478-8483","authenticated-orcid":false,"given":"Patrick","family":"Derbez","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8750-7423","authenticated-orcid":false,"given":"Maria","family":"Eichlseder","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,17]]},"reference":[{"key":"2_CR1","doi-asserted-by":"publisher","unstructured":"Abdelkhalek, A., Sasaki, Y., Todo, Y., Tolba, M., Youssef, A.M.: MILP modeling for (large) S-boxes to optimize probability of differential characteristics. IACR Trans. Symmetric Cryptol. 2017(4), 99\u2013129 (2017). https:\/\/doi.org\/10.13154\/TOSC.V2017.I4.99-129","DOI":"10.13154\/TOSC.V2017.I4.99-129"},{"key":"2_CR2","doi-asserted-by":"publisher","unstructured":"Banik, S., et al.: WARP: revisiting GFN for lightweight 128-bit block cipher. In: Dunkelman, O., Jacobson Jr., M.J., O\u2019Flynn, C. (eds.) SAC. LNCS, vol. 12804, pp. 535\u2013564. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-81652-0_21","DOI":"10.1007\/978-3-030-81652-0_21"},{"key":"2_CR3","doi-asserted-by":"publisher","unstructured":"Bar-On, A., Dunkelman, O., Keller, N., Weizman, A.: DLCT: a new tool for differential-linear cryptanalysis. In: Ishai, Y., Rijmen, V. (eds.) EUROCRYPT 2019. LNCS, vol. 11476, pp. 313\u2013342. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-17653-2_11","DOI":"10.1007\/978-3-030-17653-2_11"},{"key":"2_CR4","doi-asserted-by":"publisher","unstructured":"Beierle, C., Leander, G., Todo, Y.: Improved differential-linear attacks with applications to ARX ciphers. In: Micciancio, D., Ristenpart, T. (eds.) CRYPTO 2020. LNCS, vol. 12172, pp. 329\u2013358. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-56877-1_12","DOI":"10.1007\/978-3-030-56877-1_12"},{"key":"2_CR5","doi-asserted-by":"publisher","unstructured":"Bellini, E., G\u00e9rault, D., Grados, J., Makarim, R.H., Peyrin, T.: Fully automated differential-linear attacks against ARX ciphers. In: Rosulek, M. (eds.) CT-RSA 2023. LNCS, vol. 13871, pp. 252\u2013276. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-30872-7_10","DOI":"10.1007\/978-3-031-30872-7_10"},{"key":"2_CR6","doi-asserted-by":"publisher","unstructured":"Biham, E., Anderson, R.J., Knudsen, L.R.: Serpent: a new block cipher proposal. In: Vaudenay, S. (ed.) FSE 1998. LNCS, vol.\u00a01372, pp. 222\u2013238. Springer, Cham (1998). https:\/\/doi.org\/10.1007\/3-540-69710-1_15","DOI":"10.1007\/3-540-69710-1_15"},{"key":"2_CR7","doi-asserted-by":"publisher","unstructured":"Biham, E., Chen, R.: Near-collisions of SHA-0. In: Franklin, M.K. (ed.) CRYPTO 2004. LNCS, vol.\u00a03152, pp. 290\u2013305. Springer, Cham (2004). https:\/\/doi.org\/10.1007\/978-3-540-28628-8_18","DOI":"10.1007\/978-3-540-28628-8_18"},{"key":"2_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1007\/3-540-36178-2_16","volume-title":"Advances in Cryptology \u2014 ASIACRYPT 2002","author":"E Biham","year":"2002","unstructured":"Biham, E., Dunkelman, O., Keller, N.: Enhancing differential-linear cryptanalysis. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 254\u2013266. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-36178-2_16"},{"key":"2_CR9","doi-asserted-by":"publisher","unstructured":"Biham, E., Dunkelman, O., Keller, N.: Differential-linear cryptanalysis of Serpent. In: Johansson, T. (ed.) FSE 2003. LNCS, vol.\u00a02887, pp. 9\u201321. Springer, Cham (2003). https:\/\/doi.org\/10.1007\/978-3-540-39887-5_2","DOI":"10.1007\/978-3-540-39887-5_2"},{"key":"2_CR10","doi-asserted-by":"publisher","unstructured":"Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol.\u00a0537, pp. 2\u201321. Springer, Cham (1990). https:\/\/doi.org\/10.1007\/3-540-38424-3_1","DOI":"10.1007\/3-540-38424-3_1"},{"issue":"3","key":"2_CR11","doi-asserted-by":"publisher","first-page":"859","DOI":"10.1007\/s00145-016-9237-5","volume":"30","author":"C Blondeau","year":"2017","unstructured":"Blondeau, C., Leander, G., Nyberg, K.: Differential-linear cryptanalysis revisited. J. Cryptol. 30(3), 859\u2013888 (2017). https:\/\/doi.org\/10.1007\/s00145-016-9237-5","journal-title":"J. Cryptol."},{"key":"2_CR12","doi-asserted-by":"publisher","unstructured":"Bonnetain, X., Lallemand, V.: On boomerang attacks on quadratic Feistel ciphers new results on KATAN and Simon. IACR Trans. Symmetric Cryptol. 2023(3), 101\u2013145 (2023). https:\/\/doi.org\/10.46586\/TOSC.V2023.I3.101-145","DOI":"10.46586\/TOSC.V2023.I3.101-145"},{"key":"2_CR13","doi-asserted-by":"publisher","unstructured":"Boukerrou, H., Huynh, P., Lallemand, V., Mandal, B., Minier, M.: On the Feistel counterpart of the boomerang connectivity table introduction and analysis of the FBCT. IACR Trans. Symmetric Cryptol. 2020(1), 331\u2013362 (2020). https:\/\/doi.org\/10.13154\/TOSC.V2020.I1.331-362","DOI":"10.13154\/TOSC.V2020.I1.331-362"},{"key":"2_CR14","doi-asserted-by":"publisher","unstructured":"Canteaut, A., et al.: Autocorrelations of vectorial boolean functions. In: Longa, P., R\u00e0fols, C. (eds.) LATINCRYPT 2021. LNCS, vol. 12912, pp. 233\u2013253. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-88238-9_12","DOI":"10.1007\/978-3-030-88238-9_12"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Chen, Y., Bao, Z., Yu, H.: Differential-linear approximation semi-unconstrained searching and partition tree: application to LEA and Speck. IACR Cryptology ePrint Archive, Paper 2023\/1414 (2023). https:\/\/eprint.iacr.org\/2023\/1414","DOI":"10.1007\/978-981-99-8727-6_8"},{"key":"2_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"683","DOI":"10.1007\/978-3-319-78375-8_22","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2018","author":"C Cid","year":"2018","unstructured":"Cid, C., Huang, T., Peyrin, T., Sasaki, Yu., Song, L.: Boomerang connectivity table: a new cryptanalysis tool. In: Nielsen, J.B., Rijmen, V. (eds.) EUROCRYPT 2018. LNCS, vol. 10821, pp. 683\u2013714. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-78375-8_22"},{"key":"2_CR17","doi-asserted-by":"publisher","unstructured":"Delaune, S., Derbez, P., Vavrille, M.: Catching the fastest boomerangs application to SKINNY. IACR Trans. Symmetric Cryptol. 2020(4), 104\u2013129 (2020). https:\/\/doi.org\/10.46586\/tosc.v2020.i4.104-129","DOI":"10.46586\/tosc.v2020.i4.104-129"},{"key":"2_CR18","doi-asserted-by":"publisher","unstructured":"Dobraunig, C., Eichlseder, M., Mendel, F., Schl\u00e4ffer, M.: Cryptanalysis of ASCON. In: Nyberg, K. (ed.) CT-RSA 2015. LNCS, vol.\u00a09048, pp. 371\u2013387. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-16715-2_20","DOI":"10.1007\/978-3-319-16715-2_20"},{"key":"2_CR19","doi-asserted-by":"publisher","unstructured":"Dobraunig, C., Eichlseder, M., Mendel, F., Schl\u00e4ffer, M.: ASCON v1.2: lightweight authenticated encryption and hashing. J. Cryptol. 34(3), 33 (2021). https:\/\/doi.org\/10.1007\/s00145-021-09398-9","DOI":"10.1007\/s00145-021-09398-9"},{"key":"2_CR20","unstructured":"Dobraunig, C., Eichlseder, M., Mendel, F., Schl\u00e4ffer, M.: ASCON v1.2 (Submission to NIST). Finalist submission to the NIST lightweight cryptography standardization process (2021). https:\/\/csrc.nist.gov\/Projects\/Lightweight-Cryptography"},{"key":"2_CR21","doi-asserted-by":"publisher","unstructured":"Dong, X., Qin, L., Sun, S., Wang, X.: Key guessing strategies for linear key-schedule algorithms in rectangle attacks. In: Dunkelman, O., Dziembowski, S. (eds.) EUROCRYPT 2022. LNCS, vol. 13277, pp. 3\u201333. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-07082-2_1","DOI":"10.1007\/978-3-031-07082-2_1"},{"key":"2_CR22","doi-asserted-by":"publisher","unstructured":"Dunkelman, O., Indesteege, S., Keller, N.: A differential-linear attack on 12-round Serpent. In: Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. LNCS, vol.\u00a05365, pp. 308\u2013321. Springer, Cham (2008). https:\/\/doi.org\/10.1007\/978-3-540-89754-5_24","DOI":"10.1007\/978-3-540-89754-5_24"},{"issue":"4","key":"2_CR23","doi-asserted-by":"publisher","first-page":"824","DOI":"10.1007\/s00145-013-9154-9","volume":"27","author":"O Dunkelman","year":"2014","unstructured":"Dunkelman, O., Keller, N., Shamir, A.: A practical-time related-key attack on the KASUMI cryptosystem used in GSM and 3G telephony. J. Cryptol. 27(4), 824\u2013849 (2014). https:\/\/doi.org\/10.1007\/s00145-013-9154-9","journal-title":"J. Cryptol."},{"key":"2_CR24","doi-asserted-by":"publisher","unstructured":"Ghosh, S., Dunkelman, O.: Automatic search for bit-based division property. In: Longa, P., R\u00e0fols, C. (eds.) LATINCRYPT 2021. LNCS, vol. 12912, pp. 254\u2013274. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-88238-9_13","DOI":"10.1007\/978-3-030-88238-9_13"},{"key":"2_CR25","doi-asserted-by":"publisher","unstructured":"Hadipour, H., Bagheri, N.: Improved rectangle attacks on SKINNY and CRAFT. IACR Trans. Symmetric Cryptol. 2021(2), 140\u2013198 (2021). https:\/\/doi.org\/10.46586\/tosc.v2021.i2.140-198","DOI":"10.46586\/tosc.v2021.i2.140-198"},{"key":"2_CR26","unstructured":"Hadipour, H., Derbez, P., Eichlseder, M.: Revisiting differential-linear attacks via a boomerang perspective with application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT. IACR Cryptology ePrint Archive, Paper 2024\/255 (2024). https:\/\/eprint.iacr.org\/2024\/255"},{"key":"2_CR27","doi-asserted-by":"publisher","unstructured":"Hadipour, H., Nageler, M., Eichlseder, M.: Throwing boomerangs into Feistel structures application to CLEFIA, WARP, LBlock, LBlock-s and TWINE. IACR Trans. Symmetric Cryptol. 2022(3), 271\u2013302 (2022). https:\/\/doi.org\/10.46586\/tosc.v2022.i3.271-302","DOI":"10.46586\/tosc.v2022.i3.271-302"},{"key":"2_CR28","doi-asserted-by":"publisher","unstructured":"Hadipour, H., Sadeghi, S., Eichlseder, M.: Finding the impossible: automated search for full impossible-differential, zero-correlation, and integral attacks. In: Hazay, C., Stam, M. (eds.) EUROCRYPT 2023. LNCS, vol. 14007, pp. 128\u2013157. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-30634-1_5","DOI":"10.1007\/978-3-031-30634-1_5"},{"key":"2_CR29","doi-asserted-by":"publisher","unstructured":"Hadipour, H., Sadeghi, S., Niknam, M.M., Song, L., Bagheri, N.: Comprehensive security analysis of CRAFT. IACR Trans. Symmetric Cryptol. 2019(4), 290\u2013317 (2019). https:\/\/doi.org\/10.13154\/TOSC.V2019.I4.290-317","DOI":"10.13154\/TOSC.V2019.I4.290-317"},{"key":"2_CR30","doi-asserted-by":"publisher","unstructured":"Huang, T., Tjuawinata, I., Wu, H.: Differential-linear cryptanalysis of ICEPOLE. In: Leander, G. (ed.) FSE 2015. LNCS, vol.\u00a09054, pp. 243\u2013263. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-662-48116-5_12","DOI":"10.1007\/978-3-662-48116-5_12"},{"key":"2_CR31","doi-asserted-by":"publisher","unstructured":"K\u00f6lbl, S., Roy, A.: A brief comparison of Simon and Simeck. In: Bogdanov, A. (ed.) Lightweight Cryptography for Security and Privacy - 5th International Workshop, LightSec 2016, Aksaray, Turkey, 21\u201322 September 2016, Revised Selected Papers. LNCS, vol. 10098, pp. 69\u201388. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-55714-4_6","DOI":"10.1007\/978-3-319-55714-4_6"},{"key":"2_CR32","doi-asserted-by":"publisher","unstructured":"Langford, S.K., Hellman, M.E.: Differential-linear cryptanalysis. In: CRYPTO 1994, vol.\u00a0839, pp. 17\u201325. Springer, Cham (1994). https:\/\/doi.org\/10.1007\/3-540-48658-5_3","DOI":"10.1007\/3-540-48658-5_3"},{"key":"2_CR33","doi-asserted-by":"publisher","unstructured":"Leurent, G.: Improved differential-linear cryptanalysis of 7-round Chaskey with partitioning. In: Fischlin, M., Coron, J. (eds.) EUROCRYPT 2016. LNCS, vol.\u00a09665, pp. 344\u2013371. Springer, Cham (2016).https:\/\/doi.org\/10.1007\/978-3-662-49890-3_14","DOI":"10.1007\/978-3-662-49890-3_14"},{"key":"2_CR34","doi-asserted-by":"publisher","unstructured":"Li, M., Sun, L., Wang, M.: Automated key recovery attacks on round-reduced Orthros. In: Batina, L., Daemen, J. (eds.) AFRICACRYPT 2022. LNCS, vol. 13503, pp. 189\u2013213. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-17433-9_9","DOI":"10.1007\/978-3-031-17433-9_9"},{"key":"2_CR35","doi-asserted-by":"publisher","unstructured":"Liu, M., Lu, X., Lin, D.: Differential-linear cryptanalysis from an algebraic perspective. In: Malkin, T., Peikert, C. (eds.) CRYPTO 2021. LNCS, vol. 12827, pp. 247\u2013277. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-84252-9_9","DOI":"10.1007\/978-3-030-84252-9_9"},{"key":"2_CR36","doi-asserted-by":"publisher","unstructured":"Liu, Y., Sun, S., Li, C.: Rotational cryptanalysis from a differential-linear perspective - practical distinguishers for round-reduced FRIET, Xoodoo, and Alzette. In: Canteaut, A., Standaert, F. (eds.) EUROCRYPT 2021. LNCS, vol. 12696, pp. 741\u2013770. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-77870-5_26","DOI":"10.1007\/978-3-030-77870-5_26"},{"key":"2_CR37","doi-asserted-by":"publisher","unstructured":"Matsui, M.: Linear cryptanalysis method for DES cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 386\u2013397. Springer, Cham (1993). https:\/\/doi.org\/10.1007\/3-540-48285-7_33","DOI":"10.1007\/3-540-48285-7_33"},{"key":"2_CR38","doi-asserted-by":"publisher","unstructured":"Niu, Z., Sun, S., Liu, Y., Li, C.: Rotational differential-linear distinguishers of ARX ciphers with arbitrary output linear masks. In: Dodis, Y., Shrimpton, T. (eds.) CRYPTO 2022. LNCS, vol. 13507, pp. 3\u201332. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-15802-5_1","DOI":"10.1007\/978-3-031-15802-5_1"},{"key":"2_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/3-540-48285-7_6","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 1993","author":"K Nyberg","year":"1994","unstructured":"Nyberg, K.: Differentially uniform mappings for cryptography. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 55\u201364. Springer, Heidelberg (1994). https:\/\/doi.org\/10.1007\/3-540-48285-7_6"},{"key":"2_CR40","doi-asserted-by":"publisher","unstructured":"Qin, L., Dong, X., Wang, X., Jia, K., Liu, Y.: Automated search oriented to key recovery on ciphers with linear key schedule applications to boomerangs in SKINNY and ForkSkinny. IACR Trans. Symmetric Cryptol. 2021(2), 249\u2013291 (2021). https:\/\/doi.org\/10.46586\/TOSC.V2021.I2.249-291","DOI":"10.46586\/TOSC.V2021.I2.249-291"},{"key":"2_CR41","doi-asserted-by":"publisher","unstructured":"Shirai, T., Shibutani, K.: Improving immunity of Feistel ciphers against differential cryptanalysis by using multiple MDS matrices. In: FSE 2004. LNCS, vol.\u00a03017, pp. 260\u2013278. Springer, Cham (2004). https:\/\/doi.org\/10.1007\/978-3-540-25937-4_17","DOI":"10.1007\/978-3-540-25937-4_17"},{"key":"2_CR42","doi-asserted-by":"publisher","unstructured":"Shirai, T., Shibutani, K., Akishita, T., Moriai, S., Iwata, T.: The 128-bit blockcipher CLEFIA (extended abstract). In: Biryukov, A. (eds.) FSE 2007. LNCS, vol.\u00a04593, pp. 181\u2013195. Springer, Cham (2007). https:\/\/doi.org\/10.1007\/978-3-540-74619-5_12","DOI":"10.1007\/978-3-540-74619-5_12"},{"key":"2_CR43","doi-asserted-by":"publisher","unstructured":"Sun, L., G\u00e9rault, D., Wang, W., Wang, M.: On the usage of deterministic (related-key) truncated differentials and multidimensional linear approximations for SPN ciphers. IACR Trans. Symmetric Cryptol. 2020(3), 262\u2013287 (2020). https:\/\/doi.org\/10.13154\/tosc.v2020.i3.262-287","DOI":"10.13154\/tosc.v2020.i3.262-287"},{"key":"2_CR44","doi-asserted-by":"publisher","unstructured":"Sun, L., Wang, W., Wang, M.: More accurate differential properties of LED64 and Midori64. IACR Trans. Symmetric Cryptol. 2018(3), 93\u2013123 (2018). https:\/\/doi.org\/10.13154\/TOSC.V2018.I3.93-123","DOI":"10.13154\/TOSC.V2018.I3.93-123"},{"key":"2_CR45","doi-asserted-by":"publisher","unstructured":"Wagner, D.A.: The boomerang attack. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol.\u00a01636, pp. 156\u2013170. Springer, Cham (1999). https:\/\/doi.org\/10.1007\/3-540-48519-8_12","DOI":"10.1007\/3-540-48519-8_12"},{"key":"2_CR46","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/978-3-030-88323-2_9","volume-title":"Information Security and Cryptology","author":"S Wang","year":"2021","unstructured":"Wang, S., Hou, S., Liu, M., Lin, D.: Differential-linear cryptanalysis of the lightweight cryptographic algorithm KNOT. In: Yu, Yu., Yung, M. (eds.) Inscrypt 2021. LNCS, vol. 13007, pp. 171\u2013190. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-88323-2_9"},{"key":"2_CR47","doi-asserted-by":"publisher","unstructured":"Zhang, W., Zhang, L., Wu, W., Feng, D.: Related-key differential-linear attacks on reduced AES-192. In: Srinathan, K., Rangan, C.P., Yung, M. (eds.) INDOCRYPT 2007. LNCS, vol.\u00a04859, pp. 73\u201385. Springer, Cham (2007). https:\/\/doi.org\/10.1007\/978-3-540-77026-8_7","DOI":"10.1007\/978-3-540-77026-8_7"},{"key":"2_CR48","doi-asserted-by":"publisher","unstructured":"Zhou, Y., Wang, S., Hu, B.: MILP\/MIQCP-based fully automatic method of searching for differential-linear distinguishers for SIMON-like ciphers. IET Inf. Secur. 2024, 1\u201339 (2024). https:\/\/doi.org\/10.1049\/2024\/8315115","DOI":"10.1049\/2024\/8315115"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 CRYPTO 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-68385-5_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,16]],"date-time":"2024-08-16T08:05:26Z","timestamp":1723795526000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-68385-5_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031683848","9783031683855"],"references-count":48,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-68385-5_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"17 August 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CRYPTO","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Annual International Cryptology Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Santa Barbara, CA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 August 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 August 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"44","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"crypto2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/crypto.iacr.org\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}