{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T17:46:20Z","timestamp":1743097580618,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319557137"},{"type":"electronic","value":"9783319557144"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-55714-4_1","type":"book-chapter","created":{"date-parts":[[2017,3,7]],"date-time":"2017-03-07T04:22:08Z","timestamp":1488860528000},"page":"3-17","source":"Crossref","is-referenced-by-count":3,"title":["Faster Key Recovery Attack on Round-Reduced PRINCE"],"prefix":"10.1007","author":[{"given":"Shahram","family":"Rasoolzadeh","sequence":"first","affiliation":[]},{"given":"H\u00e5vard","family":"Raddum","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,8]]},"reference":[{"key":"1_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1007\/978-3-642-34961-4_14","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2012","author":"J Borghoff","year":"2012","unstructured":"Borghoff, J., et al.: PRINCE \u2013 a low-latency block cipher for pervasive computing applications. In: Wang, X., Sako, K. (eds.) ASIACRYPT 2012. LNCS, vol. 7658, pp. 208\u2013225. Springer, Heidelberg (2012). doi:\n10.1007\/978-3-642-34961-4_14"},{"key":"1_CR2","unstructured":"The PRINCE Team: PRINCE challenge. \nhttps:\/\/www.emsec.rub.de\/research\/research_startseite\/prince-challenge\/"},{"key":"1_CR3","unstructured":"Abed, F., List, E., Lucks, S.: On the security of the core of PRINCE against biclique and differential cryptanalysis. IACR Cryptology ePrint Archive, Report 2012\/712 (2012)"},{"key":"1_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1007\/978-3-662-43933-3_6","volume-title":"Fast Software Encryption","author":"J Jean","year":"2014","unstructured":"Jean, J., Nikoli\u0107, I., Peyrin, T., Wang, L., Wu, S.: Security analysis of PRINCE. In: Moriai, S. (ed.) FSE 2013. LNCS, vol. 8424, pp. 92\u2013111. Springer, Heidelberg (2014). doi:\n10.1007\/978-3-662-43933-3_6"},{"key":"1_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/978-3-662-43933-3_5","volume-title":"Fast Software Encryption","author":"H Soleimany","year":"2014","unstructured":"Soleimany, H., et al.: Reflection cryptanalysis of PRINCE-like ciphers. In: Moriai, S. (ed.) FSE 2013. LNCS, vol. 8424, pp. 71\u201391. Springer, Heidelberg (2014). doi:\n10.1007\/978-3-662-43933-3_5"},{"key":"1_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1007\/978-3-642-40041-4_13","volume-title":"Advances in Cryptology \u2013 CRYPTO 2013","author":"A Canteaut","year":"2013","unstructured":"Canteaut, A., Naya-Plasencia, M., Vayssi\u00e8re, B.: Sieve-in-the-middle: improved MITM attacks. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013. LNCS, vol. 8042, pp. 222\u2013240. Springer, Heidelberg (2013). doi:\n10.1007\/978-3-642-40041-4_13"},{"key":"1_CR7","unstructured":"Li, L., Jia, K., Wang, X.: Improved meet-in-the-middle attacks on AES-192 and PRINCE. IACR Cryptology ePrint Archive, Report 2013\/573 (2013)"},{"key":"1_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1007\/978-3-662-46706-0_30","volume-title":"Fast Software Encryption","author":"A Canteaut","year":"2015","unstructured":"Canteaut, A., Fuhr, T., Gilbert, H., Naya-Plasencia, M., Reinhard, J.-R.: Multiple differential cryptanalysis of round-reduced PRINCE. In: Cid, C., Rechberger, C. (eds.) FSE 2014. LNCS, vol. 8540, pp. 591\u2013610. Springer, Heidelberg (2015). doi:\n10.1007\/978-3-662-46706-0_30"},{"key":"1_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1007\/978-3-662-45611-8_22","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2014","author":"P-A Fouque","year":"2014","unstructured":"Fouque, P.-A., Joux, A., Mavromati, C.: Multi-user collisions: applications to discrete logarithm, even-mansour and PRINCE. In: Sarkar, P., Iwata, T. (eds.) ASIACRYPT 2014. LNCS, vol. 8873, pp. 420\u2013438. Springer, Heidelberg (2014). doi:\n10.1007\/978-3-662-45611-8_22"},{"key":"1_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/978-3-662-46800-5_10","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2015","author":"I Dinur","year":"2015","unstructured":"Dinur, I.: Cryptanalytic time-memory-data tradeoffs for FX-constructions with applications to PRINCE and PRIDE. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT 2015. LNCS, vol. 9056, pp. 231\u2013253. Springer, Heidelberg (2015). doi:\n10.1007\/978-3-662-46800-5_10"},{"key":"1_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1007\/978-3-662-48116-5_10","volume-title":"Fast Software Encryption","author":"P Derbez","year":"2015","unstructured":"Derbez, P., Perrin, L.: Meet-in-the-middle attacks and structural analysis of round-reduced PRINCE. In: Leander, G. (ed.) FSE 2015. LNCS, vol. 9054, pp. 190\u2013216. Springer, Heidelberg (2015). doi:\n10.1007\/978-3-662-48116-5_10"},{"key":"1_CR12","unstructured":"Morawiecki, P.: Practical attacks on the round-reduced PRINCE? IACR Cryptology ePrint Archive, Report 2015\/245 (2015)"},{"key":"1_CR13","first-page":"265","volume":"16","author":"R Posteuca","year":"2015","unstructured":"Posteuca, R., Negara, G.: Integral cryptanalysis of round-reduced PRINCE cipher. Proc. Rom. Acad. Ser. A Math. Phys. Tech. Sci. Inf. Sci. 16, 265\u2013269 (2015). Special issue","journal-title":"Proc. Rom. Acad. Ser. A Math. Phys. Tech. Sci. Inf. Sci."},{"key":"1_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/978-3-319-31517-1_6","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2016","author":"S Rasoolzadeh","year":"2016","unstructured":"Rasoolzadeh, S., Raddum, H.: Cryptanalysis of PRINCE with minimal data. In: Pointcheval, D., Nitaj, A., Rachidi, T. (eds.) AFRICACRYPT 2016. LNCS, vol. 9646, pp. 109\u2013126. Springer, Cham (2016). doi:\n10.1007\/978-3-319-31517-1_6"},{"key":"1_CR15","unstructured":"Rasoolzadeh, S., Raddum, H.: Cryptanalysis of 6-round PRINCE using 2 Known Plaintexts. Presented at ArcticCrypt 2016, also available at IACR Cryptology ePrint Archive. Report 2016\/132 (2016)"},{"key":"1_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/BFb0052343","volume-title":"Fast Software Encryption","author":"J Daemen","year":"1997","unstructured":"Daemen, J., Knudsen, L., Rijmen, V.: The block cipher Square. In: Biham, E. (ed.) FSE 1997. LNCS, vol. 1267, pp. 149\u2013165. Springer, Heidelberg (1997). doi:\n10.1007\/BFb0052343"},{"key":"1_CR17","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/978-1-4615-2694-0_23","volume-title":"Communications and Cryptography","author":"X Lai","year":"1994","unstructured":"Lai, X.: Higher order derivatives and differential cryptanalysis. In: Blahut, R.E., Costello Jr., D.J., Maurer, U., Mittelholzer, T. (eds.) Communications and Cryptography, vol. 276, pp. 227\u2013233. Springer, New York (1994)"},{"key":"1_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1007\/3-540-60590-8_16","volume-title":"Fast Software Encryption","author":"LR Knudsen","year":"1995","unstructured":"Knudsen, L.R.: Truncated and higher order differentials. In: Preneel, B. (ed.) FSE 1994. LNCS, vol. 1008, pp. 196\u2013211. Springer, Heidelberg (1995). doi:\n10.1007\/3-540-60590-8_16"}],"container-title":["Lecture Notes in Computer Science","Lightweight Cryptography for Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-55714-4_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,4,27]],"date-time":"2017-04-27T09:14:58Z","timestamp":1493284498000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-55714-4_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319557137","9783319557144"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-55714-4_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}