{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T00:42:50Z","timestamp":1743036170850,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319547046"},{"type":"electronic","value":"9783319547053"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-54705-3_2","type":"book-chapter","created":{"date-parts":[[2017,3,2]],"date-time":"2017-03-02T14:03:43Z","timestamp":1488463423000},"page":"18-32","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Improved Differential Cryptanalysis of CAST-128 and CAST-256"],"prefix":"10.1007","author":[{"given":"Shaomei","family":"Wang","sequence":"first","affiliation":[]},{"given":"Tingting","family":"Cui","sequence":"additional","affiliation":[]},{"given":"Meiqin","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,3]]},"reference":[{"key":"2_CR1","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1023\/A:1008229029587","volume":"9","author":"C Adams","year":"1997","unstructured":"Adams, C.: Constructing symmetric ciphers using the CAST design procedure. Des. Codes Crypt. 9, 283\u2013316 (1997)","journal-title":"Des. Codes Crypt."},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Adams, C.: The CAST-128 Encryption Algorithm. RFC 2144 (1997)","DOI":"10.17487\/rfc2144"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Adams, C., Cilchist, J.: The CAST-256 Encryption Algorithm. RFC 2612 (1997)","DOI":"10.17487\/rfc2144"},{"key":"2_CR4","unstructured":"Adams, C., Heys, H.: An analysis of the CAST-256 cipher. In: IEEE Canadian Conference on Electrical and Computer Engineering, pp. 9\u201312. IEEE Press, Canada (1999)"},{"key":"2_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1007\/3-540-48285-7_34","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 1993","author":"E Biham","year":"1994","unstructured":"Biham, E.: New types of cryptanalytic attacks using related keys. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 398\u2013409. Springer, Heidelberg (1994). doi: 10.1007\/3-540-48285-7_34"},{"key":"2_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/3-540-38424-3_1","volume-title":"Advances in Cryptology-CRYPT0 1990","author":"E Biham","year":"1991","unstructured":"Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. In: Menezes, A.J., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 2\u201321. Springer, Heidelberg (1991). doi: 10.1007\/3-540-38424-3_1"},{"key":"2_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4613-9314-6","volume-title":"Differential Cryptanalysis of the Data Encryption Standard","author":"E Biham","year":"1993","unstructured":"Biham, E., Shamir, A.: Differential Cryptanalysis of the Data Encryption Standard. Springer New York, New York (1993)"},{"key":"2_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/978-3-642-34961-4_16","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2012","author":"A Bogdanov","year":"2012","unstructured":"Bogdanov, A., Leander, G., Nyberg, K., Wang, M.: Integral and multidimensional linear distinguishers with correlation zero. In: Wang, X., Sako, K. (eds.) ASIACRYPT 2012. LNCS, vol. 7658, pp. 244\u2013261. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-34961-4_16"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Cui, T., Chen, H., Wen, L., Wang, M.: Statistic integral attack on CAST-256 and IDEA. In: ArcticCrypt 2016, Longyearbyen (2016)","DOI":"10.1007\/s12095-017-0245-6"},{"key":"2_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-45537-X_1","volume-title":"Selected Areas in Cryptography","author":"S Fluhrer","year":"2001","unstructured":"Fluhrer, S., Mantin, I., Shamir, A.: Weaknesses in the key scheduling algorithm of RC4. In: Vaudenay, S., Youssef, A.M. (eds.) SAC 2001. LNCS, vol. 2259, pp. 1\u201324. Springer, Heidelberg (2001). doi: 10.1007\/3-540-45537-X_1"},{"key":"2_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1007\/978-3-642-17401-8_20","volume-title":"Progress in Cryptology - INDOCRYPT 2010","author":"H Mala","year":"2010","unstructured":"Mala, H., Dakhilalian, M., Rijmen, V., Modarres-Hashemi, M.: Improved impossible differential cryptanalysis of 7-Round AES-128. In: Gong, G., Gupta, K.C. (eds.) INDOCRYPT 2010. LNCS, vol. 6498, pp. 282\u2013291. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-17401-8_20"},{"key":"2_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/3-540-47555-9_7","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 1992","author":"M Matsui","year":"1993","unstructured":"Matsui, M., Yamagishi, A.: A new method for known plaintext attack of FEAL cipher. In: Rueppel, R.A. (ed.) EUROCRYPT 1992. LNCS, vol. 658, pp. 81\u201391. Springer, Heidelberg (1993). doi: 10.1007\/3-540-47555-9_7"},{"key":"2_CR13","unstructured":"National Institute of Standards and Technology: Advanced Encryption Standard(AES). crsc.nist.gov\/encryption\/aes"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Nakahara, J., Rasmussen, M.: Linear analysis of reduced-round CAST-128 and CAST-256. In: SBSEG2007, pp. 45\u201355. Brazil (2007)","DOI":"10.5753\/sbseg.2007.20914"},{"key":"2_CR15","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/s00145-007-9013-7","volume":"21","author":"A Sel\u00e7uk","year":"2008","unstructured":"Sel\u00e7uk, A., Bicak, A.: On probability of success in linear and differential cryptanalysis. J. Crypt. 21, 131\u2013147 (2008)","journal-title":"J. Crypt."},{"key":"2_CR16","first-page":"913","volume":"E84\u2013A","author":"H Seki","year":"2001","unstructured":"Seki, H., Kaneko, T.: Differential cryptanalysis of CAST-256 reduced to nine quad-rounds. IEICE Trans. Fundam. E84\u2013A, 913\u2013918 (2001)","journal-title":"IEICE Trans. Fundam."},{"key":"2_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1007\/3-540-48519-8_12","volume-title":"Fast Software Encryption","author":"D Wagner","year":"1999","unstructured":"Wagner, D.: The boomerang attack. In: Knudsen, L. (ed.) FSE 1999. LNCS, vol. 1636, pp. 156\u2013170. Springer, Heidelberg (1999). doi: 10.1007\/3-540-48519-8_12"},{"key":"2_CR18","doi-asserted-by":"publisher","first-page":"2744","DOI":"10.1587\/transfun.E93.A.2744","volume":"E93\u2013A","author":"M Wang","year":"2010","unstructured":"Wang, M., Wang, X., Chow, K.: New differential cryptanalysis results for reduced-round CAST-128. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. E93\u2013A, 2744\u20132754 (2010)","journal-title":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci."},{"key":"2_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1007\/978-3-642-04159-4_28","volume-title":"Selected Areas in Cryptography","author":"M Wang","year":"2009","unstructured":"Wang, M., Wang, X., Hu, C.: New linear cryptanalytic results of reduced-round of CAST-128 and CAST-256. In: Avanzi, R.M., Keliher, L., Sica, F. (eds.) SAC 2008. LNCS, vol. 5381, pp. 429\u2013441. Springer, Heidelberg (2009). doi: 10.1007\/978-3-642-04159-4_28"},{"key":"2_CR20","first-page":"2","volume":"537","author":"J Zhao","year":"2001","unstructured":"Zhao, J., Wang, M., Wen, L.: Improved linear cryptanalysis of CAST-256. J. Comput. Sci. Technol. 537, 2\u201321 (2001)","journal-title":"J. Comput. Sci. Technol."}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-54705-3_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,22]],"date-time":"2023-08-22T12:49:58Z","timestamp":1692708598000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-54705-3_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319547046","9783319547053"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-54705-3_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"3 March 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Inscrypt","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security and Cryptology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Beijing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 November 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 November 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cisc2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.inscrypt.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}