{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T00:16:56Z","timestamp":1743034616606,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319458700"},{"type":"electronic","value":"9783319458717"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-45871-7_2","type":"book-chapter","created":{"date-parts":[[2016,8,25]],"date-time":"2016-08-25T04:25:24Z","timestamp":1472099124000},"page":"18-34","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Improved Linear Cryptanalysis of Round-Reduced ARIA"],"prefix":"10.1007","author":[{"given":"Ahmed","family":"Abdelkhalek","sequence":"first","affiliation":[]},{"given":"Mohamed","family":"Tolba","sequence":"additional","affiliation":[]},{"given":"Amr M.","family":"Youssef","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,26]]},"reference":[{"key":"2_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/978-3-319-26617-6_9","volume-title":"Progress in Cryptology - INDOCRYPT 2015","author":"MA Abdelraheem","year":"2015","unstructured":"Abdelraheem, M.A., Alizadeh, J., Alkhzaimi, H.A., Aref, M.R., Bagheri, N., Gauravaram, P.: Improved linear cryptanalysis of reduced-round SIMON-32 and SIMON-48. In: Biryukov, A., Goyal, V. (eds.) Progress in Cryptology - INDOCRYPT 2015. LNCS, vol. 9462, pp. 153\u2013179. Springer, Cham (2015). \n                      http:\/\/dx.doi.org\/10.1007\/978-3-319-26617-6_9"},{"key":"2_CR2","series-title":"Lecture Notes in Computer Science","volume-title":"Progress in Cryptology \u2013 INDOCRYPT 2015","year":"2015","unstructured":"Biryukov, A., Goyal, V. (eds.): Progress in Cryptology \u2013 INDOCRYPT 2015. LNCS, vol. 9462. Springer, Cham (2015). \n                      http:\/\/dx.doi.org\/10.1007\/978-3-319-26617-6_11"},{"key":"2_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1007\/978-3-319-27659-5_11","volume-title":"Information Security","author":"D Bai","year":"2015","unstructured":"Bai, D., Yu, H.: Improved meet-in-the-middle attacks on round-reduced ARIA. In: Desmedt, Y. (ed.) ISC 2013. LNCS, vol. 7807, pp. 155\u2013168. Springer, Heidelberg (2015). \n                      http:\/\/dx.doi.org\/10.1007\/978-3-319-27659-5_11"},{"key":"2_CR4","unstructured":"Biryukov, A., De Canniere, C., Lano, J., Ors, S.B., Preneel, B.: Security and performance analysis of ARIA, version 1.2. Technical report, Katholieke Universiteit Leuven, Belgium (2004).\n                      http:\/\/www.cosic.esat.kuleuven.be\/publications\/article-500. pdf"},{"key":"2_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-60590-8_21","volume-title":"Fast Software Encryption","author":"J Daemen","year":"1995","unstructured":"Daemen, J., Govaerts, R., Vandewalle, J.: Fast Software Encryption. LNCS, vol. 1008. Springer, Heidelberg (1995). \n                      http:\/\/dx.doi.org\/10.1007\/3-540-60590-8_21"},{"key":"2_CR6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The Design of Rijndael","author":"J Daemen","year":"2002","unstructured":"Daemen, J., Rijmen, V.: The Design of Rijndael. Springer, New York (2002)"},{"key":"2_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1007\/978-3-642-17619-7_2","volume-title":"Cryptology and Network Security","author":"C Du","year":"2010","unstructured":"Du, C., Chen, J.: Impossible differential cryptanalysis of ARIA reduced to 7 rounds. In: Heng, S.-H., Wright, R.N., Goi, B.-M. (eds.) CANS 2010. LNCS, vol. 6467, pp. 20\u201330. Springer, Heidelberg (2010). \n                      http:\/\/dx.doi.org\/10.1007\/978-3-642-17619-7_2"},{"key":"2_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/978-3-642-17401-8_13","volume-title":"Progress in Cryptology - INDOCRYPT 2010","author":"E Fleischmann","year":"2010","unstructured":"Fleischmann, E., Forler, C., Gorski, M., Lucks, S.: New boomerang attacks on ARIA. In: Gong, G., Gupta, K.C. (eds.) INDOCRYPT 2010. LNCS, vol. 6498, pp. 163\u2013175. Springer, Heidelberg (2010). \n                      http:\/\/dx.doi.org\/10.1007\/978-3-642-17401-8_13"},{"key":"2_CR9","unstructured":"Korean Agency for Technology and Standards (KATS): 128-bit Block Encryption Algorithm ARIA KS X 1213\u20131: December 2014 (in Korean)"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Kim, W., Lee, J., Park, J., Kwon, D.: Addition of the ARIA cipher suites to Transport Layer Security (TLS). RFC 6209, RFC Editor, April 2011. \n                      http:\/\/www.rfc-editor.org\/rfc\/rfc6209.txt\n                      \n                    , \n                      http:\/\/www.rfc-editor.org\/rfc\/rfc6209.txt","DOI":"10.17487\/rfc6209"},{"key":"2_CR11","series-title":"Lecture Notes in Computer Science","volume-title":"Information Security and Cryptology - ICISC 2003","author":"K Daesung","year":"2004","unstructured":"Daesung, K., et al.: Information Security and Cryptology - ICISC 2003. LNCS, vol. 2971. Springer, Heidelberg (2004). \n                      http:\/\/dx.doi.org\/10.1007\/978-3-540-24691-6_32"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Lee, J., Lee, J., Kim, J., Kwon, D., Kim, C.: A Description of the ARIA Encryption Algorithm. RFC 5794, RFC Editor, March 2010","DOI":"10.17487\/rfc5794"},{"key":"2_CR13","unstructured":"Leurent, G.: Improved differential-linear cryptanalysis of 7-round chaskey with partitioning. Cryptology ePrint Archive, Report 2015\/968 (2015). \n                      http:\/\/eprint.iacr.org\/"},{"key":"2_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-16342-5_1","volume-title":"Information Security and Cryptology","author":"P Li","year":"2010","unstructured":"Li, P., Sun, B., Li, C.: Integral cryptanalysis of ARIA. In: Bao, F., Yung, M., Lin, D., Jing, J. (eds.) Inscrypt 2009. LNCS, vol. 6151, pp. 1\u201314. Springer, Heidelberg (2010). \n                      http:\/\/dx.doi.org\/10.1007\/978-3-642-16342-5_1"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Li, S., Song, C.: Improved impossible differential cryptanalysis of ARIA. In: A Description of the ARIA Encryption Algorithm. RFC 5794, RFC Editor International Conference on Information Security and Assurance, ISA 2008, pp. 129\u2013132, April 2008","DOI":"10.1109\/ISA.2008.10"},{"key":"2_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-642-12827-1_2","volume-title":"Information Security, Practice and Experience","author":"Y Li","year":"2010","unstructured":"Li, Y., Wu, W., Zhang, L.: Integral attacks on reduced-round ARIA block cipher. In: Kwak, J., Deng, R.H., Won, Y., Wang, G. (eds.) ISPEC 2010. LNCS, vol. 6047, pp. 19\u201329. Springer, Heidelberg (2010). \n                      http:\/\/dx.doi.org\/10.1007\/978-3-642-12827-1_2"},{"key":"2_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1007\/978-3-642-25243-3_20","volume-title":"Information and Communications Security","author":"Z Liu","year":"2011","unstructured":"Liu, Z., Gu, D., Liu, Y., Li, J., Li, W.: Linear cryptanalysis of ARIA block cipher. In: Qing, S., Susilo, W., Wang, G., Liu, D. (eds.) ICICS 2011. LNCS, vol. 7043, pp. 242\u2013254. Springer, Heidelberg (2011). \n                      http:\/\/dx.doi.org\/10.1007\/978-3-642-25243-3_20"},{"key":"2_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"M Matsui","year":"1994","unstructured":"Matsui, M.: Linear cryptanalysis method for DES cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 386\u2013397. Springer, Heidelberg (1994). \n                      http:\/\/dx.doi.org\/10.1007\/3-540-48285-7_33"},{"key":"2_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/3-540-47555-9_7","volume-title":"Advances in Cryptology - EUROCRYPT \u201992","author":"M Matsui","year":"1993","unstructured":"Matsui, M., Yamagishi, A.: A new method for known plaintext attack of FEAL cipher. In: Rueppel, R.A. (ed.) EUROCRYPT 1992. LNCS, vol. 658, pp. 81\u201391. Springer, Heidelberg (1993). \n                      http:\/\/dx.doi.org\/10.1007\/3-540-47555-9_7"},{"key":"2_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1007\/BFb0053460","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"K Nyberg","year":"1995","unstructured":"Nyberg, K.: Linear approximation of block ciphers. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 439\u2013444. Springer, Heidelberg (1995). \n                      http:\/\/dx.doi.org\/10.1007\/BFb0053460"},{"key":"2_CR21","unstructured":"Li, R., Bing Sun, P.Z., Li, C.: New Impossible Differential Cryptanalysis of ARIA. Cryptology ePrint Archive, Report 2008\/227 (2008). \n                      http:\/\/eprint.iacr.org\/2008\/227.pdf"},{"issue":"1","key":"2_CR22","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/s00145-007-9013-7","volume":"21","author":"AA Sel\u00e7uk","year":"2007","unstructured":"Sel\u00e7uk, A.A.: On probability of success in linear and differential cryptanalysis. J. Cryptology 21(1), 131\u2013147 (2007). \n                      http:\/\/dx.doi.org\/10.1007\/s00145-007-9013-7","journal-title":"J. Cryptology"},{"issue":"10","key":"2_CR23","doi-asserted-by":"publisher","first-page":"1685","DOI":"10.1016\/j.jss.2011.04.053","volume":"84","author":"X Tang","year":"2011","unstructured":"Tang, X., Sun, B., Li, R., Li, C., Yin, J.: A meet-in-the-middle attack on reduced-round ARIA. J. Syst. Softw. 84(10), 1685\u20131692 (2011). \n                      http:\/\/www.sciencedirect.com\/science\/article\/pii\/S016412121100104X","journal-title":"J. Syst. Softw."},{"issue":"3","key":"2_CR24","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1007\/s11390-007-9056-0","volume":"22","author":"WL Wu","year":"2007","unstructured":"Wu, W.L., Zhang, W.T., Feng, D.G.: Impossible differential cryptanalysis of reduced-round ARIA and Camellia. J. Comput. Sci. Technol. 22(3), 449\u2013456 (2007). \n                      http:\/\/dx.doi.org\/10.1007\/s11390-007-9056-0","journal-title":"J. Comput. Sci. Technol."},{"key":"2_CR25","unstructured":"zhen Chen Tian-min Xu, S.: Biclique Attack of the Full ARIA-256. Cryptology ePrint Archive, Report 2012\/011 (2012). \n                      http:\/\/eprint.iacr.org\/2012\/011.pdf"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-45871-7_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T01:07:55Z","timestamp":1558314475000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-45871-7_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319458700","9783319458717"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-45871-7_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"26 August 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Honolulu","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 September 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 September 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isw2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}