{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T16:33:17Z","timestamp":1725985997805},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319979151"},{"type":"electronic","value":"9783319979168"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-97916-8_17","type":"book-chapter","created":{"date-parts":[[2018,7,25]],"date-time":"2018-07-25T12:13:24Z","timestamp":1532520804000},"page":"262-278","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Lightweight Recursive MDS Matrices with Generalized Feistel Network"],"prefix":"10.1007","author":[{"given":"Qiuping","family":"Li","sequence":"first","affiliation":[]},{"given":"Baofeng","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Zhuojun","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,26]]},"reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"Augot, D., Finiasz, M.: Exhaustive search for small dimension recursive MDS diffusion layers for block ciphers and hash functions. In: Proceedings of 2013 IEEE International Symposium on Information Theory (ISIT), pp. C1551\u2013C1555. IEEE (2013)","DOI":"10.1109\/ISIT.2013.6620487"},{"key":"17_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/978-3-662-44371-2_4","volume-title":"Advances in Cryptology \u2013 CRYPTO 2014","author":"MR Albrecht","year":"2014","unstructured":"Albrecht, M.R., Driessen, B., Kavun, E.B., Leander, G., Paar, C., Yal\u00e7\u0131n, T.: Block ciphers \u2013 focus on the linear layer (feat. PRIDE). In: Garay, J.A., Gennaro, R. (eds.) CRYPTO 2014. LNCS, vol. 8616, pp. 57\u201376. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-44371-2_4"},{"key":"17_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-662-46706-0_1","volume-title":"Fast Software Encryption","author":"D Augot","year":"2015","unstructured":"Augot, D., Finiasz, M.: Direct construction of recursive MDS diffusion layers using shortened BCH codes. In: Cid, C., Rechberger, C. (eds.) FSE 2014. LNCS, vol. 8540, pp. 3\u201317. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-46706-0_1"},{"key":"17_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1007\/978-3-319-03515-4_18","volume-title":"Progress in Cryptology \u2013 INDOCRYPT 2013","author":"TP Berger","year":"2013","unstructured":"Berger, T.P.: Construction of recursive MDS diffusion layers from gabidulin codes. In: Paul, G., Vaudenay, S. (eds.) INDOCRYPT 2013. LNCS, vol. 8250, pp. 274\u2013285. Springer, Cham (2013). https:\/\/doi.org\/10.1007\/978-3-319-03515-4_18"},{"issue":"1","key":"17_CR5","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/18.746771","volume":"45","author":"M Blaum","year":"1999","unstructured":"Blaum, M., Roth, R.M.: On lowest density MDS codes. IEEE Trans. Inf. Theory 45(1), 46\u201359 (1999)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"17_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/978-3-662-43414-7_15","volume-title":"Selected Areas in Cryptography \u2013 SAC 2013","author":"TP Berger","year":"2014","unstructured":"Berger, T.P., Minier, M., Thomas, G.: Extended generalized feistel networks using matrix representation. In: Lange, T., Lauter, K., Lison\u011bk, P. (eds.) SAC 2013. LNCS, vol. 8282, pp. 289\u2013305. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-43414-7_15"},{"key":"17_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The Design of Rijndael: AES - The Advanced Encryption Standard","author":"J Daemen","year":"2002","unstructured":"Daemen, J., Rijmen, V.: The Design of Rijndael: AES - The Advanced Encryption Standard. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/978-3-662-04722-4"},{"key":"17_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1007\/978-3-642-22792-9_13","volume-title":"Advances in Cryptology \u2013 CRYPTO 2011","author":"J Guo","year":"2011","unstructured":"Guo, J., Peyrin, T., Poschmann, A.: The PHOTON family of lightweight hash functions. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 222\u2013239. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-22792-9_13"},{"key":"17_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1007\/978-3-642-23951-9_22","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2011","author":"J Guo","year":"2011","unstructured":"Guo, J., Peyrin, T., Poschmann, A., Robshaw, M.: The LED block cipher. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 326\u2013341. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-23951-9_22"},{"key":"17_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/978-3-642-40588-4_3","volume-title":"Security Engineering and Intelligence Informatics","author":"KC Gupta","year":"2013","unstructured":"Gupta, K.C., Ray, I.G.: On constructions of MDS matrices from companion matrices for lightweight cryptography. In: Cuzzocrea, A., Kittl, C., Simos, D.E., Weippl, E., Xu, L. (eds.) CD-ARES 2013. LNCS, vol. 8128, pp. 29\u201343. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40588-4_3"},{"issue":"1","key":"17_CR11","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/s10623-016-0233-4","volume":"82","author":"KC Gupta","year":"2017","unstructured":"Gupta, K.C., Pandey, S.K., Venkateswarlu, A.: On the direct construction of recursive MDS matrices. Des. Codes Crypt. 82(1), 77\u201394 (2017)","journal-title":"Des. Codes Crypt."},{"issue":"4","key":"17_CR12","doi-asserted-by":"crossref","first-page":"130","DOI":"10.46586\/tosc.v2017.i4.130-168","volume":"2017","author":"J Jean","year":"2017","unstructured":"Jean, J., Peyrin, T., Sim, S.M.: Optimizing implementations of lightweight building blocks. IACR Trans. Symmetric Cryptol. 2017(4), 130\u2013168 (2017)","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"17_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1007\/978-3-662-44709-3_24","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2014","author":"K Khoo","year":"2014","unstructured":"Khoo, K., Peyrin, T., Poschmann, A.Y., Yap, H.: FOAM: searching for hardware-optimal SPN structures and components with a fair comparison. In: Batina, L., Robshaw, M. (eds.) CHES 2014. LNCS, vol. 8731, pp. 433\u2013450. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-44709-3_24"},{"key":"17_CR14","unstructured":"Kolay, S., Mukhopadhyay, D.: Lightweight diffusion layer from the kth root of the MDS matrix. IACR Cryptology ePrint Archive 2014, 498 (2014)"},{"issue":"4","key":"17_CR15","doi-asserted-by":"publisher","first-page":"188","DOI":"10.13154\/tosc.v2017.i4.188-211","volume":"2017","author":"T Kranz","year":"2017","unstructured":"Kranz, T., Leander, G., Stoffelen, K., Wiemer, F.: Shorter linear straight-line programs for MDS matrices yet another XOR count paper. IACR Trans. Symmetric Cryptol. 2017(4), 188\u2013211 (2017). https:\/\/doi.org\/10.13154\/tosc.v2017.i4.188-211","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"17_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/978-3-662-52993-5_6","volume-title":"Fast Software Encryption","author":"M Liu","year":"2016","unstructured":"Liu, M., Sim, S.M.: Lightweight MDS generalized circulant matrices. In: Peyrin, T. (ed.) FSE 2016. LNCS, vol. 9783, pp. 101\u2013120. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-52993-5_6"},{"key":"17_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/978-3-662-52993-5_7","volume-title":"Fast Software Encryption","author":"Y Li","year":"2016","unstructured":"Li, Y., Wang, M.: On the construction of lightweight circulant involutory MDS matrices. In: Peyrin, T. (ed.) FSE 2016. LNCS, vol. 9783, pp. 121\u2013139. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-52993-5_7"},{"issue":"1","key":"17_CR18","doi-asserted-by":"crossref","first-page":"129","DOI":"10.46586\/tosc.v2017.i1.129-155","volume":"2017","author":"C Li","year":"2017","unstructured":"Li, C., Wang, Q.: Design of lightweight linear diffusion layers from near-MDS matrices. IACR Trans. Symmetric Cryptol. 2017(1), 129\u2013155 (2017)","journal-title":"IACR Trans. Symmetric Cryptol."},{"issue":"4","key":"17_CR19","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon, C.E.: Communication theory of secrecy systems. Bell Labs Tech. J. 28(4), 656\u2013715 (1949)","journal-title":"Bell Labs Tech. J."},{"key":"17_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1007\/978-3-642-34047-5_22","volume-title":"Fast Software Encryption","author":"M Sajadieh","year":"2012","unstructured":"Sajadieh, M., Dakhilalian, M., Mala, H., Sepehrdad, P.: Recursive diffusion layers for block ciphers and hash functions. In: Canteaut, A. (ed.) FSE 2012. LNCS, vol. 7549, pp. 385\u2013401. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-34047-5_22"},{"key":"17_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1007\/978-3-662-48116-5_23","volume-title":"Fast Software Encryption","author":"SM Sim","year":"2015","unstructured":"Sim, S.M., Khoo, K., Oggier, F., Peyrin, T.: Lightweight MDS involution matrices. In: Leander, G. (ed.) FSE 2015. LNCS, vol. 9054, pp. 471\u2013493. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-48116-5_23"},{"issue":"1","key":"17_CR22","doi-asserted-by":"crossref","first-page":"95","DOI":"10.46586\/tosc.v2016.i1.95-113","volume":"2016","author":"S Sarkar","year":"2016","unstructured":"Sarkar, S., Syed, H.: Lightweight diffusion layer: importance of toeplitz matrices. IACR Trans. Symmetric Cryptol. 2016(1), 95\u2013113 (2016)","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"17_CR23","doi-asserted-by":"crossref","unstructured":"Toh, D., Teo, J., Khoo, K., Sim, S.M.: Lightweight MDS serial-type matrices with minimal fixed XOR count. IACR Cryptology ePrint Archive 2017, 1084 (2017)","DOI":"10.1007\/978-3-319-89339-6_4"},{"key":"17_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1007\/978-3-642-35999-6_23","volume-title":"Selected Areas in Cryptography","author":"S Wu","year":"2013","unstructured":"Wu, S., Wang, M., Wu, W.: Recursive diffusion layers for (lightweight) block ciphers and hash functions. In: Knudsen, L.R., Wu, H. (eds.) SAC 2012. LNCS, vol. 7707, pp. 355\u2013371. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-35999-6_23"},{"key":"17_CR25","doi-asserted-by":"crossref","unstructured":"Zhao, R., Zhang, R., Li, Y., Wu, B.: On constructions of a sort of MDS block diffusion matrices for block ciphers and hash functions. IACR Cryptology ePrint Archive 2015, 449 (2015)","DOI":"10.1007\/s11432-015-0363-7"}],"container-title":["Lecture Notes in Computer Science","Advances in Information and Computer Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-97916-8_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,28]],"date-time":"2022-08-28T04:57:20Z","timestamp":1661662640000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-97916-8_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319979151","9783319979168"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-97916-8_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}