{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T12:53:35Z","timestamp":1769864015876,"version":"3.49.0"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032155405","type":"print"},{"value":"9783032155412","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-15541-2_15","type":"book-chapter","created":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T20:07:49Z","timestamp":1769803669000},"page":"263-284","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Cube-Attack-Like Cryptanalysis of\u00a0Keccak-Based Constructions Exploiting State Differences"],"prefix":"10.1007","author":[{"given":"Mohammad","family":"Vaziri","sequence":"first","affiliation":[]},{"given":"Vesselin","family":"Velichkov","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,31]]},"reference":[{"key":"15_CR1","doi-asserted-by":"publisher","unstructured":"Bertoni, G., Daemen, J., Hoffert, S., Peeters, M., Assche, G.V., Keer, R.V.: Farfalle: parallel permutation-based cryptography. IACR Trans. Symmetric Cryptol. 2017(4), 1\u201338 (2017). https:\/\/tosc.iacr.org\/index.php\/ToSC\/article\/view\/801, https:\/\/doi.org\/10.13154\/tosc.v2017.i4.1-38","DOI":"10.13154\/tosc.v2017.i4.1-38"},{"issue":"6","key":"15_CR2","doi-asserted-by":"publisher","first-page":"1271","DOI":"10.1007\/S10623-018-0526-X","volume":"87","author":"W Bi","year":"2019","unstructured":"Bi, W., Dong, X., Li, Z., Zong, R., Wang, X.: MILP-aided cube-attack-like cryptanalysis on keccak keyed modes. Des. Codes Cryptogr. 87(6), 1271\u20131296 (2019). https:\/\/doi.org\/10.1007\/S10623-018-0526-X","journal-title":"Des. Codes Cryptogr."},{"key":"15_CR3","unstructured":"Berton, G., Daemen, J., Peeters, M., Assche, G.V., Keer, R.V.: The keccak reference (2011). http:\/\/keccak.noekeon.org"},{"key":"15_CR4","unstructured":"Berton, G., Daemen, J., Peeters, M., Assche, G.V., Keer, R.V.: Ketje v2: A Submission to the CAESAR Competition (2016). CAESAR Competition Round 3 Submission (2016). http:\/\/competitions.cr.yp.to\/round3\/ketjev2.pdf"},{"key":"15_CR5","unstructured":"Berton, G., Daemen, J., Peeters, M., Assche, G.V., Keer, R.V.: Keyak v2: A Submission to the CAESAR Competition (2016). CAESAR Competition Round 3 Submission (2016). https:\/\/keccak.team\/files\/Keyakv2-doc2.2-diff.pdf"},{"issue":"3","key":"15_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s00145-021-09398-9","volume":"34","author":"C Dobraunig","year":"2021","unstructured":"Dobraunig, C., Eichlseder, M., Mendel, F., Schl\u00e4ffer, M.: Ascon v1.2: lightweight authenticated encryption and hashing. J. Cryptol. 34(3), 1\u201342 (2021). https:\/\/doi.org\/10.1007\/s00145-021-09398-9","journal-title":"J. Cryptol."},{"key":"15_CR7","doi-asserted-by":"publisher","unstructured":"Daemen, J., Hoffert, S., Assche, G.V., Keer, R.V.: The design of Xoodoo and Xoofff. IACR Trans. Symmetric Cryptol. 2018, 1\u201338 (2018). https:\/\/doi.org\/10.13154\/tosc.v2018.i4.1-38","DOI":"10.13154\/tosc.v2018.i4.1-38"},{"key":"15_CR8","doi-asserted-by":"publisher","unstructured":"Daemen, J., Hoffert, S., Peeters, M., Assche, G.V., Keer, R.V.: Xoodyak: a lightweight cryptographic scheme. IACR Trans. Symmetric Cryptol. 2020(S1), 60\u201387 (2020). https:\/\/doi.org\/10.13154\/tosc.v2020.iS1.60-87","DOI":"10.13154\/tosc.v2020.iS1.60-87"},{"key":"15_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"733","DOI":"10.1007\/978-3-662-46800-5_28","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2015","author":"I Dinur","year":"2015","unstructured":"Dinur, I., Morawiecki, P., Pieprzyk, J., Srebrny, M., Straus, M.: Cube attacks and cube-attack-like cryptanalysis on the round-reduced keccak sponge function. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT 2015. LNCS, vol. 9056, pp. 733\u2013761. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-46800-5_28"},{"key":"15_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1007\/978-3-642-01001-9_16","volume-title":"Advances in Cryptology - EUROCRYPT 2009","author":"I Dinur","year":"2009","unstructured":"Dinur, I., Shamir, A.: Cube attacks on tweakable black box polynomials. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 278\u2013299. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-01001-9_16"},{"key":"15_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/978-3-319-56614-6_9","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2017","author":"S Huang","year":"2017","unstructured":"Huang, S., Wang, X., Xu, G., Wang, M., Zhao, J.: Conditional cube attack on reduced-round keccak sponge function. In: Coron, J.-S., Nielsen, J.B. (eds.) EUROCRYPT 2017. LNCS, vol. 10211, pp. 259\u2013288. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-56614-6_9"},{"key":"15_CR12","doi-asserted-by":"publisher","unstructured":"Lai, X.: Higher order derivatives and differential cryptanalysis. In: Communications and Cryptography: Two Sides of One Tapestry, pp. 227\u2013233. Springer, Cham (1994). https:\/\/doi.org\/10.1007\/978-1-4615-2694-0_23","DOI":"10.1007\/978-1-4615-2694-0_23"},{"key":"15_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/978-3-319-70694-8_4","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2017","author":"Z Li","year":"2017","unstructured":"Li, Z., Bi, W., Dong, X., Wang, X.: Improved conditional cube attacks on keccak keyed modes with MILP method. In: Takagi, T., Peyrin, T. (eds.) ASIACRYPT 2017. LNCS, vol. 10624, pp. 99\u2013127. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70694-8_4"},{"key":"15_CR14","doi-asserted-by":"publisher","unstructured":"Li, Z., Dong, X., Bi, W., Jia, K., Wang, X., Meier, W.: New conditional cube attack on Keccak keyed modes. IACR Trans. Symmetric Cryptol. 2019(2), 94\u2013124 (2019). https:\/\/doi.org\/10.13154\/tosc.v2019.i2.94-124","DOI":"10.13154\/tosc.v2019.i2.94-124"},{"key":"15_CR15","unstructured":"National Institute of Standards and Technology (NIST): Lightweight Cryptography Standardization Process: NIST Selects Ascon. NIST Website, 07 February 2023. https:\/\/csrc.nist.gov\/News\/2023\/lightweight-cryptography-nist-selects-ascon"},{"key":"15_CR16","doi-asserted-by":"publisher","unstructured":"Song, L., Guo, J.: Cube-attack-like cryptanalysis of round-reduced keccak using MILP. IACR Trans. Symmetric Cryptol. 2018(3), 182\u2013214 (2018). https:\/\/doi.org\/10.13154\/tosc.v2018.i3.182-214","DOI":"10.13154\/tosc.v2018.i3.182-214"},{"key":"15_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/978-3-030-03329-3_3","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2018","author":"L Song","year":"2018","unstructured":"Song, L., Guo, J., Shi, D., Ling, S.: New MILP modeling: improved conditional cube attacks on keccak-based constructions. In: Peyrin, T., Galbraith, S. (eds.) ASIACRYPT 2018. LNCS, vol. 11273, pp. 65\u201395. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-03329-3_3"},{"key":"15_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/978-3-031-41181-6_3","volume-title":"Applied Cryptography and Network Security Workshops - ACNS 2023","author":"M Vaziri","year":"2023","unstructured":"Vaziri, M., Velichkov, V.: Conditional cube key recovery attack on round-reduced Xoodyak. In: Zhou, J., et al. (eds.) ACNS 2023. LNCS, vol. 13907, pp. 43\u201362. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-41181-6_3"},{"key":"15_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/11426639_2","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"X Wang","year":"2005","unstructured":"Wang, X., Yu, H.: How to break MD5 and other hash functions. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 19\u201335. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11426639_2"},{"key":"15_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/11535218_2","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"X Wang","year":"2005","unstructured":"Wang, X., Yin, Y.L., Yu, H.: Finding collisions in the full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 17\u201336. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11535218_2"},{"issue":"8","key":"15_CR21","doi-asserted-by":"publisher","first-page":"1231","DOI":"10.1093\/comjnl\/bxz152","volume":"63","author":"H Zhou","year":"2020","unstructured":"Zhou, H., Li, Z., Dong, X., Jia, K., Meier, W.: Practical key-recovery attacks on round-reduced Ketje Jr, Xoodoo-AE and Xoodyak. Comput. J. 63(8), 1231\u20131246 (2020). https:\/\/doi.org\/10.1093\/comjnl\/bxz152","journal-title":"Comput. J."}],"container-title":["Lecture Notes in Computer Science","Lightweight Cryptography for Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-15541-2_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T20:07:51Z","timestamp":1769803671000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-15541-2_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032155405","9783032155412"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-15541-2_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"31 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"LightSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Lightweight Cryptography for Security and Privacy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Istanbul","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"T\u00fcrkiye","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 September 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 September 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"lightsec2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.encrypt-on.com\/activities\/conferences\/lightsec-2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}