{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T11:06:12Z","timestamp":1762340772855},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319130651"},{"type":"electronic","value":"9783319130668"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-13066-8_6","type":"book-chapter","created":{"date-parts":[[2014,11,14]],"date-time":"2014-11-14T23:26:21Z","timestamp":1416007581000},"page":"90-107","source":"Crossref","is-referenced-by-count":26,"title":["Cryptanalysis of SIMON Variants with Connections"],"prefix":"10.1007","author":[{"given":"Javad","family":"Alizadeh","sequence":"first","affiliation":[]},{"given":"Hoda A.","family":"Alkhzaimi","sequence":"additional","affiliation":[]},{"given":"Mohammad Reza","family":"Aref","sequence":"additional","affiliation":[]},{"given":"Nasour","family":"Bagheri","sequence":"additional","affiliation":[]},{"given":"Praveen","family":"Gauravaram","sequence":"additional","affiliation":[]},{"given":"Abhishek","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Martin M.","family":"Lauridsen","sequence":"additional","affiliation":[]},{"given":"Somitra Kumar","family":"Sanadhya","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,11,15]]},"reference":[{"key":"6_CR1","unstructured":"Abed, F., List, E., Lucks, S., Wenzel, J.: Differential Cryptanalysis of Reduced-Round Simon. Cryptology ePrint Archive, Report 2013\/526 (2013). \n                    http:\/\/eprint.iacr.org\/"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Abed, F., List, E., Lucks, S., Wenzel, J.: Differential cryptanalysis of round-reduced Simon and Speck. In: Preproceedings of Fast Software Encryption (FSE 2014) (2014, to appear)","DOI":"10.1007\/978-3-662-46706-0_27"},{"key":"6_CR3","unstructured":"Alizadeh, J., Bagheri, N., Gauravaram, P., Kumar, A., Sanadhya, S.K.: Linear Cryptanalysis of Round Reduced SIMON. Cryptology ePrint Archive, Report 2013\/663 (2013) \n                    http:\/\/eprint.iacr.org\/"},{"key":"6_CR4","unstructured":"Alkhzaimi, H.A., Lauridsen, M.M.: Cryptanalysis of the SIMON Family of Block Ciphers. Cryptology ePrint Archive, Report 2013\/543 (2013). \n                    http:\/\/eprint.iacr.org\/"},{"key":"6_CR5","unstructured":"Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., Wingers, L.: The SIMON and SPECK Families of Lightweight Block Ciphers. Cryptology ePrint Archive, Report 2013\/404 (2013). \n                    http:\/\/eprint.iacr.org\/"},{"key":"6_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1007\/3-540-48519-8_10","volume-title":"Fast Software Encryption","author":"E Biham","year":"1999","unstructured":"Biham, E., Biryukov, A., Shamir, A.: Miss in the middle attacks on IDEA and Khufu. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol. 1636, p. 124. Springer, Heidelberg (1999)"},{"key":"6_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"487","DOI":"10.1007\/3-540-48071-4_34","volume-title":"Advances in Cryptology - CRYPTO \u201992","author":"E Biham","year":"1993","unstructured":"Biham, E., Shamir, A.: Differential cryptanalysis of the full 16-round DES. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 487\u2013496. Springer, Heidelberg (1993)"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Biryukov, A., Roy, A., Velichkov, V.: Differential analysis of block ciphers SIMON and SPECK. In: Preproceedings of Fast Software Encryption (FSE 2014) (2014, to appear)","DOI":"10.1007\/978-3-662-46706-0_28"},{"key":"6_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/978-3-642-38348-9_24","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2013","author":"C Blondeau","year":"2013","unstructured":"Blondeau, C., Nyberg, K.: New links between differential and linear cryptanalysis. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 388\u2013404. Springer, Heidelberg (2013)"},{"key":"6_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"450","DOI":"10.1007\/978-3-540-74735-2_31","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"AA Bogdanov","year":"2007","unstructured":"Bogdanov, A.A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M., Seurin, Y., Vikkelsoe, C.: PRESENT: an ultra-lightweight block cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 450\u2013466. Springer, Heidelberg (2007)"},{"key":"6_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"356","DOI":"10.1007\/BFb0053450","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"F Chabaud","year":"1995","unstructured":"Chabaud, F., Vaudenay, S.: Links between differential and linear cryptanalysis. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 356\u2013365. Springer, Heidelberg (1995)"},{"key":"6_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1007\/978-3-642-00730-9_24","volume-title":"Information Security and Cryptology \u2013 ICISC 2008","author":"JY Cho","year":"2009","unstructured":"Cho, J.Y., Hermelin, M., Nyberg, K.: A new technique for multidimensional linear cryptanalysis with applications on reduced round serpent. In: Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. LNCS, vol. 5461, pp. 383\u2013398. Springer, Heidelberg (2009)"},{"key":"6_CR13","unstructured":"ISO\/IEC 29192\u20132. Information technology - Security techniques - Lightweight cryptography - Part 2: Block ciphers. Technical report, International Organization for Standardization"},{"key":"6_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1007\/3-540-44706-7_17","volume-title":"Fast Software Encryption","author":"J Nakahara Jr","year":"2001","unstructured":"Nakahara Jr., J., Preneel, B., Vandewalle, J.: Linear cryptanalysis of reduced-round versions of the SAFER block cipher family. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, p. 244. Springer, Heidelberg (2001)"},{"key":"6_CR15","unstructured":"Knudsen, L.R.: DEAL - A 128-bit Block Cipher (1998)"},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"Li, T., Lim, T.-L.: RFID Anticounterfeiting: An Architectural Perspective (2008)","DOI":"10.1007\/978-0-387-76481-8_6"},{"key":"6_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"M Matsui","year":"1994","unstructured":"Matsui, M.: Linear cryptanalysis method for DES cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 386\u2013397. Springer, Heidelberg (1994)"},{"key":"6_CR18","unstructured":"Nyberg, K.: Linear Cryptanalysis. Icebreak 2013 (2013). \n                    http:\/\/ice.mat.dtu.dk\/slides\/kaisa_1.pdf"},{"key":"6_CR19","unstructured":"Saarinen, M.-J.O., Engels, D.: A Do-It-All-Cipher for RFID: Design Requirements (Extended Abstract). Cryptology ePrint Archive, Report 2012\/317 (2012). \n                    http:\/\/eprint.iacr.org\/"},{"key":"6_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/978-3-540-74619-5_12","volume-title":"Fast Software Encryption","author":"T Shirai","year":"2007","unstructured":"Shirai, T., Shibutani, K., Akishita, T., Moriai, S., Iwata, T.: The 128-bit blockcipher CLEFIA (extended abstract). In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 181\u2013195. Springer, Heidelberg (2007)"},{"key":"6_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1007\/3-540-46766-1_12","volume-title":"Advances in Cryptology - CRYPTO \u201991","author":"A Tardy-Corfdir","year":"1992","unstructured":"Tardy-Corfdir, A., Gilbert, H.: A known plaintext attack of FEAL-4 and FEAL-6. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 172\u2013182. Springer, Heidelberg (1992)"}],"container-title":["Lecture Notes in Computer Science","Radio Frequency Identification: Security and Privacy Issues"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-13066-8_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,28]],"date-time":"2019-05-28T18:57:16Z","timestamp":1559069836000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-13066-8_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319130651","9783319130668"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-13066-8_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}