{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T09:53:37Z","timestamp":1743155617225,"version":"3.40.3"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319167442"},{"type":"electronic","value":"9783319167459"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-16745-9_19","type":"book-chapter","created":{"date-parts":[[2015,3,29]],"date-time":"2015-03-29T02:13:35Z","timestamp":1427595215000},"page":"343-360","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Collision Attack on 4-Branch, Type-2 GFN Based Hash Functions Using Sliced Biclique Cryptanalysis Technique"],"prefix":"10.1007","author":[{"given":"Megha","family":"Agrawal","sequence":"first","affiliation":[]},{"given":"Donghoon","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Mohona","family":"Ghosh","sequence":"additional","affiliation":[]},{"given":"Somitra Kumar","family":"Sanadhya","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,28]]},"reference":[{"key":"19_CR1","unstructured":"Abed, F., Forler, C., List, E., Lucks, S., Wenzel, J.: Biclique cryptanalysis of PRESENT, LED, And KLEIN. Cryptology ePrint Archive, Report 2012\/591 (2012). http:\/\/eprint.iacr.org\/2012\/591"},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"Anderson, R.J., Biham, E.: Two practical and provably secure block ciphers: BEARS and LION. In: Gollmann [10], pp. 113\u2013120","DOI":"10.1007\/3-540-60865-6_48"},{"key":"19_CR3","unstructured":"Biham, E., Dunkeman, O.: The SHAvite-3 Hash Function. Submission to NIST SHA-3 competition. www.cs.technion.ac.il\/orrd\/SHAvite-3\/"},{"issue":"20","key":"19_CR4","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1016\/j.ipl.2010.07.016","volume":"110","author":"A Bogdanov","year":"2010","unstructured":"Bogdanov, A.: On the differential and linear efficiency of balanced Feistel networks. Inf. Process. Lett. 110(20), 861\u2013866 (2010)","journal-title":"Inf. Process. Lett."},{"key":"19_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1007\/978-3-642-25385-0_19","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2011","author":"A Bogdanov","year":"2011","unstructured":"Bogdanov, A., Khovratovich, D., Rechberger, C.: Biclique cryptanalysis of the full AES. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 344\u2013371. Springer, Heidelberg (2011)"},{"issue":"1\u20133","key":"19_CR6","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/s10623-012-9660-z","volume":"66","author":"A Bogdanov","year":"2013","unstructured":"Bogdanov, A., Shibutani, K.: Generalized Feistel networks revisited. Des. Codes Cryptogr. 66(1\u20133), 75\u201397 (2013)","journal-title":"Des. Codes Cryptogr."},{"key":"19_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/978-3-642-35404-5_5","volume-title":"Cryptology and Network Security","author":"M \u00c7oban","year":"2012","unstructured":"\u00c7oban, M., Karako\u00e7, F., Bozta\u015f, \u00d6.: Biclique cryptanalysis of TWINE. In: Pieprzyk, J., Sadeghi, A.-R., Manulis, M. (eds.) CANS 2012. LNCS, vol. 7712, pp. 43\u201355. Springer, Heidelberg (2012)"},{"key":"19_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1007\/978-3-319-03515-4_9","volume-title":"Progress in Cryptology \u2013 INDOCRYPT 2013","author":"D Chang","year":"2013","unstructured":"Chang, D., Kumar, A., Sanadhya, S.: Security analysis of GFN: 8-round distinguisher for 4-branch type-2 GFN. In: Paul, G., Vaudenay, S. (eds.) INDOCRYPT 2013. LNCS, vol. 8250, pp. 136\u2013148. Springer, Heidelberg (2013)"},{"issue":"3","key":"19_CR9","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1007\/s11704-014-2412-7","volume":"8","author":"L Dong","year":"2014","unstructured":"Dong, L., Wenling, W., Shuang, W., Zou, J.: Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes. Front. Comput. Sci. 8(3), 513\u2013525 (2014)","journal-title":"Front. Comput. Sci."},{"key":"19_CR10","series-title":"Lecture Notes in Computer Science","volume-title":"Fast Software Encryption","year":"1996","unstructured":"Gollmann, D. (ed.): FSE 1996. LNCS, vol. 1039. Springer, Heidelberg (1996)"},{"key":"19_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"613","DOI":"10.1007\/978-3-642-14623-7_33","volume-title":"Advances in Cryptology \u2013 CRYPTO 2010","author":"VT Hoang","year":"2010","unstructured":"Hoang, V.T., Rogaway, P.: On generalized Feistel networks. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 613\u2013630. Springer, Heidelberg (2010)"},{"key":"19_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1007\/978-3-642-31912-9_24","volume-title":"Information Security and Cryptology - ICISC 2011","author":"D Hong","year":"2012","unstructured":"Hong, D., Koo, B., Kwon, D.: Biclique attack on the full HIGHT. In: Kim, H. (ed.) ICISC 2011. LNCS, vol. 7259, pp. 365\u2013374. Springer, Heidelberg (2012)"},{"key":"19_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1007\/11894063_4","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2006","author":"D Hong","year":"2006","unstructured":"Hong, D., et al.: HIGHT: a new block cipher suitable for low-resource device. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 46\u201359. Springer, Heidelberg (2006)"},{"issue":"9","key":"19_CR14","doi-asserted-by":"publisher","first-page":"1550","DOI":"10.1587\/transfun.E95.A.1550","volume":"95\u2013A","author":"H Kang","year":"2012","unstructured":"Kang, H., Hong, D., Moon, D., Kwon, D., Sung, J., Hong, S.: Known-key attacks on generalized Feistel schemes with SP round function. IEICE Trans. 95\u2013A(9), 1550\u20131560 (2012)","journal-title":"IEICE Trans."},{"key":"19_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"544","DOI":"10.1007\/978-3-642-34961-4_33","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2012","author":"D Khovratovich","year":"2012","unstructured":"Khovratovich, D.: Bicliques for permutations: collision and preimage attacks in stronger settings. In: Wang, X., Sako, K. (eds.) ASIACRYPT 2012. LNCS, vol. 7658, pp. 544\u2013561. Springer, Heidelberg (2012)"},{"key":"19_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/978-3-642-34047-5_15","volume-title":"Fast Software Encryption","author":"D Khovratovich","year":"2012","unstructured":"Khovratovich, D., Rechberger, C., Savelieva, A.: Bicliques for preimages: attacks on Skein-512 and the SHA-2 family. In: Canteaut, A. (ed.) FSE 2012. LNCS, vol. 7549, pp. 244\u2013263. Springer, Heidelberg (2012)"},{"key":"19_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1007\/978-3-540-76900-2_19","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2007","author":"LR Knudsen","year":"2007","unstructured":"Knudsen, L.R., Rijmen, V.: Known-key distinguishers for some block ciphers. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 315\u2013324. Springer, Heidelberg (2007)"},{"key":"19_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1007\/978-3-642-34047-5_16","volume-title":"Fast Software Encryption","author":"J Li","year":"2012","unstructured":"Li, J., Isobe, T., Shibutani, K.: Converting meet-in-the-middle preimage attack into pseudo collision attack: application to SHA-2. In: Canteaut, A. (ed.) FSE 2012. LNCS, vol. 7549, pp. 264\u2013286. Springer, Heidelberg (2012)"},{"key":"19_CR19","unstructured":"Mala, H.: Biclique cryptanalysis of the block cipher SQUARE. Cryptology ePrint Archive, Report 2011\/500 (2011). http:\/\/eprint.iacr.org\/2011\/500"},{"key":"19_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-642-05445-7_2","volume-title":"Selected Areas in Cryptography","author":"F Mendel","year":"2009","unstructured":"Mendel, F., Peyrin, T., Rechberger, C., Schl\u00e4ffer, M.: Improved cryptanalysis of the reduced Gr\u00f8stl compression function, ECHO permutation and AES block cipher. In: Jacobson Jr., M.J., Rijmen, V., Safavi-Naini, R. (eds.) SAC 2009. LNCS, vol. 5867, pp. 16\u201335. Springer, Heidelberg (2009)"},{"key":"19_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1007\/978-3-642-03317-9_16","volume-title":"Fast Software Encryption","author":"F Mendel","year":"2009","unstructured":"Mendel, F., Rechberger, C., Schl\u00e4ffer, M., Thomsen, S.S.: The rebound attack: cryptanalysis of reduced whirlpool and Gr\u00f8stl. In: Dunkelman, O. (ed.) FSE 2009. LNCS, vol. 5665, pp. 260\u2013276. Springer, Heidelberg (2009)"},{"key":"19_CR22","doi-asserted-by":"crossref","unstructured":"Rijmen, V., Daemen, J., Preneel, B., Bosselaers, A., De Win, E.: The cipher SHARK. In: Gollmann [10], pp. 99\u2013111","DOI":"10.1007\/3-540-60865-6_47"},{"key":"19_CR23","unstructured":"Rivest, R.L., Robshaw, M.J. B., Yin, Y.L.: RC6 as the AES. In: AES Candidate Conference, pp. 337\u2013342 (2000)"},{"key":"19_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/978-3-642-34931-7_16","volume-title":"Progress in Cryptology - INDOCRYPT 2012","author":"Y Sasaki","year":"2012","unstructured":"Sasaki, Y.: Double-SP is weaker than Single-SP: rebound attacks on Feistel ciphers with several rounds. In: Galbraith, S., Nandi, M. (eds.) INDOCRYPT 2012. LNCS, vol. 7668, pp. 265\u2013282. Springer, Heidelberg (2012)"},{"key":"19_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1007\/978-3-642-21702-9_23","volume-title":"Fast Software Encryption","author":"Y Sasaki","year":"2011","unstructured":"Sasaki, Y., Yasuda, K.: Known-key distinguishers on 11-round Feistel and collision attacks on its hashing modes. In: Joux, A. (ed.) FSE 2011. LNCS, vol. 6733, pp. 397\u2013415. Springer, Heidelberg (2011)"},{"key":"19_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/3-540-60865-6_49","volume-title":"Fast Software Encryption","author":"B Schneier","year":"1996","unstructured":"Schneier, B., Kelsey, J.: Unbalanced Feistel networks and block cipher design. In: Gollmann, D. (ed.) FSE 1996. LNCS, vol. 1039, pp. 121\u2013144. Springer, Heidelberg (1996)"},{"key":"19_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1007\/978-3-540-25937-4_17","volume-title":"Fast Software Encryption","author":"T Shirai","year":"2004","unstructured":"Shirai, T., Shibutani, K.: Improving immunity of feistel ciphers against differential cryptanalysis by using multiple MDS matrices. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 260\u2013278. Springer, Heidelberg (2004)"},{"key":"19_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/978-3-540-74619-5_12","volume-title":"Fast Software Encryption","author":"T Shirai","year":"2007","unstructured":"Shirai, T., Shibutani, K., Akishita, T., Moriai, S., Iwata, T.: The 128-Bit blockcipher CLEFIA (extended abstract). In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 181\u2013195. Springer, Heidelberg (2007)"},{"key":"19_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1007\/978-3-642-17619-7_10","volume-title":"Cryptology and Network Security","author":"B Su","year":"2010","unstructured":"Su, B., Wu, W., Wu, S., Dong, L.: Near-collisions on the reduced-round compression functions of skein and BLAKE. In: Heng, S.-H., Wright, R.N., Goi, B.-M. (eds.) CANS 2010. LNCS, vol. 6467, pp. 124\u2013139. Springer, Heidelberg (2010)"},{"key":"19_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-642-13858-4_2","volume-title":"Fast Software Encryption","author":"T Suzaki","year":"2010","unstructured":"Suzaki, T., Minematsu, K.: Improving the generalized Feistel. In: Hong, S., Iwata, T. (eds.) FSE 2010. LNCS, vol. 6147, pp. 19\u201339. Springer, Heidelberg (2010)"},{"key":"19_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1007\/3-540-60590-8_22","volume-title":"Fast Software Encryption","author":"S Vaudenay","year":"1995","unstructured":"Vaudenay, S.: On the need for multipermutations: cryptanalysis of MD4 and SAFER. In: Preneel, B. (ed.) FSE 1994. LNCS, vol. 1008, pp. 286\u2013297. Springer, Heidelberg (1995)"},{"issue":"3","key":"19_CR32","first-page":"215","volume":"3","author":"W Wenling","year":"2006","unstructured":"Wenling, W., Zhang, W., Lin, D.: Security on generalized Feistel scheme with SP round function. Int. J. Netw. Secur. 3(3), 215\u2013224 (2006)","journal-title":"Int. J. Netw. Secur."},{"key":"19_CR33","unstructured":"Chen, S.Z., Xu, T.M.: Biclique attack of the full ARIA-256. Cryptology ePrint Archive, Report 2012\/011 (2012). http:\/\/eprint.iacr.org\/2012\/011"},{"key":"19_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"461","DOI":"10.1007\/0-387-34805-0_42","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"Y Zheng","year":"1990","unstructured":"Zheng, Y., Matsumoto, T., Imai, H.: On the construction of block ciphers provably secure and not relying on any unproved hypotheses. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 461\u2013480. Springer, Heidelberg (1990)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-16745-9_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,10]],"date-time":"2023-02-10T07:48:28Z","timestamp":1676015308000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-16745-9_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319167442","9783319167459"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-16745-9_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"28 March 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}