{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T22:41:29Z","timestamp":1775601689423,"version":"3.50.1"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319641997","type":"print"},{"value":"9783319642000","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-64200-0_1","type":"book-chapter","created":{"date-parts":[[2017,7,26]],"date-time":"2017-07-26T08:58:41Z","timestamp":1501059521000},"page":"3-18","source":"Crossref","is-referenced-by-count":18,"title":["On Quantum Related-Key Attacks on Iterated Even-Mansour Ciphers"],"prefix":"10.1007","author":[{"given":"Akinori","family":"Hosoyamada","sequence":"first","affiliation":[]},{"given":"Kazumaro","family":"Aoki","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,27]]},"reference":[{"key":"1_CR1","unstructured":"Chen, S., Steinberger, J.P.: Tight security bounds for key-alternating ciphers. IACR Cryptology ePrint Archive 2013, 222 (2013). http:\/\/eprint.iacr.org\/2013\/222"},{"issue":"3","key":"1_CR2","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1007\/s001459900025","volume":"10","author":"S Even","year":"1997","unstructured":"Even, S., Mansour, Y.: A construction of a cipher from a single pseudorandom permutation. J. Cryptology 10(3), 151\u2013162 (1997). https:\/\/doi.org\/10.1007\/s001459900025","journal-title":"J. Cryptology"},{"key":"1_CR3","unstructured":"Grover, L.K.: A fast quantum mechanical algorithm for database search. In: Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing. STOC 1996, NY, USA, pp. 212\u2013219 (1996). http:\/\/doi.acm.org\/10.1145\/237814.237866"},{"key":"1_CR4","unstructured":"Kaplan, M.: Quantum attacks against iterated block ciphers. CoRR abs\/1410.1434 (2014). http:\/\/arxiv.org\/abs\/1410.1434"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Kaplan, M., Leurent, G., Leverrier, A., Naya-Plasencia, M.: Breaking symmetric cryptosystems using quantum period finding. In: Proceedings of the Advances in Cryptology - CRYPTO 2016\u201336th Annual International Cryptology Conference, Part II, Santa Barbara, CA, USA, August 14\u201318, 2016, pp. 207\u2013237 (2016). http:\/\/dx.doi.org\/10.1007\/978-3-662-53008-5_8","DOI":"10.1007\/978-3-662-53008-5_8"},{"key":"1_CR6","unstructured":"Kaplan, M., Leurent, G., Leverrier, A., Naya-Plasencia, M.: Quantum differential and linear cryptanalysis. IACR Trans. Symmetric Cryptol. 2016(1), 71\u201394 (2016). http:\/\/tosc.iacr.org\/index.php\/ToSC\/article\/view\/536"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Kuwakado, H., Morii, M.: Quantum distinguisher between the 3-round Feistel cipher and the random permutation. In: Proceedings of the IEEE International Symposium on Information Theory, ISIT 13\u201318, 2010, Austin, Texas, USA, pp. 2682\u20132685 (2010). http:\/\/dx.doi.org\/10.1109\/ISIT.2010.5513654","DOI":"10.1109\/ISIT.2010.5513654"},{"key":"1_CR8","unstructured":"Kuwakado, H., Morii, M.: Security on the quantum-type Even-Mansour cipher. In: Proceedings of the International Symposium on Information Theory and its Applications, ISITA 2012, Honolulu, HI, USA, October 28\u201331, 2012. pp. 312\u2013316 (2012). http:\/\/ieeexplore.ieee.org\/document\/6400943\/"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Luby, M., Rackoff, C.: How to construct pseudo-random permutations from pseudo-random functions (abstract). In: Proceedings of the Advances in Cryptology - CRYPTO 1985, Santa Barbara, California, USA, August 18\u201322, 1985, p. 447 (1985). https:\/\/doi.org\/10.1007\/3-540-39799-X_34","DOI":"10.1007\/3-540-39799-X_34"},{"key":"1_CR10","unstructured":"NIST: Advanced encryption standard (AES) FIPS 197 (2001)"},{"key":"1_CR11","unstructured":"NIST: Submission requirements and evaluation criteria for the post-quantum cryptography standardization process (2016)"},{"issue":"1","key":"1_CR12","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1016\/j.ipl.2014.08.009","volume":"115","author":"M R\u00f6tteler","year":"2015","unstructured":"R\u00f6tteler, M., Steinwandt, R.: A note on quantum related-key attacks. Inf. Process. Lett. 115(1), 40\u201344 (2015). http:\/\/dx.doi.org\/10.1016\/j.ipl.2014.08.009","journal-title":"Inf. Process. Lett."},{"issue":"1&2","key":"1_CR13","first-page":"65","volume":"17","author":"T Santoli","year":"2017","unstructured":"Santoli, T., Schaffner, C.: Using Simon\u2019s algorithm to attack symmetric-key cryptographic primitives. Quantum Inf. Comput. 17(1&2), 65\u201378 (2017). http:\/\/www.rintonpress.com\/xxqic17\/qic-17-12\/0065-0078.pdf","journal-title":"Quantum Inf. Comput."},{"issue":"5","key":"1_CR14","doi-asserted-by":"crossref","first-page":"1484","DOI":"10.1137\/S0097539795293172","volume":"26","author":"PW Shor","year":"1997","unstructured":"Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26(5), 1484\u20131509 (1997). http:\/\/dx.doi.org\/10.1137\/S0097539795293172","journal-title":"SIAM J. Comput."},{"issue":"5","key":"1_CR15","doi-asserted-by":"crossref","first-page":"1474","DOI":"10.1137\/S0097539796298637","volume":"26","author":"DR Simon","year":"1997","unstructured":"Simon, D.R.: On the power of quantum computation. SIAM J. Comput. 26(5), 1474\u20131483 (1997). http:\/\/dx.doi.org\/10.1137\/S0097539796298637","journal-title":"SIAM J. Comput."},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Treger, J., Patarin, J.: Generic attacks on Feistel networks with internal permutations. In: Proceedings of the Progress in Cryptology - AFRICACRYPT 2009, Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21\u201325, 2009, pp. 41\u201359 (2009). http:\/\/dx.doi.org\/10.1007\/978-3-642-02384-2_4","DOI":"10.1007\/978-3-642-02384-2_4"}],"container-title":["Lecture Notes in Computer Science","Advances in Information and Computer Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-64200-0_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T12:37:37Z","timestamp":1569933457000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-64200-0_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319641997","9783319642000"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-64200-0_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}