{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:36:13Z","timestamp":1767339373430},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319547046"},{"type":"electronic","value":"9783319547053"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-54705-3_3","type":"book-chapter","created":{"date-parts":[[2017,3,2]],"date-time":"2017-03-02T14:03:43Z","timestamp":1488463423000},"page":"33-46","source":"Crossref","is-referenced-by-count":2,"title":["Improved Integral and Zero-correlation Linear Cryptanalysis of CLEFIA Block Cipher"],"prefix":"10.1007","author":[{"given":"Wentan","family":"Yi","sequence":"first","affiliation":[]},{"given":"Baofeng","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Shaozhen","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Dongdai","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,3]]},"reference":[{"key":"3_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/978-3-319-03515-4_10","volume-title":"Progress in Cryptology \u2013 INDOCRYPT 2013","author":"C Blondeau","year":"2013","unstructured":"Blondeau, C.: Improbable differential from impossible differential: on the validity of the model. In: Paul, G., Vaudenay, S. (eds.) INDOCRYPT 2013. LNCS, vol. 8250, pp. 149\u2013160. Springer, Heidelberg (2013). doi: 10.1007\/978-3-319-03515-4_10"},{"key":"3_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/978-3-642-34961-4_16","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2012","author":"A Bogdanov","year":"2012","unstructured":"Bogdanov, A., Leander, G., Nyberg, K., Wang, M.: Integral and multidimensional linear distinguishers with correlation zero. In: Wang, X., Sako, K. (eds.) ASIACRYPT 2012. LNCS, vol. 7658, pp. 244\u2013261. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-34961-4_16"},{"key":"3_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/978-3-642-34047-5_3","volume-title":"Fast Software Encryption","author":"A Bogdanov","year":"2012","unstructured":"Bogdanov, A., Wang, M.: Zero correlation linear cryptanalysis with reduced data complexity. In: Canteaut, A. (ed.) FSE 2012. LNCS, vol. 7549, pp. 29\u201348. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-34047-5_3"},{"issue":"3","key":"3_CR4","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1007\/s10623-012-9697-z","volume":"70","author":"A Bogdanov","year":"2014","unstructured":"Bogdanov, A., Rijmen, V.: Linear hulls with correlation zero and linear cryptanalysis of block ciphers. Des. Codes Crypt. 70(3), 369\u2013383 (2014)","journal-title":"Des. Codes Crypt."},{"key":"3_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1007\/978-3-662-43414-7_16","volume-title":"Selected Areas in Cryptography \u2013 SAC 2013","author":"A Bogdanov","year":"2014","unstructured":"Bogdanov, A., Geng, H., Wang, M., Wen, L., Collard, B.: Zero-correlation linear cryptanalysis with FFT and improved attacks on ISO standards camellia and CLEFIA. In: Lange, T., Lauter, K., Lison\u011bk, P. (eds.) SAC 2013. LNCS, vol. 8282, pp. 306\u2013323. Springer, Heidelberg (2014). doi: 10.1007\/978-3-662-43414-7_16"},{"key":"3_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/978-3-662-45611-8_10","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2014","author":"C Boura","year":"2014","unstructured":"Boura, C., Naya-Plasencia, M., Suder, V.: Scrutinizing and improving impossible differential attacks: applications to CLEFIA, camellia, LBlock and Simon. In: Sarkar, P., Iwata, T. (eds.) ASIACRYPT 2014. LNCS, vol. 8873, pp. 179\u2013199. Springer, Heidelberg (2014). doi: 10.1007\/978-3-662-45611-8_10"},{"key":"3_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/978-3-662-48116-5_3","volume-title":"Fast Software Encryption","author":"L Li","year":"2015","unstructured":"Li, L., Jia, K., Wang, X., Dong, X.: Meet-in-the-middle technique for truncated differential and its applications to CLEFIA and camellia. In: Leander, G. (ed.) FSE 2015. LNCS, vol. 9054, pp. 48\u201370. Springer, Heidelberg (2015). doi: 10.1007\/978-3-662-48116-5_3"},{"key":"3_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1007\/978-3-642-27890-7_3","volume-title":"Information Security Applications","author":"Y Li","year":"2012","unstructured":"Li, Y., Wu, W., Zhang, L.: Improved integral attacks on reduced-round CLEFIA block cipher. In: Jung, S., Yung, M. (eds.) WISA 2011. LNCS, vol. 7115, pp. 28\u201339. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-27890-7_3"},{"issue":"4","key":"3_CR9","doi-asserted-by":"crossref","first-page":"744","DOI":"10.1007\/s11390-011-1173-0","volume":"26","author":"H Mala","year":"2011","unstructured":"Mala, H., Dakhilalian, M., Shakiba, M.: Impossible differential attacks on 13-round CLEFIA-128. J. Comput. Sci. Technol. 26(4), 744\u2013750 (2011)","journal-title":"J. Comput. Sci. Technol."},{"key":"3_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1007\/978-3-642-35999-6_16","volume-title":"Selected Areas in Cryptography","author":"Y Sasaki","year":"2013","unstructured":"Sasaki, Y., Wang, L.: Meet-in-the-middle technique for integral attacks against feistel ciphers. In: Knudsen, L.R., Wu, H. (eds.) SAC 2012. LNCS, vol. 7707, pp. 234\u2013251. Springer, Heidelberg (2013). doi: 10.1007\/978-3-642-35999-6_16"},{"key":"3_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/978-3-540-74619-5_12","volume-title":"Fast Software Encryption","author":"T Shirai","year":"2007","unstructured":"Shirai, T., Shibutani, K., Akishita, T., Moriai, S., Iwata, T.: The 128-bit blockcipher CLEFIA (Extended Abstract). In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 181\u2013195. Springer, Heidelberg (2007). doi: 10.1007\/978-3-540-74619-5_12"},{"key":"3_CR12","unstructured":"Sun, B., Li, R., Wang, M., Li, P., Li, C.: Impossible differential cryptanalysis of CLEFIA. In: ePrint 2008\/151 (2008). http:\/\/eprint.iacr.org\/2008\/151"},{"issue":"7","key":"3_CR13","doi-asserted-by":"crossref","first-page":"1191","DOI":"10.1016\/j.jss.2011.02.024","volume":"84","author":"X Tang","year":"2011","unstructured":"Tang, X., Sun, B., Li, R., Li, C.: Impossible differential cryptanalysis of 13-round CLEFIA-128. J. Syst. Softw. 84(7), 1191\u20131196 (2011)","journal-title":"J. Syst. Softw."},{"key":"3_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/978-3-642-17401-8_15","volume-title":"Progress in Cryptology - INDOCRYPT 2010","author":"C Tezcan","year":"2010","unstructured":"Tezcan, C.: The improbable differential attack: cryptanalysis of reduced round CLEFIA. In: Gong, G., Gupta, K.C. (eds.) INDOCRYPT 2010. LNCS, vol. 6498, pp. 197\u2013209. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-17401-8_15"},{"key":"3_CR15","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1016\/j.ipl.2015.09.010","volume":"116","author":"C Tezcan","year":"2016","unstructured":"Tezcan, C., Selcuk, A.A.: Improved improbable differential attacks on ISO standard CLEFIA: expansion technique revisited. Inf. Process. Lett. 116, 136\u2013143 (2016)","journal-title":"Inf. Process. Lett."},{"key":"3_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1007\/978-3-540-71039-4_25","volume-title":"Fast Software Encryption","author":"Y Tsunoo","year":"2008","unstructured":"Tsunoo, Y., Tsujihara, E., Shigeri, M., Saito, T., Suzaki, T., Kubo, H.: Impossible differential cryptanalysis of CLEFIA. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 398\u2013411. Springer, Heidelberg (2008). doi: 10.1007\/978-3-540-71039-4_25"},{"issue":"10","key":"3_CR17","first-page":"88","volume":"29","author":"W Wang","year":"2008","unstructured":"Wang, W., Wang, X.: Saturation cryptanalysis of CLEFIA. J. Commun. 29(10), 88\u201392 (2008)","journal-title":"J. Commun."}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-54705-3_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T11:44:57Z","timestamp":1498391097000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-54705-3_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319547046","9783319547053"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-54705-3_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}