{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T06:58:25Z","timestamp":1774335505011,"version":"3.50.1"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319403663","type":"print"},{"value":"9783319403670","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-40367-0_26","type":"book-chapter","created":{"date-parts":[[2016,6,29]],"date-time":"2016-06-29T14:53:42Z","timestamp":1467212022000},"page":"409-424","source":"Crossref","is-referenced-by-count":15,"title":["Linear Hull Attack on Round-Reduced Simeck with Dynamic Key-Guessing Techniques"],"prefix":"10.1007","author":[{"given":"Lingyue","family":"Qin","sequence":"first","affiliation":[]},{"given":"Huaifeng","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Xiaoyun","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,6,30]]},"reference":[{"key":"26_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1007\/978-3-319-26617-6_9","volume-title":"Progress in Cryptology-INDOCRYPT 2015","author":"MA Abdelraheem","year":"2015","unstructured":"Abdelraheem, M.A., Alizadeh, J., Alkhzaimi, H.A., Aref, M.R., Bagheri, N., Gauravaram, P.: Improved linear cryptanalysis of reduced-round simon-32 and simon-48. In: Biryukov, A., Goyal, V. (eds.) Progress in Cryptology-INDOCRYPT 2015. LNCS, pp. 153\u2013179. Springer, Heidelberg (2015)"},{"key":"26_CR2","unstructured":"Abdelraheem, M.A., Alizadeh, J., Alkhzaimi, H.A., Aref, M.R., Bagheri, N., Gauravaram, P., Lauridsen, M.M.: Improved linear cryptanalysis of reduced-round simon. Technical report, Cryptology ePrint Archive, Report 2014\/681 (2014). http:\/\/eprint.iacr.org"},{"key":"26_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"525","DOI":"10.1007\/978-3-662-46706-0_27","volume-title":"Fast Software Encryption","author":"F Abed","year":"2015","unstructured":"Abed, F., List, E., Lucks, S., Wenzel, J.: Differential cryptanalysis of round-reduced simon and speck. In: Cid, C., Rechberger, C. (eds.) FSE 2014. LNCS, vol. 8540, pp. 525\u2013545. Springer, Heidelberg (2015)"},{"key":"26_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1007\/978-3-319-13066-8_6","volume-title":"Radio Frequency Identification: Security and Privacy Issues","author":"J Alizadeh","year":"2014","unstructured":"Alizadeh, J., Alkhzaimi, H.A., Aref, M.R., Bagheri, N., Gauravaram, P., Kumar, A., Lauridsen, M.M., Sanadhya, S.K.: Cryptanalysis of SIMON variants with connections. In: Sadeghi, A.-R., Saxena, N. (eds.) RFIDSec 2014. LNCS, vol. 8651, pp. 90\u2013107. Springer, Heidelberg (2014)"},{"key":"26_CR5","unstructured":"AlKhzaimi, H., Lauridsen, M.M.: Cryptanalysis of the simon family of block ciphers. IACR Cryptology ePrint Archive, 2013:543 (2013)"},{"key":"26_CR6","unstructured":"Ashur, T.: Improved linear trails for the block cipher simon. IACR Cryptology ePrint Archive, 2015:285 (2015)"},{"key":"26_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1007\/978-3-319-26617-6_8","volume-title":"Progress in Cryptology-INDOCRYPT 2015","author":"N Bagheri","year":"2015","unstructured":"Bagheri, N.: Linear cryptanalysis of reduced-round simeck variants. In: Goyal, V., Biryukov, A. (eds.) Progress in Cryptology-INDOCRYPT 2015. LNCS, pp. 140\u2013152. Springer, Heidelberg (2015)"},{"key":"26_CR8","unstructured":"Ray, B., Douglas, S., Jason, S., Stefan, T.-C., Bryan, W., Louis, W.: The simon and speck families of lightweight block ciphers. IACR Cryptology ePrint Archive, 2013:404 (2013)"},{"key":"26_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"546","DOI":"10.1007\/978-3-662-46706-0_28","volume-title":"Fast Software Encryption","author":"A Biryukov","year":"2015","unstructured":"Biryukov, A., Roy, A., Velichkov, V.: Differential analysis of block ciphers SIMON and SPECK. In: Cid, C., Rechberger, C. (eds.) FSE 2014. LNCS, vol. 8540, pp. 546\u2013570. Springer, Heidelberg (2015)"},{"key":"26_CR10","unstructured":"Chen, H., Wang, X.: Improved linear hull attack on round-reduced simon with dynamickey-guessing techniques.Technical report, Cryptology ePrint Archive, Report 2015\/666, July 2015. http:\/\/eprint.iacr.org\/2015\/666.pdf"},{"key":"26_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/978-3-662-47989-6_8","volume-title":"Advances in Cryptology-CRYPTO 2015","author":"S K\u00f6lbl","year":"2015","unstructured":"K\u00f6lbl, S., Leander, G., Tiessen, T.: Observations on the simon block cipher family. In: Gennaro, R., Robshaw, M. (eds.) Advances in Cryptology-CRYPTO 2015. LNCS, pp. 161\u2013185. Springer, Heidelberg (2015)"},{"key":"26_CR12","unstructured":"K\u00f6lbl, S., Roy, A.: A brief comparison of simon and simeck. Technical report, Cryptology ePrint Archive, Report 2015\/706 (2015)"},{"key":"26_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume-title":"Advances in Cryptology - EUROCRYPT 1993","author":"M Matsui","year":"1994","unstructured":"Matsui, M.: Linear cryptanalysis method for DES cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 386\u2013397. Springer, Heidelberg (1994)"},{"key":"26_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"439","DOI":"10.1007\/BFb0053460","volume-title":"Advances in Cryptology - EUROCRYPT 1994","author":"K Nyberg","year":"1995","unstructured":"Nyberg, K.: Linear approximation of block ciphers. In: Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 439\u2013444. Springer, Heidelberg (1995)"},{"key":"26_CR15","unstructured":"Qiao, K., Hu, L., Sun, S.: Differential analysis on simeck and simon with dynamic key-guessing techniques. Cryptology ePrint Archive, Report 2015\/902 (2015). http:\/\/eprint.iacr.org\/"},{"key":"26_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"174","DOI":"10.1007\/3-540-36413-7_13","volume-title":"Security in Communication Networks","author":"AA Sel\u00e7uk","year":"2003","unstructured":"Sel\u00e7uk, A.A., Bi\u00e7ak, A.: On Probability of Success in Linear and Differential Cryptanalysis. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, vol. 2576, pp. 174\u2013185. Springer, Heidelberg (2003)"},{"key":"26_CR17","unstructured":"Shi, D., Hu, L., Sun, S., Song, L., Qiao, K., Ma, X.: Improved linear (hull) cryptanalysis of round-reduced versions of simon. Technical report, IACR Cryptology ePrint Archive, Report 2014\/973 (2014). http:\/\/eprint.iacr.org\/2014\/973"},{"key":"26_CR18","unstructured":"Wang, N., Wang, X., Jia, K., Zhao, J.: Differential attacks on reduced simon versions with dynamic key-guessing techniques. Technical report, Cryptology ePrint Archive, Report 2014\/448 (2014)"},{"key":"26_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1007\/978-3-319-25417-3","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2015","author":"G Yang","year":"2015","unstructured":"Yang, G., Zhu, B., Suder, V., Aagaard, M.D., Gong, G.: The simeck family of lightweight block ciphers. In: G\u00fcneysu, T., Handschuh, H. (eds.) CHES 2015. LNCS, vol. 9293, pp. 307\u2013329. Springer, Heidelberg (2015)"},{"key":"26_CR20","unstructured":"Zhang, K., Guan, J., Hu, B., Lin, D.: Security evaluation on simeck against zero correlation linear cryptanalysis. Cryptology ePrint Archive, Report 2015\/911 (2015). http:\/\/eprint.iacr.org\/"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-40367-0_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T13:27:55Z","timestamp":1498310875000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-40367-0_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319403663","9783319403670"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-40367-0_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]}}}