{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:29:10Z","timestamp":1725888550124},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319600543"},{"type":"electronic","value":"9783319600550"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-60055-0_20","type":"book-chapter","created":{"date-parts":[[2017,5,30]],"date-time":"2017-05-30T02:14:16Z","timestamp":1496110456000},"page":"384-401","source":"Crossref","is-referenced-by-count":1,"title":["Cryptanalysis of Simpira v2"],"prefix":"10.1007","author":[{"given":"Ivan","family":"Tjuawinata","sequence":"first","affiliation":[]},{"given":"Tao","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Hongjun","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,31]]},"reference":[{"key":"20_CR1","unstructured":"Aumasson, J.-P., Jovanovic, P., Neves, S.: NORX v3.0. Submission to CAESAR (2016). \nhttp:\/\/competitions.cr.yp.to\/caesar-submissions.html"},{"key":"20_CR2","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G., Van Keer, R.: CAESAR submission: Ketje v2. Submission to CAESAR (2016). \nhttp:\/\/competitions.cr.yp.to\/caesar-submissions.html"},{"key":"20_CR3","unstructured":"Bertoni, G., Daemen, J., Peeters, J., Van Assche, G., Van Keer, R.: CAESAR submission: Keyak v2. Submission to CAESAR (2016). \nhttp:\/\/competitions.cr.yp.to\/caesar-submissions.html"},{"key":"20_CR4","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Keccak sponge function family main document. Submission to NIST (Round 2) (2009)"},{"key":"20_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1007\/3-540-48910-X_2","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 1999","author":"E Biham","year":"1999","unstructured":"Biham, E., Biryukov, A., Shamir, A.: Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 12\u201323. Springer, Heidelberg (1999). doi:\n10.1007\/3-540-48910-X_2"},{"key":"20_CR6","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The Design of Rijndael: AES-the Advanced Encryption Standard","author":"J Daemen","year":"2002","unstructured":"Daemen, J., Rijmen, V.: The Design of Rijndael: AES-the Advanced Encryption Standard. Springer, Heidelberg (2002)"},{"key":"20_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1007\/11832072_6","volume-title":"Security and Cryptography for Networks","author":"J Daemen","year":"2006","unstructured":"Daemen, J., Rijmen, V.: Understanding two-round differentials in AES. In: Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol. 4116, pp. 78\u201394. Springer, Heidelberg (2006). doi:\n10.1007\/11832072_6"},{"key":"20_CR8","unstructured":"Dobraunig, C., Eichlseder, M., Mendel, F.: Cryptanalysis of Simpira v1. Cryptology ePrint Archive, Report 2016\/244 (2016). \nhttp:\/\/eprint.iacr.org\/2016\/244"},{"key":"20_CR9","unstructured":"Dobraunig, C., Eichlseder, M., Mendel, F., Schl\u00e4ffer, M.: Ascon v1.2. Submission to CAESAR (2016). \nhttp:\/\/competitions.cr.yp.to\/caesar-submissions.html"},{"key":"20_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1007\/978-3-642-29011-4_21","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2012","author":"O Dunkelman","year":"2012","unstructured":"Dunkelman, O., Keller, N., Shamir, A.: Minimalism in cryptography: the Even-Mansour scheme revisited. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 336\u2013354. Springer, Heidelberg (2012). doi:\n10.1007\/978-3-642-29011-4_21"},{"issue":"3","key":"20_CR11","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1007\/s001459900025","volume":"10","author":"S Even","year":"1997","unstructured":"Even, S., Mansour, Y.: A construction of a cipher from a single pseudorandom permutation. J. Cryptology 10(3), 151\u2013161 (1997)","journal-title":"J. Cryptology"},{"key":"20_CR12","unstructured":"Gauravaram, P., Knudsen, L.R., Matusiewicz, K., Mendel, F., Rechberger, C., Schl\u00e4ffer, M., Thomsen, S.S.: Gr\u00f8stl-a SHA-3 candidate. Submission to NIST (2008)"},{"key":"20_CR13","unstructured":"Gueron, S., Mouha, N.: Simpira: a family of efficient permutations using the AES round function. Cryptology ePrint Archive, Report 2016\/122 (2016). \nhttp:\/\/eprint.iacr.org\/2016\/122"},{"key":"20_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/978-3-662-53887-6_4","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2016","author":"S Gueron","year":"2016","unstructured":"Gueron, S., Mouha, N.: Simpira\u00a0v2: a family of efficient permutations using the AES round function. In: Cheon, J.H., Takagi, T. (eds.) ASIACRYPT 2016. LNCS, vol. 10031, pp. 95\u2013125. Springer, Heidelberg (2016). doi:\n10.1007\/978-3-662-53887-6_4"},{"key":"20_CR15","unstructured":"Knudsen, L.: DEAL - a 128-bit block cipher. In: NIST AES Proposal (1998)"},{"key":"20_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1007\/3-540-60590-8_16","volume-title":"Fast Software Encryption","author":"LR Knudsen","year":"1995","unstructured":"Knudsen, L.R.: Truncated and higher order differentials. In: Preneel, B. (ed.) FSE 1994. LNCS, vol. 1008, pp. 196\u2013211. Springer, Heidelberg (1995). doi:\n10.1007\/3-540-60590-8_16"},{"key":"20_CR17","unstructured":"Morawiecki, P., Gaj, K., Homsirikamol, E., Matusiewicz, K., Pieprzyk, J., Rogawski, M., Srebrny, M., W\u00f3jcik, M.: ICEPOLE v2. submission to CAESAR competition. \nhttp:\/\/competitions.cr.yp.to\/caesar-submissions.html"},{"key":"20_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1007\/978-3-662-44709-3_22","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2014","author":"P Morawiecki","year":"2014","unstructured":"Morawiecki, P., Gaj, K., Homsirikamol, E., Matusiewicz, K., Pieprzyk, J., Rogawski, M., Srebrny, M., W\u00f3jcik, M.: ICEPOLE: high-speed, hardware-oriented authenticated encryption. In: Batina, L., Robshaw, M. (eds.) CHES 2014. LNCS, vol. 8731, pp. 392\u2013413. Springer, Heidelberg (2014). doi:\n10.1007\/978-3-662-44709-3_22"},{"key":"20_CR19","unstructured":"R\u00f8njom, S.: Invariant subspaces in Simpira. Cryptology ePrint Archive, Report 2016\/248 (2016). \nhttps:\/\/eprint.iacr.org\/2016\/248"},{"key":"20_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1007\/3-540-48519-8_12","volume-title":"Fast Software Encryption","author":"D Wagner","year":"1999","unstructured":"Wagner, D.: The boomerang attack. In: Knudsen, L. (ed.) FSE 1999. LNCS, vol. 1636, pp. 156\u2013170. Springer, Heidelberg (1999). doi:\n10.1007\/3-540-48519-8_12"},{"key":"20_CR21","unstructured":"Wu, H.: The hash function JH. Submission to NIST (2011)"},{"key":"20_CR22","unstructured":"Zong, R., Dong, X., Wang, X.: Impossible differential attack on Simpira v2. Cryptology ePrint Archive, Report 2016\/1161 (2016). \nhttp:\/\/eprint.iacr.org\/2016\/1161"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-60055-0_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,5,30]],"date-time":"2017-05-30T02:21:40Z","timestamp":1496110900000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-60055-0_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319600543","9783319600550"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-60055-0_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}