{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T17:24:10Z","timestamp":1725902650270},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319615653"},{"type":"electronic","value":"9783319615660"}],"license":[{"start":{"date-parts":[[2017,7,5]],"date-time":"2017-07-05T00:00:00Z","timestamp":1499212800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-61566-0_59","type":"book-chapter","created":{"date-parts":[[2017,7,3]],"date-time":"2017-07-03T22:36:53Z","timestamp":1499121413000},"page":"639-646","source":"Crossref","is-referenced-by-count":0,"title":["Distinguishing Property for Full Round KECCAK-f Permutation"],"prefix":"10.1007","author":[{"given":"Maolin","family":"Li","sequence":"first","affiliation":[]},{"given":"Lu","family":"Cheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,5]]},"reference":[{"key":"59_CR1","unstructured":"Aumasson, J.P., Meier, W.: Zero-sum distinguishers for reduced KECCAK-f and for the core functions of Luffa and Hamsi. In: Presented at the Rump Session of Cryptographic Hardware and Embedded Systems (CHES 2009) (2009)"},{"key":"59_CR2","doi-asserted-by":"crossref","unstructured":"Boura, C., Canteaut, A.: Zero-sum distinguishers for iterated permutation and applicaton to KECCAK-f and Hamsi-256. In: Selected Areas in Cryptography (SAC 2010). LNCS, vol. 6544, pp. 1\u201317. Springer, Heidelberg (2010)","DOI":"10.1007\/978-3-642-19574-7_1"},{"key":"59_CR3","doi-asserted-by":"crossref","unstructured":"Watanabe, D., Hatano, Y., Yamada, T., Kaneko, T.: Higher order differential attacks on step-reduced variants of luffa v1. In: Fast Software Encryption (FSE 2010). LNCS, vol. 6147, pp. 270\u2013285. Springer, Heidelberg (2010)","DOI":"10.1007\/978-3-642-13858-4_15"},{"key":"59_CR4","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Assche, G.V.: The KECCAK sponge function family. Main document. Submission to NIST (Round 2) (2009)"},{"key":"59_CR5","doi-asserted-by":"crossref","unstructured":"Boura, C., Canteaut, A.: A zero-sum property for the KECCAK-f permutation with 18 rounds. In: IEEE International Symposium on Information Theory 2010, 1\u20139 2010, Austin, Texas: United States (2010)","DOI":"10.1109\/ISIT.2010.5513442"},{"key":"59_CR6","doi-asserted-by":"crossref","unstructured":"Boura, C., Canteaut, A., Canniere, C.D.: Higher-order differential properties of KECCAK and luffa. In: FSE 2011. LNCS, vol. 6733, pp. 252\u2013269. Springer, Heidelberg (2011)","DOI":"10.1007\/978-3-642-21702-9_15"},{"issue":"6","key":"59_CR7","doi-asserted-by":"crossref","first-page":"694","DOI":"10.1007\/s11434-011-4909-x","volume":"75","author":"M Duan","year":"2012","unstructured":"Duan, M., Lai, X.J.: Improved zero-sum distinguisher for full round KECCAK-f permutation. Sci. Bullet. 75(6), 694\u2013697 (2012)","journal-title":"Sci. Bullet."},{"key":"59_CR8","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Assche, G. V.: Keccak implementation overview: keccak.noekeon.org\/Keccak-implementation-3.2"},{"key":"59_CR9","doi-asserted-by":"crossref","unstructured":"Knudsen, L.R., Rijmen, V.: Known-key distinguishers for some block ciphers. In: ASIACRYPT 2007. LNCS, vol. 4833, pp. 315\u2013324. Springer, Heidelberg (2007)","DOI":"10.1007\/978-3-540-76900-2_19"},{"key":"59_CR10","doi-asserted-by":"crossref","unstructured":"Knudsen, L.R.: Truncated and higher order differentials. In: Fast Software Encryption (FSE 1994). LNCS, vol. 1008, pp. 196\u2013211. Springer, Heidelberg (1995)","DOI":"10.1007\/3-540-60590-8_16"}],"container-title":["Advances in Intelligent Systems and Computing","Complex, Intelligent, and Software Intensive Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-61566-0_59","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,28]],"date-time":"2019-09-28T05:19:21Z","timestamp":1569647961000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-61566-0_59"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,5]]},"ISBN":["9783319615653","9783319615660"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-61566-0_59","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017,7,5]]}}}