{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T04:15:53Z","timestamp":1748751353468,"version":"3.41.0"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319281650"},{"type":"electronic","value":"9783319281667"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-28166-7_18","type":"book-chapter","created":{"date-parts":[[2016,1,8]],"date-time":"2016-01-08T15:29:04Z","timestamp":1452266944000},"page":"370-385","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Evaluation and Cryptanalysis of the Pandaka Lightweight Cipher"],"prefix":"10.1007","author":[{"given":"Yuval","family":"Yarom","sequence":"first","affiliation":[]},{"given":"Gefei","family":"Li","sequence":"additional","affiliation":[]},{"given":"Damith C.","family":"Ranasinghe","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,9]]},"reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"Abadi, M., Feigenbaum, J., Kilian, J.: On hiding information from an oracle. In: Proceedings of the 19th Annual ACM Symposium on Theory of Computing, pp. 195\u2013203, New York, NY, US (1987)","DOI":"10.1145\/28395.28417"},{"key":"18_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1007\/978-3-642-25516-8_23","volume-title":"Cryptography and Coding","author":"MA Abdelraheem","year":"2011","unstructured":"Abdelraheem, M.A., Borghoff, J., Zenner, E., David, M.: Cryptanalysis of the light-weight cipher A2U2. In: Chen, L. (ed.) IMACC 2011. LNCS, vol. 7089, pp. 375\u2013390. Springer, Heidelberg (2011)"},{"issue":"2","key":"18_CR3","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1049\/iet-ifs.2008.0013","volume":"3","author":"H Ahmadi","year":"2009","unstructured":"Ahmadi, H., Eghlidos, T.: Heuristic guess-and-determine attacks on stream ciphers. IET Inf. Secur. 3(2), 66\u201373 (2009)","journal-title":"IET Inf. Secur."},{"key":"18_CR4","unstructured":"Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., Wingers, L.: The SIMON and SPECK families of lightweight block ciphers. IACR Cryptology ePrint Archive 2013:404 (2013)"},{"issue":"1","key":"18_CR5","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E Biham","year":"1991","unstructured":"Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. J. Cryptology 4(1), 3\u201372 (1991)","journal-title":"J. Cryptology"},{"key":"18_CR6","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4613-9314-6","volume-title":"Differential Cryptanalysis of the Data Encryption Standard","author":"E Biham","year":"1993","unstructured":"Biham, E., Shamir, A.: Differential Cryptanalysis of the Data Encryption Standard. Springer, New York (1993)"},{"key":"18_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/978-3-642-19574-7_16","volume-title":"Selected Areas in Cryptography","author":"A Bogdanov","year":"2011","unstructured":"Bogdanov, A., Rechberger, C.: A 3-subset meet-in-the-middle attack: cryptanalysis of the lightweight block cipher KTANTAN. In: Biryukov, A., Gong, G., Stinson, D.R. (eds.) SAC 2010. LNCS, vol. 6544, pp. 229\u2013240. Springer, Heidelberg (2011)"},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"Chen, M., Chen, S., Xiao, Q.: Pandaka: a lightweight cipher for RFID systems. In: Proceedings of IEEE INFOCOM 2014, pp. 172\u2013180, Toronto, Ontario, Canada, April 2014","DOI":"10.1109\/INFOCOM.2014.6847937"},{"key":"18_CR9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71641-9","volume-title":"Networked RFID Systems and Lightweight Cryptography: Raising Barriers to Counterfeiting","author":"PH Cole","year":"2008","unstructured":"Cole, P.H., Ranasinghe, D.C.: Networked RFID Systems and Lightweight Cryptography: Raising Barriers to Counterfeiting. Springer, London (2008). doi:10.1007\/978-3-540-71641-9"},{"key":"18_CR10","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-642-03462-6_1","volume-title":"Unique Radio Innovation for the 21st Century: Building Scalable and Global RFID Networks","author":"PH Cole","year":"2011","unstructured":"Cole, P.H., Turner, L.H., Hu, Z., Ranasinghe, D.C.: The next generation of RFID technology. In: Ranasinghe, D.C., Sheng, Q.Z., Zeadally, S. (eds.) Unique Radio Innovation for the 21st Century: Building Scalable and Global RFID Networks, pp. 3\u201323. Springer, Berlin (2011). ISBN 978-3-642-03461-9"},{"key":"18_CR11","doi-asserted-by":"crossref","unstructured":"David, M., Ranasinghe, D.C., Larsen, T.: A2U2: a stream cipher for printed electronics RFID tags. In: IEEE International Conference on RFID, pp. 176\u2013183, Orlando, FL, US, April 2011","DOI":"10.1109\/RFID.2011.5764619"},{"key":"18_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1007\/978-3-642-04138-9_20","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2009","author":"C De Canni\u00e8re","year":"2009","unstructured":"De Canni\u00e8re, C., Dunkelman, O., Kne\u017eevi\u0107, M.: KATAN and KTANTAN \u2014 a family of small and efficient hardware-oriented block ciphers. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 272\u2013288. Springer, Heidelberg (2009)"},{"key":"18_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/978-3-642-25286-0_2","volume-title":"RFID","author":"D Engels","year":"2012","unstructured":"Engels, D., Saarinen, M.-J.O., Schweitzer, P., Smith, E.M.: The hummingbird-2 lightweight authenticated encryption algorithm. In: Juels, A., Paar, C. (eds.) RFIDSec 2011. LNCS, vol. 7055, pp. 19\u201331. Springer, Heidelberg (2012)"},{"key":"18_CR14","doi-asserted-by":"crossref","unstructured":"Engels, D.W., Sarma, S.E.: The reader collision problem. In: 2002 IEEE International Conference on Systems, Man and Cybernetics, vol. 3, pp. 6\u201313. IEEE (2002)","DOI":"10.1109\/ICSMC.2002.1176117"},{"key":"18_CR15","unstructured":"EPC\u2122 Radio-Frequuency Identity Protocols Generation-2 UHF RFID Version 2.0.0 Ratified. EPCGLOBAL, November 2013"},{"key":"18_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1007\/978-3-642-17373-8_9","volume-title":"Advances in Cryptology - ASIACRYPT 2010","author":"X Feng","year":"2010","unstructured":"Feng, X., Liu, J., Zhou, Z., Wu, C., Feng, D.: A byte-based guess and determine attack on SOSEMANUK. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 146\u2013157. Springer, Heidelberg (2010)"},{"key":"18_CR17","doi-asserted-by":"publisher","DOI":"10.1002\/0470868023","volume-title":"RFID Handbook","author":"K Finkenzeller","year":"2003","unstructured":"Finkenzeller, K.: RFID Handbook. Wiley Online Library, Hoboken (2003)"},{"key":"18_CR18","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"RFID","author":"Z Gong","year":"2012","unstructured":"Gong, Z., Nikova, S., Law, Y.W.: KLEIN: a new family of lightweight block ciphers. In: Juels, A., Paar, C. (eds.) RFIDSec 2011. LNCS, vol. 7055, pp. 1\u201318. Springer, Heidelberg (2012)"},{"key":"18_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/11535218_18","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"A Juels","year":"2005","unstructured":"Juels, A., Weis, S.A.: Authenticating pervasive devices with human protocols. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 293\u2013308. Springer, Heidelberg (2005)"},{"issue":"2","key":"18_CR20","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1016\/j.ipl.2014.10.010","volume":"115","author":"F Karako\u00e7","year":"2015","unstructured":"Karako\u00e7, F., Demirci, H., Harmanc\u0131, A.E.: AKF: a key alternating Feistel scheme for lightweight cipher designs. Inf. Process. Lett. 115(2), 359\u2013367 (2015)","journal-title":"Inf. Process. Lett."},{"issue":"5","key":"18_CR21","doi-asserted-by":"publisher","first-page":"778","DOI":"10.1109\/49.223880","volume":"11","author":"S Kawamura","year":"1993","unstructured":"Kawamura, S., Shimbo, A.: Fast server-aided secret computation protocols for modular exponentiation. IEEE J. Sel. Areas Commun. 11(5), 778\u2013784 (1993)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"18_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-642-15031-9_2","volume-title":"Cryptographic Hardware and Embedded Systems, CHES 2010","author":"L Knudsen","year":"2010","unstructured":"Knudsen, L., Leander, G., Poschmann, A., Robshaw, M.J.B.: PRINTcipher: a block cipher for IC-printing. In: Mangard, S., Standaert, F.-X. (eds.) CHES 2010. LNCS, vol. 6225, pp. 16\u201332. Springer, Heidelberg (2010)"},{"key":"18_CR23","doi-asserted-by":"crossref","unstructured":"Luo, Y., Chai, Q., Gong, G., Lai, X.: A lightweight stream cipher WG-7 for RFID encryption and authentication. In: GLOBECOM 2010, pp. 1\u20136, Miami, FL, US, December 2010","DOI":"10.1109\/GLOCOM.2010.5684215"},{"key":"18_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"M Matsui","year":"1994","unstructured":"Matsui, M.: Linear cryptanalysis method for DES cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 386\u2013397. Springer, Heidelberg (1994)"},{"issue":"1","key":"18_CR25","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1093\/ietfec\/e89-a.1.2","volume":"E77","author":"M Matsui","year":"1994","unstructured":"Matsui, M., Yamagishi, A.: A new cryptanalytic method for FEAL cipher. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. E77(1), 2\u20137 (1994)","journal-title":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci."},{"key":"18_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1007\/BFb0053460","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"K Nyberg","year":"1995","unstructured":"Nyberg, K.: Linear approximation of block ciphers. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 439\u2013444. Springer, Heidelberg (1995)"},{"issue":"7","key":"18_CR27","doi-asserted-by":"publisher","first-page":"3398","DOI":"10.1109\/TIT.2009.2021316","volume":"55","author":"E Pasalic","year":"2009","unstructured":"Pasalic, E.: On guess and determine cryptanalysis of LFSR-based stream ciphers. IEEE Trans. Inf. Theory 55(7), 3398\u20133406 (2009)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"18_CR28","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1109\/JRPROC.1961.287814","volume":"49","author":"WW Peterson","year":"1961","unstructured":"Peterson, W.W., Brown, D.T.: Cyclic codes for error detection. Proc. IRE 49(1), 228\u2013235 (1961). doi:10.1109\/JRPROC.1961.287814. ISSN 0096-8390","journal-title":"Proc. IRE"},{"key":"18_CR29","doi-asserted-by":"crossref","unstructured":"Ranasinghe, D.C., Engels, D.W., Cole, P.H.: Low cost RFID systems: confronting security and privacy. In: Paper Auto-ID Labs White Paper Journal, vol. 1 (2005)","DOI":"10.1109\/ACSSC.2006.355129"},{"key":"18_CR30","unstructured":"Sarma, S.E.: Towards the 5 cent tag. White Paper-MIT Auto-ID Center (2001)"},{"key":"18_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1007\/978-3-642-23951-9_23","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2011","author":"K Shibutani","year":"2011","unstructured":"Shibutani, K., Isobe, T., Hiwatari, H., Mitsuda, A., Akishita, T., Shirai, T.: Piccolo: an ultra-lightweight blockcipher. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 342\u2013357. Springer, Heidelberg (2011)"},{"key":"18_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/978-3-642-21554-4_19","volume-title":"Applied Cryptography and Network Security","author":"W Wu","year":"2011","unstructured":"Wu, W., Zhang, L.: LBlock: a lightweight block cipher. In: Lopez, J., Tsudik, G. (eds.) ACNS 2011. LNCS, vol. 6715, pp. 327\u2013344. Springer, Heidelberg (2011)"}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-28166-7_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T02:42:50Z","timestamp":1748745770000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-28166-7_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319281650","9783319281667"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-28166-7_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"9 January 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}