{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T04:54:11Z","timestamp":1764996851252},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540858843"},{"type":"electronic","value":"9783540858867"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-85886-7_21","type":"book-chapter","created":{"date-parts":[[2008,9,17]],"date-time":"2008-09-17T12:45:42Z","timestamp":1221655542000},"page":"298-315","source":"Crossref","is-referenced-by-count":10,"title":["Improved Impossible Differential Attacks on Large-Block Rijndael"],"prefix":"10.1007","author":[{"given":"Lei","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Wenling","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Je Hong","family":"Park","sequence":"additional","affiliation":[]},{"given":"Bon Wook","family":"Koo","sequence":"additional","affiliation":[]},{"given":"Yongjin","family":"Yeom","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","unstructured":"National Institute of Standards and Technology. FIPS-197: Advanced Encryption Standard (AES) (November 2001)"},{"key":"21_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/11605805_2","volume-title":"Topics in Cryptology \u2013 CT-RSA 2006","author":"E. Biham","year":"2006","unstructured":"Biham, E., Dunkelman, O., Keller, N.: Related-key impossible differential attacks on 8-round AES-192. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol.\u00a03860, pp. 21\u201333. Springer, Heidelberg (2006)"},{"key":"21_CR3","unstructured":"Biham, E., Keller, N.: Cryptanalysis of reduced variants of Rijadeal. Official public comment for Round 2 of the AES development effort (2000)"},{"key":"21_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1007\/11506447_2","volume-title":"Advanced Encryption Standard \u2013 AES","author":"A. Biryukov","year":"2005","unstructured":"Biryukov, A.: The boomerang attack on 5 and 6 round reduced AES. In: Dobbertin, H., Rijmen, V., Sowa, A. (eds.) AES 2005. LNCS, vol.\u00a03373, pp. 11\u201315. Springer, Heidelberg (2005)"},{"key":"21_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/3-540-45861-1_4","volume-title":"Information Security and Cryptology - ICISC 2001","author":"J.H. Cheon","year":"2002","unstructured":"Cheon, J.H., Kim, M.J., Kim, K., Lee, J.-Y., Kang, S.W.: Improved impossible differential cryptanlaysis of Rijndael and Crypton. In: Kim, K.-c. (ed.) ICISC 2001. LNCS, vol.\u00a02288, pp. 39\u201349. Springer, Heidelberg (2002)"},{"key":"21_CR6","unstructured":"Daemen, J., Rijmen, V.: AES Proposal: Rijndae. In: 1st AES Conference, California, USA (1998)"},{"key":"21_CR7","volume-title":"The Design of Rijndael","author":"J. Daemen","year":"2001","unstructured":"Daemen, J., Rijmen, V.: The Design of Rijndael. Springer, Heidelberg (2001)"},{"key":"21_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1007\/978-3-540-71039-4_7","volume-title":"FSE 2008","author":"H. Demirci","year":"2008","unstructured":"Demirci, H., Sel\u00e7uk, A.A.: A meet-in-the-middle attack on 8-round AES. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol.\u00a05086, pp. 116\u2013126. Springer, Heidelberg (2008)"},{"key":"21_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44706-7_15","volume-title":"Fast Software Encryption","author":"N. Ferguson","year":"2001","unstructured":"Ferguson, N., Kelsey, J., Lucks, S., Schneier, B., Stay, M., Wager, D., Whiting, D.: Improved cryptanalysis of Rijndael. In: Schneier, B. (ed.) FSE 2000. LNCS, vol.\u00a01978, pp. 213\u2013230. Springer, Heidelberg (2001)"},{"key":"21_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-68164-9_1","volume-title":"AFRICACRYPT 2008","author":"S. Galice","year":"2008","unstructured":"Galice, S., Minier, M.: Improving integral attacks against Rijndael-256 up to 9 rounds. In: Vaudenay, S. (ed.) AFRICACRYPT 2008. LNCS, vol.\u00a05023, pp. 1\u201315. Springer, Heidelberg (2008)"},{"key":"21_CR11","unstructured":"Gilbert, H., Minier, M.: A collision attack on 7 rounds of Rijndael. In: Proc. of 3rd AES Candidate Conference (2000)"},{"key":"21_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1007\/978-3-540-24654-1_15","volume-title":"SAC 2003","author":"G. Jakimoski","year":"2004","unstructured":"Jakimoski, G., Desmedt, Y.: Related-key differential cryptanalysis of 192-bit key AES variants. In: Matsui, M., Zuccherato, R. (eds.) SAC 2003. LNCS, vol.\u00a03006, pp. 208\u2013221. Springer, Heidelberg (2004)"},{"key":"21_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1007\/978-3-540-76900-2_14","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2007","author":"G. Jakimoski","year":"2007","unstructured":"Jakimoski, G., Subbalakshmi, K.P.: On efficient message authentication via block cipher desing techniques. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol.\u00a04833, pp. 232\u2013248. Springer, Heidelberg (2007)"},{"key":"21_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/978-3-540-74619-5_15","volume-title":"Fast Software Encryption","author":"J. Kim","year":"2007","unstructured":"Kim, J., Hong, S., Preneel, B.: Related-key rectangle attacks on reduced AES-192 and AES-256. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol.\u00a04593, pp. 225\u2013241. Springer, Heidelberg (2007)"},{"key":"21_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1007\/978-3-540-24582-7_6","volume-title":"Progress in Cryptology - INDOCRYPT 2003","author":"J. Kim","year":"2003","unstructured":"Kim, J., Hong, S., Sung, J., Lee, C., Lee, S.: Impossible differential cryptanalysis for block cipher structures. In: Johansson, T., Maitra, S. (eds.) INDOCRYPT 2003. LNCS, vol.\u00a02904, pp. 82\u201396. Springer, Heidelberg (2003)"},{"key":"21_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/978-3-540-74619-5_3","volume-title":"Fast Software Encryption","author":"L.R. Knudsen","year":"2007","unstructured":"Knudsen, L.R., Rechberger, C., Thomsen, S.S.: The Grindahl hash functions. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol.\u00a04593, pp. 39\u201357. Springer, Heidelberg (2007)"},{"key":"21_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1007\/978-3-540-79263-5_24","volume-title":"CT-RSA 2008","author":"J. Lu","year":"2008","unstructured":"Lu, J., Kim, J., Keller, N., Dunkelman, O.: Improving the efficiency of impossible differential cryptanalysis of reduced Camellia and MISTY1. In: Malkin, T. (ed.) CT-RSA 2008. LNCS, vol.\u00a04964, pp. 370\u2013386. Springer, Heidelberg (2008)"},{"key":"21_CR18","unstructured":"Lucks, S.: Attacking seven rounds of Rijndael under 192-bit and 256-bit keys. In: Proc. of 3rd AES Candidate Conference (2000)"},{"key":"21_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/11554868_20","volume-title":"Progress in Cryptology \u2013 Mycrypt 2005","author":"J. Nakahara Jr.","year":"2005","unstructured":"Nakahara Jr., J., de Freitas, D.S., Phan, R.C.-W.: New multiset attacks on Rijndael with large blocks. In: Dawson, E., Vaudenay, S. (eds.) Mycrypt 2005. LNCS, vol.\u00a03715, pp. 277\u2013295. Springer, Heidelberg (2005)"},{"key":"21_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/978-3-540-75496-1_7","volume-title":"Information Security","author":"J. Nakahara Jr.","year":"2007","unstructured":"Nakahara Jr., J., Pav\u00e3o, I.C.: Impossible-differential attacks on large-block Rijndael. In: Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007. LNCS, vol.\u00a04779, pp. 104\u2013117. Springer, Heidelberg (2007)"},{"key":"21_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1007\/978-3-540-76900-2_34","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2007","author":"T. Peyrin","year":"2007","unstructured":"Peyrin, T.: Cryptanalysis of Grindahl. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol.\u00a04833, pp. 551\u2013567. Springer, Heidelberg (2007)"},{"key":"21_CR22","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.ipl.2004.02.018","volume":"91","author":"R.C.-W. Phan","year":"2004","unstructured":"Phan, R.C.-W.: Impossible differential cryptanalysis of 7 round Advanced Encryption Standard (AES). Information Processing Letters\u00a091, 33\u201338 (2004)","journal-title":"Information Processing Letters"},{"key":"21_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/978-3-540-76788-6_19","volume-title":"Information Security and Cryptology - ICISC 2007","author":"W. Zhang","year":"2007","unstructured":"Zhang, W., Wu, W., Feng, D.: New result on impossible differential cryptanalysis of reduced AES. In: Nam, K.-H., Rhee, G. (eds.) ICISC 2007. LNCS, vol.\u00a04817, pp. 239\u2013250. Springer, Heidelberg (2007)"},{"key":"21_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/978-3-540-74462-7_2","volume-title":"Selected Areas in Cryptography","author":"W. Zhang","year":"2007","unstructured":"Zhang, W., Wu, W., Zhang, L., Feng, D.: Improved related-key impossible differential attacks on reduced-round AES-192. In: Biham, E., Youssef, A.M. (eds.) SAC 2006. LNCS, vol.\u00a04356, pp. 15\u201327. Springer, Heidelberg (2007)"},{"key":"21_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/978-3-540-77026-8_7","volume-title":"Progress in Cryptology \u2013 INDOCRYPT 2007","author":"W. Zhang","year":"2007","unstructured":"Zhang, W., Zhang, L., Wu, W., Feng, D.: Related-key differential-linear attacks on reduced AES-192. In: Srinathan, K., Pandu Rangan, C., Yung, M. (eds.) INDOCRYPT 2007. LNCS, vol.\u00a04859, pp. 73\u201385. Springer, Heidelberg (2007)"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-85886-7_21.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T11:53:52Z","timestamp":1619524432000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-85886-7_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540858843","9783540858867"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-85886-7_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}