{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T05:32:53Z","timestamp":1725514373357},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540721598"},{"type":"electronic","value":"9783540721635"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-72163-5_4","type":"book-chapter","created":{"date-parts":[[2007,6,5]],"date-time":"2007-06-05T09:27:19Z","timestamp":1181035639000},"page":"33-42","source":"Crossref","is-referenced-by-count":3,"title":["Related-Key Rectangle Attack on 43-Round SHACAL-2"],"prefix":"10.1007","author":[{"given":"Gaoli","family":"Wang","sequence":"first","affiliation":[]}],"member":"297","reference":[{"unstructured":"Handschuh, H., Naccache, D.: SHACAL. in Preproceedings of NESSIE first workshop, Leuven (2000)","key":"4_CR1"},{"unstructured":"Handschuh, H., Naccache, D.: SHACAL: A Family of Block Ciphers. Submission to the NESSIE project (2002)","key":"4_CR2"},{"key":"4_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1007\/3-540-38424-3_1","volume-title":"Advances in Cryptology - CRYPTO \u201990","author":"E. Biham","year":"1991","unstructured":"Biham, E., Shamir, A.: Differential Cryptanalysis of DES-like Cryptosystems. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol.\u00a0537, pp. 2\u201321. Springer, Heidelberg (1991)"},{"key":"4_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"398","DOI":"10.1007\/3-540-48285-7_34","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"E. Biham","year":"1994","unstructured":"Biham, E.: New Types of Cryptanalytic Attacks Using Related Keys. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 398\u2013409. Springer, Heidelberg (1994)"},{"key":"4_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1007\/978-3-540-39887-5_3","volume-title":"Fast Software Encryption","author":"E. Biham","year":"2003","unstructured":"Biham, E., Dunkelman, O., Keller, N.: Rectangle Attacks on 49-Round SHACAL-1. In: Johansson, T. (ed.) FSE 2003. LNCS, vol.\u00a02887, pp. 22\u201335. Springer, Heidelberg (2003)"},{"key":"4_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1007\/11426639_30","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"E. Biham","year":"2005","unstructured":"Biham, E.: Orr Dunkelman, Nathan Keller, Related-Key Boomerang and Rectangle Attacks. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol.\u00a03494, pp. 507\u2013525. Springer, Heidelberg (2005)"},{"key":"4_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/3-540-36178-2_15","volume-title":"Advances in Cryptology - ASIACRYPT 2002","author":"J. Kim","year":"2002","unstructured":"Kim, J., et al.: Amplified Boomerang Attack against Reduced-Round SHACAL. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol.\u00a02501, pp. 243\u2013253. Springer, Heidelberg (2002)"},{"key":"4_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1007\/978-3-540-27800-9_11","volume-title":"Information Security and Privacy","author":"J. Kim","year":"2004","unstructured":"Kim, J., et al.: The Related-Key Rectangle Attack- Application to SHACAL-1. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) ACISP 2004. LNCS, vol.\u00a03108, pp. 123\u2013136. Springer, Heidelberg (2004)"},{"key":"4_CR9","series-title":"Lecture Notes in Computer Science","first-page":"368","volume-title":"Fast Software Encryption","author":"B. Preneel","year":"2005","unstructured":"Preneel, B., et al.: Related-Key Rectangle Attacks on Reduced Versions of SHACAL-1 and AES-192. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol.\u00a03557, pp. 368\u2013383. Springer, Heidelberg (2005)"},{"key":"4_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1007\/978-3-540-24582-7_7","volume-title":"Progress in Cryptology - INDOCRYPT 2003","author":"S. Hong","year":"2003","unstructured":"Hong, S., et al.: Impossible Differential Attack on 30-Round SHACAL-2. In: Johansson, T., Maitra, S. (eds.) INDOCRYPT 2003. LNCS, vol.\u00a02904, pp. 97\u2013106. Springer, Heidelberg (2003)"},{"key":"4_CR11","series-title":"Lecture Notes in Computer Science","first-page":"302","volume-title":"Information Security and Privacy","author":"Y. Shin","year":"2004","unstructured":"Shin, Y., et al.: Differential-Linear Type Attack on Reduced Rounds of SHACAL-2. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) ACISP 2004. LNCS, vol.\u00a03108, pp. 302\u20139743. Springer, Heidelberg (2004)"},{"key":"4_CR12","series-title":"Lecture Notes in Computer Science","volume-title":"Progress in Cryptology - INDOCRYPT 2004","author":"J. Kim","year":"2004","unstructured":"Kim, J., et al.: Related-Key Attacks on Reduced Rounds of SHACAL-2. In: Canteaut, A., Viswanathan, K. (eds.) INDOCRYPT 2004. LNCS, vol.\u00a03348, Springer, Heidelberg (2004)"},{"key":"4_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/11836810_7","volume-title":"Information Security","author":"J. Lu","year":"2006","unstructured":"Lu, J., et al.: Related-Key Rectangle Attack on 42-Round SHACAL-2. In: Katsikas, S.K., et al. (eds.) ISC 2006. LNCS, vol.\u00a04176, Springer, Heidelberg (2006)"},{"key":"4_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/3-540-45473-X_23","volume-title":"Fast Software Encryption","author":"M. Blunden","year":"2002","unstructured":"Blunden, M., Escott, A.: Related Key Attacks on Reduced Round KASUMI. In: Matsui, M. (ed.) FSE 2001. LNCS, vol.\u00a02355, pp. 277\u2013285. Springer, Heidelberg (2002)"},{"key":"4_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1007\/3-540-68697-5_19","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"J. Kelsey","year":"1996","unstructured":"Kelsey, J., Schneier, B., Wagner, D.: Key Schedule Cryptanalysis of IDEA, GDES, GOST, SAFER, and Triple-DES. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 237\u2013251. Springer, Heidelberg (1996)"},{"key":"4_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/BFb0028479","volume-title":"Information and Communications Security","author":"J. Kelsey","year":"1997","unstructured":"Kelsey, J., Schneir, B., Wagner, D.: Related-Key Cryptanalysis of 3-WAY, Biham- DES, CAST, DES-X, NewDES, RC2, and TEA. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol.\u00a01334, pp. 233\u2013246. Springer, Heidelberg (1997)"},{"key":"4_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1007\/978-3-540-25937-4_19","volume-title":"Fast Software Encryption","author":"Y. Ko","year":"2004","unstructured":"Ko, Y., et al.: Related Key Differential Attacks on 26 Rounds of XTEA and Full Rounds of GOST. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol.\u00a03017, pp. 299\u2013316. Springer, Heidelberg (2004)"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-72163-5_4.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T05:29:24Z","timestamp":1605763764000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-72163-5_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540721598","9783540721635"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-72163-5_4","relation":{},"subject":[]}}