{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:32:49Z","timestamp":1761676369888,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319313009"},{"type":"electronic","value":"9783319313016"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-31301-6_7","type":"book-chapter","created":{"date-parts":[[2016,3,18]],"date-time":"2016-03-18T17:11:22Z","timestamp":1458321082000},"page":"122-142","source":"Crossref","is-referenced-by-count":3,"title":["Improved Meet-in-the-Middle Distinguisher on Feistel Schemes"],"prefix":"10.1007","author":[{"given":"Li","family":"Lin","sequence":"first","affiliation":[]},{"given":"Wenling","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Yafei","family":"Zheng","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/3-540-44983-3_4","volume-title":"Selected Areas in Cryptography","author":"K Aoki","year":"2001","unstructured":"Aoki, K., Ichikawa, T., Kanda, M., Matsui, M., Moriai, S., Nakajima, J., Tokita, T.: \n                      \n                        \n                      \n                      $$Camellia$$\n                      \n                        \n                          \n                            C\n                            a\n                            m\n                            e\n                            l\n                            l\n                            i\n                            a\n                          \n                        \n                      \n                    : a 128-bit block cipher suitable for multiple platforms - design and analysis. In: Stinson, D.R., Tavares, S. (eds.) SAC 2000. LNCS, vol. 2012, pp. 39\u201356. Springer, Heidelberg (2001)"},{"key":"7_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1007\/978-3-662-43414-7_16","volume-title":"Selected Areas in Cryptography \u2013 SAC 2013","author":"A Bogdanov","year":"2014","unstructured":"Bogdanov, A., Geng, H., Wang, M., Wen, L., Collard, B.: Zero-correlation linear cryptanalysis with FFT and improved attacks on ISO standards Camellia and CLEFIA. In: Lange, T., Lauter, K., Lison\u011bk, P. (eds.) SAC 2013. LNCS, vol. 8282, pp. 306\u2013323. Springer, Heidelberg (2014)"},{"key":"7_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-642-22497-3_2","volume-title":"Information Security and Privacy","author":"J Chen","year":"2011","unstructured":"Chen, J., Jia, K., Yu, H., Wang, X.: New impossible differential attacks of reduced-round Camellia-192 and Camellia-256. In: Parampalli, U., Hawkes, P. (eds.) ACISP 2011. LNCS, vol. 6812, pp. 16\u201333. Springer, Heidelberg (2011)"},{"key":"7_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The Design of Rijndael: AES-the Advanced Encryption Standard","author":"J Daemen","year":"2002","unstructured":"Daemen, J., Rijmen, V.: The Design of Rijndael: AES-the Advanced Encryption Standard. Springer, Heidelberg (2002)"},{"key":"7_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/978-3-540-71039-4_7","volume-title":"Fast Software Encryption","author":"H Demirci","year":"2008","unstructured":"Demirci, H., Sel\u00e7uk, A.A.: A meet-in-the-middle attack on 8-round AES. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 116\u2013126. Springer, Heidelberg (2008)"},{"key":"7_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/978-3-642-10628-6_10","volume-title":"Progress in Cryptology - INDOCRYPT 2009","author":"H Demirci","year":"2009","unstructured":"Demirci, H., Ta\u015fk\u0131n, I., \u00c7oban, M., Baysal, A.: Improved meet-in-the-middle attacks on AES. In: Roy, B., Sendrier, N. (eds.) INDOCRYPT 2009. LNCS, vol. 5922, pp. 144\u2013156. Springer, Heidelberg (2009)"},{"key":"7_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1007\/978-3-642-38348-9_23","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2013","author":"P Derbez","year":"2013","unstructured":"Derbez, P., Fouque, P.-A., Jean, J.: Improved key recovery attacks on reduced-round AES in the single-key setting. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 371\u2013387. Springer, Heidelberg (2013)"},{"issue":"6","key":"7_CR8","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/C-M.1977.217750","volume":"10","author":"W Diffie","year":"1977","unstructured":"Diffie, W., Hellman, M.E.: Special feature exhaustive cryptanalysis of the NBS data encryption standard. Computer 10(6), 74\u201384 (1977)","journal-title":"Computer"},{"key":"7_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1007\/978-3-319-21042-1","volume-title":"Topics in Cryptology \u2014 CT-RSA 2015","author":"X Dong","year":"2015","unstructured":"Dong, X., Li, L., Jia, K., Wang, X.: Improved attacks on reduced-round Camellia-128\/192\/256. In: Nyberg, K. (ed.) CT-RSA 2015. LNCS, vol. 9048, pp. 59\u201383. Springer, Heidelberg (2015)"},{"key":"7_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1007\/978-3-642-17373-8_10","volume-title":"Advances in Cryptology - ASIACRYPT 2010","author":"O Dunkelman","year":"2010","unstructured":"Dunkelman, O., Keller, N., Shamir, A.: Improved single-key attacks on 8-round AES-192 and AES-256. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 158\u2013176. Springer, Heidelberg (2010)"},{"key":"7_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/978-3-642-40041-4_11","volume-title":"Advances in Cryptology \u2013 CRYPTO 2013","author":"P-A Fouque","year":"2013","unstructured":"Fouque, P.-A., Jean, J., Peyrin, T.: Structural evaluation of AES and Chosen-Key Distinguisher of 9-Round AES-128. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part I. LNCS, vol. 8042, pp. 183\u2013203. Springer, Heidelberg (2013)"},{"key":"7_CR12","unstructured":"Gilbert, H., Minier, M.: A collisions attack on the 7-rounds Rijndael. In: AES Candidate Conference, Citeseer (2000)"},{"key":"7_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"458","DOI":"10.1007\/978-3-662-45611-8_24","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2014","author":"J Guo","year":"2014","unstructured":"Guo, J., Jean, J., Nikoli\u0107, I., Sasaki, Y.: Meet-in-the-middle attacks on generic Feistel constructions. In: Sarkar, P., Iwata, T. (eds.) ASIACRYPT 2014. LNCS, vol. 8873, pp. 458\u2013477. Springer, Heidelberg (2014)"},{"key":"7_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1007\/978-3-642-35999-6_14","volume-title":"Selected Areas in Cryptography","author":"T Isobe","year":"2013","unstructured":"Isobe, T., Shibutani, K.: All subkeys recovery attack on block ciphers: extending meet-in-the-middle approach. In: Knudsen, L.R., Wu, H. (eds.) SAC 2012. LNCS, vol. 7707, pp. 202\u2013221. Springer, Heidelberg (2013)"},{"key":"7_CR15","unstructured":"Li, L., Jia, K.: Improved meet-in-the-middle attacks on reduced-round Camellia-192\/256. IACR Cryptology ePrint Archive 2014, 292 (2014)"},{"key":"7_CR16","unstructured":"Li, L., Jia, K., Wang, X.: Improved meet-in-the-middle attacks on AES-192 and PRINCE. IACR Cryptology ePrint Archive 2013, 573 (2013)"},{"key":"7_CR17","series-title":"Lecture Notes in Computer Science","first-page":"127","volume-title":"Fast Software Encryption","author":"L Li","year":"2015","unstructured":"Li, L., Jia, K., Wang, X.: Improved single-key attacks on 9-round AES-192\/256. In: Cid, C., Rechberger, C. (eds.) FSE 2014. LNCS, vol. 8540, pp. 127\u2013146. Springer, Heidelberg (2015)"},{"key":"7_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1007\/978-3-319-12160-4_13","volume-title":"Information Security and Cryptology \u2013 ICISC 2013","author":"L Lin","year":"2014","unstructured":"Lin, L., Wu, W., Wang, Y., Zhang, L.: General model of the single-key meet-in-the-middle distinguisher on the word-oriented block cipher. In: Lee, H.-S., Han, D.-G. (eds.) ICISC 2013. LNCS, vol. 8565, pp. 203\u2013223. Springer, Heidelberg (2014)"},{"key":"7_CR19","unstructured":"Jiqiang, L.: Cryptanalysis of block ciphers. Ph.D. thesis. University of London, UK (2008)"},{"issue":"3","key":"7_CR20","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1049\/iet-ifs.2011.0342","volume":"6","author":"L Jiqiang","year":"2012","unstructured":"Jiqiang, L., Wei, Y., Fouque, P.-A., Kim, J.: Cryptanalysis of reduced versions of the Camellia block cipher. IET Inf. Secur. 6(3), 228\u2013238 (2012)","journal-title":"IET Inf. Secur."},{"key":"7_CR21","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.tcs.2014.01.031","volume":"527","author":"L Jiqiang","year":"2014","unstructured":"Jiqiang, L., Wei, Y., Kim, J., Pasalic, E.: The higher-order meet-in-the-middle attack and its application to the Camellia block cipher. Theoret. Comput. Sci. 527, 102\u2013122 (2014)","journal-title":"Theoret. Comput. Sci."},{"key":"7_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1007\/BFb0053451","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"M Matsui","year":"1995","unstructured":"Matsui, M.: On correlation between the order of S-Boxes and the strength of DES. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 366\u2013375. Springer, Heidelberg (1995)"},{"key":"7_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/BFb0034838","volume-title":"Advances in Cryptology - ASIACRYPT \u201996","author":"K Nyberg","year":"1996","unstructured":"Nyberg, K.: Generalized Feistel networks. In: Kim, K., Matsumoto, T. (eds.) ASIACRYPT 1996. LNCS, vol. 1163, pp. 91\u2013104. Springer, Heidelberg (1996)"},{"key":"7_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/978-3-540-74619-5_12","volume-title":"Fast Software Encryption","author":"T Shirai","year":"2007","unstructured":"Shirai, T., Shibutani, K., Akishita, T., Moriai, S., Iwata, T.: The 128-bit blockcipher CLEFIA (extended abstract). In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 181\u2013195. Springer, Heidelberg (2007)"},{"key":"7_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/978-3-642-17401-8_15","volume-title":"Progress in Cryptology - INDOCRYPT 2010","author":"C Tezcan","year":"2010","unstructured":"Tezcan, C.: The improbable differential attack: cryptanalysis of reduced round CLEFIA. In: Gong, G., Gupta, K.C. (eds.) INDOCRYPT 2010. LNCS, vol. 6498, pp. 197\u2013209. Springer, Heidelberg (2010)"}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography \u2013 SAC 2015"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-31301-6_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,11]],"date-time":"2019-08-11T20:02:58Z","timestamp":1565553778000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-31301-6_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319313009","9783319313016"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-31301-6_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}