{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T14:45:53Z","timestamp":1761662753656},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642008429"},{"type":"electronic","value":"9783642008436"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-00843-6_28","type":"book-chapter","created":{"date-parts":[[2009,4,1]],"date-time":"2009-04-01T10:42:08Z","timestamp":1238582528000},"page":"324-335","source":"Crossref","is-referenced-by-count":12,"title":["Some New Observations on the SMS4 Block Cipher in the Chinese WAPI Standard"],"prefix":"10.1007","author":[{"given":"Wentao","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Wenling","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Dengguo","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Bozhan","family":"Su","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"28_CR1","unstructured":"Specification of SMS4, Block Cipher for WLAN Products \u2013 SMS4 (in Chinese), http:\/\/www.oscca.gov.cn\/UpFile\/200621016423197990.pdf"},{"key":"28_CR2","unstructured":"Daemen, J.: Cipher and Hash Function Design Strategies Based on Linear and Differential Cryptanalysis, Doctoral Dissertation, K.U.Leuven (March 1995)"},{"key":"28_CR3","unstructured":"Diffie, W., Ledin, G. (translators): SMS4 Encryption Algorithm for Wireless Networks Cryptology ePrint Archive, report 2008\/329, received (July 29, 2008), http:\/\/eprint.iacr.org\/"},{"key":"28_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/978-3-540-88625-9_10","volume-title":"Information and Communications Security","author":"O. Dunkelman","year":"2008","unstructured":"Dunkelman, O., Toz, D.: Analysis of the Attacking Reduced-Round Versions of the SMS4. In: Chen, L., Ryan, M.D., Wang, G. (eds.) ICICS 2008. LNCS, vol.\u00a05308, pp. 141\u2013156. Springer, Heidelberg (2008)"},{"key":"28_CR5","doi-asserted-by":"crossref","unstructured":"Etrog, J., Robshaw, M.J.B.: The Cryptanalysis of Reduced-Round SMS4. In: Proceedings of SAC 2008 (2008)","DOI":"10.1007\/978-3-642-04159-4_4"},{"key":"28_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/978-3-540-24654-1_13","volume-title":"Selected Areas in Cryptography","author":"H. Gilbert","year":"2004","unstructured":"Gilbert, H., Handschuh, H.: Security Analysis of SHA-256 and Sisters. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol.\u00a03006, pp. 175\u2013193. Springer, Heidelberg (2004)"},{"key":"28_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1007\/978-3-540-77026-8_18","volume-title":"Progress in Cryptology \u2013 INDOCRYPT 2007","author":"W. Ji","year":"2007","unstructured":"Ji, W., Hu, L.: New description of SMS4 by an embedding overGF(28). In: Srinathan, K., Rangan, C.P., Yung, M. (eds.) INDOCRYPT 2007. LNCS, vol.\u00a04859, pp. 238\u2013251. Springer, Heidelberg (2007)"},{"key":"28_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1007\/3-540-44983-3_24","volume-title":"Selected Areas in Cryptography","author":"M. Kanda","year":"2001","unstructured":"Kanda, M.: Practical security evaluation against differential and linear attacks for Feistel ciphers with SPN round function. In: Stinson, D.R., Tavares, S. (eds.) SAC 2000. LNCS, vol.\u00a02012, pp. 168\u2013179. Springer, Heidelberg (2001)"},{"key":"28_CR9","unstructured":"Kim, T., Kim, J., Hong, S., Sun, J.: Linear and Diffrential Cryptanalysis of Reduced SMS4 Block Cipher, Cryptology ePrint Archive, report 2008\/281, http:\/\/eprint.iacr.org\/"},{"key":"28_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1007\/978-3-540-73458-1_13","volume-title":"Information Security and Privacy","author":"F. Liu","year":"2007","unstructured":"Liu, F., Ji, W., Hu, L., Ding, J., Lv, S., Pyshkin, A., Weinmann, R.-P.: Analysis of the SMS4 block cipher. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. LNCS, vol.\u00a04586, pp. 158\u2013170. Springer, Heidelberg (2007)"},{"key":"28_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1007\/978-3-540-77048-0_24","volume-title":"Information and Communications Security","author":"J. Lu","year":"2007","unstructured":"Lu, J.: Attacking reduced-round versions of the SMS4 block cipher in the chinese WAPI standard. In: Qing, S., Imai, H., Wang, G. (eds.) ICICS 2007. LNCS, vol.\u00a04861, pp. 306\u2013318. Springer, Heidelberg (2007)"},{"key":"28_CR12","unstructured":"Wang, J.B.: The Optimal Permutation in Cryptography Based on Cyclic - Shift Linear Transform. In: ChinaCrypt 2007, pp. 306\u2013307 (2007) (in Chinese)"},{"issue":"14","key":"28_CR13","doi-asserted-by":"publisher","first-page":"896","DOI":"10.1049\/el:20010619","volume":"37","author":"R.C.W. Phan","year":"2001","unstructured":"Phan, R.C.W., Siddiqi, M.U.: Generalized Impossible Differentials of Advanced Encryption Standard. Electronics Letters\u00a037(14), 896\u2013898 (2001)","journal-title":"Electronics Letters"},{"key":"28_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1007\/978-3-540-70500-0_16","volume-title":"Information Security and Privacy","author":"L. Zhang","year":"2008","unstructured":"Zhang, L., Zhang, W.T., Wu, W.L.: Cryptanalysis of reduced-round SMS4 block cipher. In: Mu, Y., Susilo, W., Seberry, J. (eds.) ACISP 2008. LNCS, vol.\u00a05107, pp. 216\u2013229. Springer, Heidelberg (2008)"},{"key":"28_CR15","unstructured":"Zhang, L., Wu, W.L.: Differential fault attack on SMS4. Chinese Journal of Computers\u00a029(9) (2006) (in Chinese)"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-00843-6_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T03:14:18Z","timestamp":1558235658000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-00843-6_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642008429","9783642008436"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-00843-6_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}