{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T16:02:34Z","timestamp":1743091354892,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319557137"},{"type":"electronic","value":"9783319557144"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-55714-4_2","type":"book-chapter","created":{"date-parts":[[2017,3,7]],"date-time":"2017-03-07T04:22:08Z","timestamp":1488860528000},"page":"18-32","source":"Crossref","is-referenced-by-count":4,"title":["Differential Attacks on Lightweight Block Ciphers PRESENT, PRIDE, and RECTANGLE Revisited"],"prefix":"10.1007","author":[{"given":"Cihangir","family":"Tezcan","sequence":"first","affiliation":[]},{"given":"Galip Oral","family":"Okan","sequence":"additional","affiliation":[]},{"given":"Asuman","family":"\u015eenol","sequence":"additional","affiliation":[]},{"given":"Erol","family":"Do\u011fan","sequence":"additional","affiliation":[]},{"given":"Furkan","family":"Y\u00fcceba\u015f","sequence":"additional","affiliation":[]},{"given":"Nazife","family":"Baykal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,8]]},"reference":[{"key":"2_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/978-3-662-44371-2_4","volume-title":"Advances in Cryptology \u2013 CRYPTO 2014","author":"MR Albrecht","year":"2014","unstructured":"Albrecht, M.R., Driessen, B., Kavun, E.B., Leander, G., Paar, C., Yal\u00e7\u0131n, T.: Block ciphers \u2013 focus on the linear layer (feat. PRIDE). In: Garay, J.A., Gennaro, R. (eds.) CRYPTO 2014. LNCS, vol. 8616, pp. 57\u201376. Springer, Heidelberg (2014). doi:\n10.1007\/978-3-662-44371-2_4"},{"issue":"4","key":"2_CR2","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/s00145-005-0129-3","volume":"18","author":"E Biham","year":"2005","unstructured":"Biham, E., Biryukov, A., Shamir, A.: Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. J. Cryptol. 18(4), 291\u2013311 (2005)","journal-title":"J. Cryptol."},{"issue":"1","key":"2_CR3","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E Biham","year":"1991","unstructured":"Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. J. Cryptol. 4(1), 3\u201372 (1991)","journal-title":"J. Cryptol."},{"key":"2_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1007\/978-3-642-33027-8_5","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2012","author":"B Bilgin","year":"2012","unstructured":"Bilgin, B., Nikova, S., Nikov, V., Rijmen, V., St\u00fctz, G.: Threshold implementations of all 3 \n            $${\\times }$$\n           3 and 4 \n            $${\\times }$$\n           4 S-boxes. In: Prouff, E., Schaumont, P. (eds.) CHES 2012. LNCS, vol. 7428, pp. 76\u201391. Springer, Heidelberg (2012). doi:\n10.1007\/978-3-642-33027-8_5"},{"key":"2_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1007\/978-3-540-74735-2_31","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"A Bogdanov","year":"2007","unstructured":"Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y., Vikkelsoe, C.: PRESENT: an ultra-lightweight block cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 450\u2013466. Springer, Heidelberg (2007). doi:\n10.1007\/978-3-540-74735-2_31"},{"key":"2_CR6","unstructured":"Chakraborty, K., Sarkar, S., Maitra, S., Mazumdar, B., Mukhopadhyay, D., Prouff, E.: Redefining the transparency order. Cryptology ePrint Archive, Report 2014\/367 (2014)"},{"key":"2_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/3-540-36178-2_17","volume-title":"Advances in Cryptology \u2014 ASIACRYPT 2002","author":"NT Courtois","year":"2002","unstructured":"Courtois, N.T., Pieprzyk, J.: Cryptanalysis of Block ciphers with overdefined systems of equations. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 267\u2013287. Springer, Heidelberg (2002). doi:\n10.1007\/3-540-36178-2_17"},{"key":"2_CR8","unstructured":"Dai, Y., Chen, S.: Cryptanalysis of full pride block cipher. Cryptology ePrint Archive, Report 2014\/987 (2014). \nhttp:\/\/eprint.iacr.org\/2014\/987"},{"key":"2_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1007\/978-3-642-01001-9_16","volume-title":"Advances in Cryptology - EUROCRYPT 2009","author":"I Dinur","year":"2009","unstructured":"Dinur, I., Shamir, A.: Cube attacks on tweakable black box polynomials. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 278\u2013299. Springer, Heidelberg (2009). doi:\n10.1007\/978-3-642-01001-9_16"},{"key":"2_CR10","unstructured":"ISO\/IEC 29192\u20132:2012: Information technology - security techniques - lightweight cryptography - part 2: Block ciphers (2011)"},{"issue":"1","key":"2_CR11","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/s001450010015","volume":"14","author":"J Kilian","year":"2001","unstructured":"Kilian, J., Rogaway, P.: How to protect DES against exhaustive key search (an analysis of DESX). J. Cryptol. 14(1), 17\u201335 (2001)","journal-title":"J. Cryptol."},{"key":"2_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1007\/3-540-60590-8_16","volume-title":"Fast Software Encryption","author":"LR Knudsen","year":"1995","unstructured":"Knudsen, L.R.: Truncated and higher order differentials. In: Preneel, B. (ed.) FSE 1994. LNCS, vol. 1008, pp. 196\u2013211. Springer, Heidelberg (1995). doi:\n10.1007\/3-540-60590-8_16"},{"key":"2_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology \u2014 CRYPTO 1999","author":"P Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388\u2013397. Springer, Heidelberg (1999). doi:\n10.1007\/3-540-48405-1_25"},{"key":"2_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/978-3-319-16363-5_7","volume-title":"Lightweight Cryptography for Security and Privacy","author":"RH Makarim","year":"2015","unstructured":"Makarim, R.H., Tezcan, C.: Relating undisturbed bits to other properties of substitution boxes. In: Eisenbarth, T., \u00d6zt\u00fcrk, E. (eds.) LightSec 2014. LNCS, vol. 8898, pp. 109\u2013125. Springer, Cham (2015). doi:\n10.1007\/978-3-319-16363-5_7"},{"key":"2_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 1993","author":"M Matsui","year":"1994","unstructured":"Matsui, M.: Linear cryptanalysis method for DES cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 386\u2013397. Springer, Heidelberg (1994). doi:\n10.1007\/3-540-48285-7_33"},{"key":"2_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/3-540-48285-7_6","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 1993","author":"K Nyberg","year":"1994","unstructured":"Nyberg, K.: Differentially uniform mappings for cryptography. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 55\u201364. Springer, Heidelberg (1994). doi:\n10.1007\/3-540-48285-7_6"},{"key":"2_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"424","DOI":"10.1007\/11502760_29","volume-title":"Fast Software Encryption","author":"E Prouff","year":"2005","unstructured":"Prouff, E.: DPA attacks and S-boxes. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol. 3557, pp. 424\u2013441. Springer, Heidelberg (2005). doi:\n10.1007\/11502760_29"},{"issue":"1","key":"2_CR18","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/s00145-007-9013-7","volume":"21","author":"AA Sel\u00e7uk","year":"2008","unstructured":"Sel\u00e7uk, A.A.: On probability of success in linear and differential cryptanalysis. J. Cryptol. 21(1), 131\u2013147 (2008)","journal-title":"J. Cryptol."},{"key":"2_CR19","unstructured":"Shan, J., Hu, L., Song, L., Sun, S., Ma, X.: Related-key differential attack on round reduced rectangle-80. Cryptology ePrint Archive, Report 2014\/986 (2014). \nhttp:\/\/eprint.iacr.org\/2014\/986"},{"key":"2_CR20","unstructured":"Shan, J., Hu, L., Song, L., Sun, S., Ma, X.: Related-key differential attack on 19-round reduced rectangle-80. J. Cryptol. Res. 2(1), 54 (2015). \nhttp:\/\/www.jcr.cacrnet.org.cn:8080\/mmxb\/EN\/abstract\/abstract73.shtml"},{"key":"2_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/978-3-642-17401-8_15","volume-title":"Progress in Cryptology - INDOCRYPT 2010","author":"C Tezcan","year":"2010","unstructured":"Tezcan, C.: The improbable differential attack: cryptanalysis of reduced round CLEFIA. In: Gong, G., Gupta, K.C. (eds.) INDOCRYPT 2010. LNCS, vol. 6498, pp. 197\u2013209. Springer, Heidelberg (2010). doi:\n10.1007\/978-3-642-17401-8_15"},{"key":"2_CR22","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1016\/j.cam.2013.06.023","volume":"259","author":"C Tezcan","year":"2014","unstructured":"Tezcan, C.: Improbable differential attacks on present using undisturbed bits. J. Comput. Appl. Math. 259, 503\u2013511 (2014)","journal-title":"J. Comput. Appl. Math."},{"key":"2_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-3-319-29078-2_2","volume-title":"Lightweight Cryptography for Security and Privacy","author":"C Tezcan","year":"2016","unstructured":"Tezcan, C.: Differential factors revisited: corrected attacks on PRESENT and SERPENT. In: G\u00fcneysu, T., Leander, G., Moradi, A. (eds.) LightSec 2015. LNCS, vol. 9542, pp. 21\u201333. Springer, Cham (2016). doi:\n10.1007\/978-3-319-29078-2_2"},{"key":"2_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-3-319-16363-5_5","volume-title":"Lightweight Cryptography for Security and Privacy","author":"C Tezcan","year":"2015","unstructured":"Tezcan, C., \u00d6zbudak, F.: Differential factors: improved attacks on SERPENT. In: Eisenbarth, T., \u00d6zt\u00fcrk, E. (eds.) LightSec 2014. LNCS, vol. 8898, pp. 69\u201384. Springer, Cham (2015). doi:\n10.1007\/978-3-319-16363-5_5"},{"key":"2_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1007\/978-3-540-68164-9_4","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2008","author":"M Wang","year":"2008","unstructured":"Wang, M.: Differential cryptanalysis of reduced-round PRESENT. In: Vaudenay, S. (ed.) AFRICACRYPT 2008. LNCS, vol. 5023, pp. 40\u201349. Springer, Heidelberg (2008). doi:\n10.1007\/978-3-540-68164-9_4"},{"key":"2_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/978-3-319-17533-1_15","volume-title":"Information Security Practice and Experience","author":"Q Yang","year":"2015","unstructured":"Yang, Q., Hu, L., Sun, S., Qiao, K., Song, L., Shan, J., Ma, X.: Improved differential analysis of block cipher PRIDE. In: Lopez, J., Wu, Y. (eds.) ISPEC 2015. LNCS, vol. 9065, pp. 209\u2013219. Springer, Cham (2015). doi:\n10.1007\/978-3-319-17533-1_15"},{"key":"2_CR27","unstructured":"Zhang, W., Bao, Z., Lin, D., Rijmen, V., Yang, B., Verbauwhede, I.: Rectangle: a bit-slice lightweight block cipher suitable for multiple platforms. Cryptology ePrint Archive, Report 2014\/084 (2014). \nhttp:\/\/eprint.iacr.org\/2014\/084"},{"issue":"12","key":"2_CR28","first-page":"1","volume":"58","author":"W Zhang","year":"2015","unstructured":"Zhang, W., Bao, Z., Lin, D., Rijmen, V., Yang, B., Verbauwhede, I.: Rectangle: a bit-slice lightweight block cipher suitable for multiple platforms. Sci. China Inf. Sci. 58(12), 1\u201315 (2015)","journal-title":"Sci. China Inf. Sci."},{"key":"2_CR29","unstructured":"Zhao, J., Wang, X., Wang, M., Dong, X.: Differential analysis on block cipher pride. Cryptology ePrint Archive, Report 2014\/525 (2014). \nhttp:\/\/eprint.iacr.org\/"}],"container-title":["Lecture Notes in Computer Science","Lightweight Cryptography for Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-55714-4_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,4,27]],"date-time":"2017-04-27T09:15:17Z","timestamp":1493284517000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-55714-4_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319557137","9783319557144"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-55714-4_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}