{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T16:50:26Z","timestamp":1742403026236},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319067339"},{"type":"electronic","value":"9783319067346"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-06734-6_10","type":"book-chapter","created":{"date-parts":[[2014,5,21]],"date-time":"2014-05-21T00:22:02Z","timestamp":1400631722000},"page":"147-164","source":"Crossref","is-referenced-by-count":11,"title":["Multidimensional Zero-Correlation Linear Cryptanalysis of E2"],"prefix":"10.1007","author":[{"given":"Long","family":"Wen","sequence":"first","affiliation":[]},{"given":"Meiqin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Andrey","family":"Bogdanov","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/3-540-44983-3_4","volume-title":"Selected Areas in Cryptography","author":"K. Aoki","year":"2001","unstructured":"Aoki, K., Ichikawa, T., Kanda, M., Matsui, M., Moriai, S., Nakajima, J., Tokita, T.: Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms-Design and Analysis. In: Stinson, D.R., Tavares, S. (eds.) SAC 2000. LNCS, vol.\u00a02012, pp. 39\u201356. Springer, Heidelberg (2001)"},{"key":"10_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1007\/BFb0053449","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"E. Biham","year":"1995","unstructured":"Biham, E.: On Matsui\u2019s Linear Cryptanalysis. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 341\u2013355. Springer, Heidelberg (1995)"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Bogdanov, A., Rijmen, V.: Linear Hulls with Correlation Zero and Linear Cryptanalysis of Block Ciphers. Accepted to Designs, Codes and Cryptography (2012) (in press)","DOI":"10.1007\/s10623-012-9697-z"},{"key":"10_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/978-3-642-34047-5_3","volume-title":"Fast Software Encryption","author":"A. Bogdanov","year":"2012","unstructured":"Bogdanov, A., Wang, M.: Zero Correlation Linear Cryptanalysis with Reduced Data Complexity. In: Canteaut, A. (ed.) FSE 2012. LNCS, vol.\u00a07549, pp. 29\u201348. Springer, Heidelberg (2012)"},{"key":"10_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/978-3-642-34961-4_16","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2012","author":"A. Bogdanov","year":"2012","unstructured":"Bogdanov, A., Leander, G., Nyberg, K., Wang, M.: Integral and Multidimensional Linear Distinguishers with Correlation Zero. In: Wang, X., Sako, K. (eds.) ASIACRYPT 2012. LNCS, vol.\u00a07658, pp. 244\u2013261. Springer, Heidelberg (2012)"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Soleimany, H., Nyberg, K.: Zero-Correlation Linear Cryptanalysis of Reduced-Round LBlock. In: WCC 2013 (2013)","DOI":"10.1007\/s10623-014-9976-y"},{"key":"10_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/978-3-642-38348-9_24","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2013","author":"C. Blondeau","year":"2013","unstructured":"Blondeau, C., Nyberg, K.: New Links Between Differential and Linear Cryptanalysis. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol.\u00a07881, pp. 388\u2013404. Springer, Heidelberg (2013)"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Bogdanov, A., Geng, H., Wang, M., Wen, L., Collard, B.: Zero-Correlation Linear Cryptanalysis with FFT and Improved Attacks on ISO Standards Camellia and CLEFIA. In: SAC 2013. LNCS. Springer (2014)","DOI":"10.1007\/978-3-662-43414-7_16"},{"key":"10_CR9","unstructured":"ISO\/IEC 18033-3:2005, Information technology \u2013 Security techniques \u2013 Encryption algrithm \u2013 Part 3: Block Ciphers (July 2005)"},{"issue":"1","key":"10_CR10","first-page":"48","volume":"E83-A","author":"M. Kanda","year":"2000","unstructured":"Kanda, M., Moriai, S., Aoki, K., Ueda, H., Takashima, Y., Ohta, K., Matsumoto, T.: E2-a new 128-bit block cipher. IEICE Transactions Fundamentals of Electronics, Communications and Computer Sciences\u00a0E83-A(1), 48\u201359 (2000)","journal-title":"IEICE Transactions Fundamentals of Electronics, Communications and Computer Sciences"},{"key":"10_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"M. Matsui","year":"1994","unstructured":"Matsui, M.: Linear Cryptanalysis Method for DES cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 386\u2013397. Springer, Heidelberg (1994)"},{"key":"10_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1007\/BFb0053451","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"M. Matsui","year":"1995","unstructured":"Matsui, M.: On Correlation between the Order of S-boxes and the Strength of DES. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 366\u2013375. Springer, Heidelberg (1995)"},{"key":"10_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/978-3-642-03317-9_13","volume-title":"Fast Software Encryption","author":"M. Hermelin","year":"2009","unstructured":"Hermelin, M., Cho, J.Y., Nyberg, K.: Multidimensional Extension of Matsui\u2019s Algorithm 2. In: Dunkelman, O. (ed.) FSE 2009. LNCS, vol.\u00a05665, pp. 209\u2013227. Springer, Heidelberg (2009)"},{"key":"10_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/3-540-48519-8_6","volume-title":"Fast Software Encryption","author":"M. Matsui","year":"1999","unstructured":"Matsui, M., Tokita, T.: Cryptanalysis of a Reduced Version of the Block Cipher E2. In: Knudsen, L. (ed.) FSE 1999. LNCS, vol.\u00a01636, pp. 71\u201380. Springer, Heidelberg (1999)"},{"key":"10_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1007\/3-540-46513-8_8","volume-title":"Selected Areas in Cryptography","author":"S. Moriai","year":"2000","unstructured":"Moriai, S., Sugita, M., Aoki, K., Kanda, M.: Security of E2 against Truncated Differential Cryptanalysis. In: Heys, H.M., Adams, C.M. (eds.) SAC 1999. LNCS, vol.\u00a01758, pp. 106\u2013117. Springer, Heidelberg (2000)"},{"key":"10_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/978-3-642-13708-2_7","volume-title":"Applied Cryptography and Network Security","author":"Y. Wei","year":"2010","unstructured":"Wei, Y., Li, P., Sun, B., Li, C.: Impossible Differential Cryptanalysis on Feistel Ciphers with SP and SPS Round Functions. In: Zhou, J., Yung, M. (eds.) ACNS 2010. LNCS, vol.\u00a06123, pp. 105\u2013122. Springer, Heidelberg (2010)"},{"key":"10_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1007\/978-3-642-34601-9_30","volume-title":"Network and System Security","author":"Y. Wei","year":"2012","unstructured":"Wei, Y., Yang, X., Li, C., Du, W.: Impossible Differential Cryptanalysis on Tweaked E2. In: Xu, L., Bertino, E., Mu, Y. (eds.) NSS 2012. LNCS, vol.\u00a07645, pp. 392\u2013404. Springer, Heidelberg (2012)"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 AFRICACRYPT 2014"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-06734-6_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T18:16:07Z","timestamp":1649009767000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-06734-6_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319067339","9783319067346"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-06734-6_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}