{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T03:00:40Z","timestamp":1725850840628},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319308395"},{"type":"electronic","value":"9783319308401"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-30840-1_8","type":"book-chapter","created":{"date-parts":[[2016,3,9]],"date-time":"2016-03-09T14:15:22Z","timestamp":1457532922000},"page":"119-135","source":"Crossref","is-referenced-by-count":1,"title":["Single Key Recovery Attacks on 9-Round Kalyna-128\/256 and Kalyna-256\/512"],"prefix":"10.1007","author":[{"family":"Akshima","sequence":"first","affiliation":[]},{"given":"Donghoon","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Mohona","family":"Ghosh","sequence":"additional","affiliation":[]},{"given":"Aarushi","family":"Goel","sequence":"additional","affiliation":[]},{"given":"Somitra Kumar","family":"Sanadhya","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,10]]},"reference":[{"key":"8_CR1","first-page":"762","volume":"2015","author":"R AlTawy","year":"2015","unstructured":"AlTawy, R., Abdelkhalek, A., Youssef, A.M.: A meet-in-the-middle attack on reduced-round kalyna-b\/2b. IACR Cryptol. ePrint Arch. 2015, 762 (2015). \n                      http:\/\/eprint.iacr.org\/2015\/762","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"8_CR2","series-title":"Information Security and Cryptography","volume-title":"The Design of Rijndael: AES - The Advanced Encryption Standard","author":"D Joan","year":"2002","unstructured":"Joan, D., Vincent, R.: The Design of Rijndael: AES - The Advanced Encryption Standard. Information Security and Cryptography. Springer, New York (2002)"},{"key":"8_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1007\/11832072_6","volume-title":"Security and Cryptography for Networks","author":"J Daemen","year":"2006","unstructured":"Daemen, J., Rijmen, V.: Understanding two-round differentials in AES. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol. 4116, pp. 78\u201394. Springer, Heidelberg (2006)"},{"key":"8_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/978-3-540-71039-4_7","volume-title":"Fast Software Encryption","author":"H Demirci","year":"2008","unstructured":"Demirci, H., Sel\u00e7uk, A.A.: A meet-in-the-middle attack on 8-round AES. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 116\u2013126. Springer, Heidelberg (2008)"},{"key":"8_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1007\/978-3-642-38348-9_23","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2013","author":"P Derbez","year":"2013","unstructured":"Derbez, P., Fouque, P.-A., Jean, J.: Improved key recovery attacks on reduced-round AES in the single-key setting. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 371\u2013387. Springer, Heidelberg (2013)"},{"issue":"3","key":"8_CR6","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1007\/s00145-013-9159-4","volume":"28","author":"O Dunkelman","year":"2015","unstructured":"Dunkelman, O., Keller, N., Shamir, A.: Improved single-key attacks on 8-round AES-192 and AES-256. J. Cryptol. 28(3), 397\u2013422 (2015)","journal-title":"J. Cryptol."},{"key":"8_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1007\/978-3-642-10366-7_8","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2009","author":"M Lamberger","year":"2009","unstructured":"Lamberger, M., Mendel, F., Rechberger, C., Rijmen, V., Schl\u00e4ffer, M.: Rebound distinguishers: results on the full whirlpool compression function. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 126\u2013143. Springer, Heidelberg (2009)"},{"key":"8_CR8","series-title":"Lecture Notes in Computer Science","first-page":"127","volume-title":"Fast Software Encryption","author":"L Li","year":"2015","unstructured":"Li, L., Jia, K., Wang, X.: Improved single-key attacks on 9-round AES-192\/256. In: Cid, C., Rechberger, C. (eds.) FSE 2014. LNCS, vol. 8540, pp. 127\u2013146. Springer, Heidelberg (2015)"},{"unstructured":"Oliynykov, R.: Next generation of block ciphers providing high-level security, June 2015. \n                      http:\/\/www.slideshare.net\/oliynykov\/next-generation-ciphers\/","key":"8_CR9"},{"key":"8_CR10","first-page":"650","volume":"2015","author":"R Oliynykov","year":"2015","unstructured":"Oliynykov, R., Gorbenko, I., Kazymyrov, O., Ruzhentsev, V., Kuznetsov, O., Gorbenko, Y., Dyrda, O., Dolgov, V., Pushkaryov, A., Mordvinov, R., Kaidalov, D.: A new encryption standard of Ukraine: The Kalyna block cipher. IACR Cryptol. ePrint Arch. 2015, 650 (2015). \n                      http:\/\/eprint.iacr.org\/2015\/650","journal-title":"IACR Cryptol. ePrint Arch."},{"unstructured":"Rongjia, L., Chenhui, J.: Meet-in-the-middle attacks on 10-round AES-256. Designs, Codes and Cryptography, pp. 1\u201313 (2015)","key":"8_CR11"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology - ICISC 2015"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-30840-1_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T18:02:16Z","timestamp":1559412136000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-30840-1_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319308395","9783319308401"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-30840-1_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}