{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T10:36:13Z","timestamp":1761993373728,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319491509"},{"type":"electronic","value":"9783319491516"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-49151-6_5","type":"book-chapter","created":{"date-parts":[[2016,11,4]],"date-time":"2016-11-04T02:09:46Z","timestamp":1478225386000},"page":"65-78","source":"Crossref","is-referenced-by-count":9,"title":["Security of SM4 Against (Related-Key) Differential Cryptanalysis"],"prefix":"10.1007","author":[{"given":"Jian","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Wenling","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Yafei","family":"Zheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,5]]},"reference":[{"key":"5_CR1","unstructured":"Gurobi: Gurobi optimizer reference mannual. http:\/\/www.gurobi.com"},{"key":"5_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/978-3-642-21554-4_4","volume-title":"Applied Cryptography and Network Security","author":"M Albrecht","year":"2011","unstructured":"Albrecht, M., Cid, C.: Cold boot key recovery by solving polynomial systems with noise. In: Lopez, J., Tsudik, G. (eds.) ACNS 2011. LNCS, vol. 6715, pp. 57\u201372. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-21554-4_4"},{"key":"5_CR3","series-title":"Lecture Notes in Computer Science, LNCS","first-page":"39","volume-title":"Selected Areas in Cryptography, SAC 2000","author":"K Aoki","year":"2000","unstructured":"Aoki, K., Ichikawa, T., Kanda, M., Matsui, M., Moriai, S., Nakajima, J., Tokita, T.: Camellia: a 128-bit block cipher suitable for multiple platforms design and analysis. In: Stinson, D.R., Tavares, S. (eds.) Selected Areas in Cryptography, SAC 2000. Lecture Notes in Computer Science, LNCS, vol. 2012, pp. 39\u201356. Springer, Heidelberg (2000)"},{"key":"5_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1007\/978-3-642-13190-5_17","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2010","author":"A Biryukov","year":"2010","unstructured":"Biryukov, A., Nikoli\u0107, I.: Automatic search for related-key differential characteristics in byte-oriented block ciphers: application to AES, Camellia, Khazad and others. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 322\u2013344. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-13190-5_17"},{"key":"5_CR5","unstructured":"Diffie, W., Ledin, G.: SMS4 encryption algorithm for wireless networks. IACR Cryptology ePrint Archive 2008:329 (2008)"},{"issue":"3","key":"5_CR6","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1007\/s12095-013-0096-8","volume":"6","author":"S Emami","year":"2014","unstructured":"Emami, S., Ling, S., Nikoli\u0107, I., Pieprzyk, J., Wang, H.: The resistance of PRESENT-80 against related-key differential attacks. Cryptogr. Commun. 6(3), 171\u2013187 (2014)","journal-title":"Cryptogr. Commun."},{"key":"5_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/978-3-642-04159-4_4","volume-title":"Selected Areas in Cryptography","author":"J Etrog","year":"2009","unstructured":"Etrog, J., Robshaw, M.J.B.: The cryptanalysis of reduced-round SMS4. In: Avanzi, R.M., Keliher, L., Sica, F. (eds.) SAC 2008. LNCS, vol. 5381, pp. 51\u201365. Springer, Heidelberg (2009). doi: 10.1007\/978-3-642-04159-4_4"},{"issue":"5","key":"5_CR8","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1145\/1506409.1506429","volume":"52","author":"JA Halderman","year":"2009","unstructured":"Halderman, J.A., Schoen, S.D., Heninger, N., Clarkson, W., Paul, W., Calandrino, J.A., Feldman, A.J., Appelbaum, J., Felten, E.W.: Lest we remember: cold-boot attacks on encryption keys. Commun. ACM 52(5), 91\u201398 (2009)","journal-title":"Commun. ACM"},{"key":"5_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1007\/3-540-44983-3_24","volume-title":"Selected Areas in Cryptography","author":"M Kanda","year":"2001","unstructured":"Kanda, M.: Practical security evaluation against differential and linear cryptanalyses for Feistel ciphers with SPN round function. In: Stinson, D.R., Tavares, S. (eds.) SAC 2000. LNCS, vol. 2012, pp. 324\u2013338. Springer, Heidelberg (2001). doi: 10.1007\/3-540-44983-3_24"},{"key":"5_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1007\/978-3-540-73458-1_13","volume-title":"Information Security and Privacy","author":"F Liu","year":"2007","unstructured":"Liu, F., Ji, W., Hu, L., Ding, J., Lv, S., Pyshkin, A., Weinmann, R.-P.: Analysis of the SMS4 block cipher. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. LNCS, vol. 4586, pp. 158\u2013170. Springer, Heidelberg (2007). doi: 10.1007\/978-3-540-73458-1_13"},{"key":"5_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1007\/978-3-540-77048-0_24","volume-title":"Information and Communications Security","author":"J Lu","year":"2007","unstructured":"Lu, J.: Attacking reduced-round versions of the SMS4 block cipher in the Chinese WAPI standard. In: Qing, S., Imai, H., Wang, G. (eds.) ICICS 2007. LNCS, vol. 4861, pp. 306\u2013318. Springer, Heidelberg (2007). doi: 10.1007\/978-3-540-77048-0_24"},{"key":"5_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/978-3-642-34704-7_5","volume-title":"Information Security and Cryptology","author":"N Mouha","year":"2012","unstructured":"Mouha, N., Wang, Q., Gu, D., Preneel, B.: Differential and linear cryptanalysis using mixed-integer linear programming. In: Wu, C.-K., Yung, M., Lin, D. (eds.) Inscrypt 2011. LNCS, vol. 7537, pp. 57\u201376. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-34704-7_5"},{"key":"5_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/978-3-642-19574-7_15","volume-title":"Selected Areas in Cryptography","author":"K Shibutani","year":"2011","unstructured":"Shibutani, K.: On the diffusion of generalized Feistel structures regarding differential and linear cryptanalysis. In: Biryukov, A., Gong, G., Stinson, D.R. (eds.) SAC 2010. LNCS, vol. 6544, pp. 211\u2013228. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-19574-7_15"},{"key":"5_CR14","unstructured":"IBM software group. CPLEX. http:\/\/www-01.ibm.com"},{"issue":"1","key":"5_CR15","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1007\/s11390-011-9420-y","volume":"26","author":"B-Z Su","year":"2011","unstructured":"Su, B.-Z., Wu, W.-L., Zhang, W.-T.: Security of the SMS4 block cipher against differential cryptanalysis. J. Comput. Sci. Technol. 26(1), 130\u2013138 (2011)","journal-title":"J. Comput. Sci. Technol."},{"key":"5_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/978-3-319-12087-4_3","volume-title":"Information Security and Cryptology","author":"S Sun","year":"2014","unstructured":"Sun, S., Hu, L., Song, L., Xie, Y., Wang, P.: Automatic security evaluation of block ciphers with S-bP structures against related-key differential attacks. In: Lin, D., Xu, S., Yung, M. (eds.) Inscrypt 2013. LNCS, vol. 8567, pp. 39\u201351. Springer, Heidelberg (2014). doi: 10.1007\/978-3-319-12087-4_3"},{"key":"5_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1007\/978-3-662-45611-8_9","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2014","author":"S Sun","year":"2014","unstructured":"Sun, S., Hu, L., Wang, P., Qiao, K., Ma, X., Song, L.: Automatic security evaluation and (related-key) differential characteristic search: application to SIMON, PRESENT, LBlock, DES(L) and other bit-oriented block ciphers. In: Sarkar, P., Iwata, T. (eds.) ASIACRYPT 2014. LNCS, vol. 8873, pp. 158\u2013178. Springer, Heidelberg (2014). doi: 10.1007\/978-3-662-45611-8_9"},{"key":"5_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/978-3-540-88625-9_10","volume-title":"Information and Communications Security","author":"D Toz","year":"2008","unstructured":"Toz, D., Dunkelman, O.: Analysis of two attacks on reduced-round versions of the SMS4. In: Chen, L., Ryan, M.D., Wang, G. (eds.) ICICS 2008. LNCS, vol. 5308, pp. 141\u2013156. Springer, Heidelberg (2008). doi: 10.1007\/978-3-540-88625-9_10"},{"key":"5_CR19","unstructured":"Wu, S., Wang, M.: Security evaluation against differential cryptanalysis for block cipher structures. Technical report, IACR Cryptology ePrint Archive, Report 2011\/551 (2011)"},{"issue":"3","key":"5_CR20","first-page":"215","volume":"3","author":"W Wenling","year":"2006","unstructured":"Wenling, W., Zhang, W., Lin, D.: Security on generalized Feistel scheme with SP round function. IJ Netw.Secur. 3(3), 215\u2013224 (2006)","journal-title":"IJ Netw.Secur."},{"key":"5_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1007\/978-3-540-70500-0_16","volume-title":"Information Security and Privacy","author":"L Zhang","year":"2008","unstructured":"Zhang, L., Zhang, W., Wu, W.: Cryptanalysis of reduced-round SMS4 block cipher. In: Mu, Y., Susilo, W., Seberry, J. (eds.) ACISP 2008. LNCS, vol. 5107, pp. 216\u2013229. Springer, Heidelberg (2008). doi: 10.1007\/978-3-540-70500-0_16"},{"key":"5_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1007\/978-3-540-70500-0_16","volume-title":"Information Security and Privacy","author":"L Zhang","year":"2008","unstructured":"Zhang, L., Zhang, W., Wu, W.: Cryptanalysis of reduced-round SMS4 block cipher. In: Mu, Y., Susilo, W., Seberry, J. (eds.) ACISP 2008. LNCS, vol. 5107, pp. 216\u2013229. Springer, Heidelberg (2008). doi: 10.1007\/978-3-540-70500-0_16"},{"key":"5_CR23","unstructured":"Zhang, M., Liu, J., Wang, X.: The upper bounds on differntial characteristics in block cipher SMS4. Technical report, IACR Cryptology ePrint Archive, Report 2010\/155 (2010)"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49151-6_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T02:46:22Z","timestamp":1498358782000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49151-6_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319491509","9783319491516"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49151-6_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}