{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:16:32Z","timestamp":1740096992089,"version":"3.37.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319067339"},{"type":"electronic","value":"9783319067346"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-06734-6_6","type":"book-chapter","created":{"date-parts":[[2014,5,21]],"date-time":"2014-05-21T00:22:02Z","timestamp":1400631722000},"page":"88-108","source":"Crossref","is-referenced-by-count":6,"title":["Practical Distinguishers against 6-Round Keccak-f Exploiting Self-Symmetry"],"prefix":"10.1007","author":[{"given":"Sukhendu","family":"Kuila","sequence":"first","affiliation":[]},{"given":"Dhiman","family":"Saha","sequence":"additional","affiliation":[]},{"given":"Madhumangal","family":"Pal","sequence":"additional","affiliation":[]},{"given":"Dipanwita","family":"Roy Chowdhury","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","unstructured":"Bernstein, D.: Second preimages for 6 (7?(8??)) rounds of Keccak? (November 2010), \n                    \n                      http:\/\/ehash.iaik.tugraz.at\/uploads\/6\/65\/NIST-mailing-list_Bernstein-Daemen.txt"},{"key":"6_CR2","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Assche, G.V.: Sponge functions. In: Ecrypt Hash Workshop 2007 (May 2007)"},{"key":"6_CR3","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Assche, G.V.: The Keccak SHA-3 submission. Submission to NIST, Round 3 (2011), \n                    \n                      http:\/\/keccak.noekeon.org\/Keccak-submission-3.pdf"},{"issue":"3","key":"6_CR4","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1214\/aop\/1176994428","volume":"9","author":"H. Chernoff","year":"1981","unstructured":"Chernoff, H.: A Note on an Inequality Involving the Normal Distribution. The Annals of Probability\u00a09(3), 533\u2013535 (1981), \n                    \n                      http:\/\/dx.doi.org\/10.1214\/aop\/1176994428","journal-title":"The Annals of Probability"},{"key":"6_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1007\/978-3-642-34047-5_24","volume-title":"Fast Software Encryption","author":"J. Daemen","year":"2012","unstructured":"Daemen, J., Van Assche, G.: Differential propagation analysis of keccak. In: Canteaut, A. (ed.) FSE 2012. LNCS, vol.\u00a07549, pp. 422\u2013441. Springer, Heidelberg (2012), \n                    \n                      http:\/\/dx.doi.org\/10.1007\/978-3-642-34047-5_24"},{"key":"6_CR6","unstructured":"Dinur, I., Dunkelman, O., Shamir, A.: Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials. Cryptology ePrint Archive, Report 2012\/672 (2012), \n                    \n                      http:\/\/eprint.iacr.org\/"},{"key":"6_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1007\/978-3-642-34047-5_25","volume-title":"Fast Software Encryption","author":"I. Dinur","year":"2012","unstructured":"Dinur, I., Dunkelman, O., Shamir, A.: New attacks on keccak-224 and keccak-256. In: Canteaut, A. (ed.) FSE 2012. LNCS, vol.\u00a07549, pp. 442\u2013461. Springer, Heidelberg (2012), \n                    \n                      http:\/\/dx.doi.org\/10.1007\/978-3-642-34047-5_25"},{"key":"6_CR8","unstructured":"Duan, M., Lai, X.: Improved zero-sum distinguisher for full round Keccak-f permutation. Cryptology ePrint Archive, Report 2011\/023 (2011), \n                    \n                      http:\/\/eprint.iacr.org\/2011\/023.pdf"},{"issue":"6","key":"6_CR9","doi-asserted-by":"publisher","first-page":"694","DOI":"10.1007\/s11434-011-4909-x","volume":"57","author":"M. Duan","year":"2012","unstructured":"Duan, M., Lai, X.: Improved zero-sum distinguisher for full round keccak-f permutation. Chinese Science Bulletin\u00a057(6), 694\u2013697 (2012), \n                    \n                      http:\/\/dx.doi.org\/10.1007\/s11434-011-4909-x","journal-title":"Chinese Science Bulletin"},{"key":"6_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1007\/978-3-642-34047-5_23","volume-title":"Fast Software Encryption","author":"A. Duc","year":"2012","unstructured":"Duc, A., Guo, J., Peyrin, T., Wei, L.: Unaligned rebound attack: Application to Keccak. In: Canteaut, A. (ed.) FSE 2012. LNCS, vol.\u00a07549, pp. 402\u2013421. Springer, Heidelberg (2012)"},{"key":"6_CR11","unstructured":"Lathrop, J.: Cube attacks on cryptographic hash functions. Master\u2019s thesis (2009), \n                    \n                      http:\/\/www.cs.rit.edu\/~jal6806\/thesis\/"},{"key":"6_CR12","unstructured":"Morawiecki, P., Pieprzyk, J., Srebrny, M.: Rotational cryptanalysis of round-reduced Keccak. Cryptology ePrint Archive, Report 2012\/546 (2012), \n                    \n                      http:\/\/eprint.iacr.org\/"},{"key":"6_CR13","unstructured":"Morawiecki, P., Srebrny, M.: A sat-based preimage analysis of reduced keccak hash functions. IACR Cryptology ePrint Archive 2010, 285 (2010), \n                    \n                      http:\/\/dblp.uni-trier.de\/db\/journals\/iacr\/iacr2010.html#MorawieckiS10"},{"key":"6_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1007\/978-3-642-25578-6_18","volume-title":"Progress in Cryptology \u2013 INDOCRYPT 2011","author":"M. Naya-Plasencia","year":"2011","unstructured":"Naya-Plasencia, M., R\u00f6ck, A., Meier, W.: Practical analysis of reduced-round Keccak. In: Bernstein, D.J., Chatterjee, S. (eds.) INDOCRYPT 2011. LNCS, vol.\u00a07107, pp. 236\u2013254. Springer, Heidelberg (2011)"},{"key":"6_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1007\/978-3-642-14623-7_20","volume-title":"Advances in Cryptology \u2013 CRYPTO 2010","author":"T. Peyrin","year":"2010","unstructured":"Peyrin, T.: Improved Differential Attacks for ECHO and Gr\u00f8stl. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol.\u00a06223, pp. 370\u2013392. Springer, Heidelberg (2010)"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 AFRICACRYPT 2014"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-06734-6_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T17:40:22Z","timestamp":1558892422000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-06734-6_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319067339","9783319067346"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-06734-6_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}