{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T02:14:15Z","timestamp":1743041655123,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":36,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642111440"},{"type":"electronic","value":"9783642111457"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-11145-7_4","type":"book-chapter","created":{"date-parts":[[2010,1,13]],"date-time":"2010-01-13T03:23:04Z","timestamp":1263352984000},"page":"17-31","source":"Crossref","is-referenced-by-count":6,"title":["Security Analysis of the GF-NLFSR Structure and Four-Cell Block Cipher"],"prefix":"10.1007","author":[{"given":"Wenling","family":"Wu","sequence":"first","affiliation":[]},{"given":"Lei","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Liting","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Wentao","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"8","key":"4_CR1","first-page":"156","volume":"1","author":"K. Nyberg","year":"1995","unstructured":"Nyberg, K., Kundsen, L.: Provable Security against Differential Cryptanalysis. Journal of Cryptology\u00a01(8), 156\u2013168 (1995)","journal-title":"Journal of Cryptology"},{"key":"4_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1007\/3-540-58108-1_26","volume-title":"Fast Software Encryption","author":"L. Knudsen","year":"1994","unstructured":"Knudsen, L.: Practically secure Feistel ciphers. In: Anderson, R. (ed.) FSE 1993. LNCS, vol.\u00a0809, pp. 211\u2013221. Springer, Heidelberg (1994)"},{"key":"4_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1007\/3-540-44983-3_24","volume-title":"Selected Areas in Cryptography","author":"M. Kanda","year":"2001","unstructured":"Kanda, M.: Practical security evaluation against differential and linear cryptanalyses for feistel ciphers with SPN round function. In: Stinson, D.R., Tavares, S. (eds.) SAC 2000. LNCS, vol.\u00a02012, p. 324. Springer, Heidelberg (2001)"},{"issue":"2","key":"4_CR4","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1137\/0217022","volume":"17","author":"M. Luby","year":"1988","unstructured":"Luby, M., Rackoff, C.: How to construct pseudorandom permutations from pseudorandom functions. SIAM Journal on Computing\u00a017(2), 373\u2013386 (1988)","journal-title":"SIAM Journal on Computing"},{"key":"4_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1007\/3-540-60865-6_53","volume-title":"Fast Software Encryption","author":"S. Lucks","year":"1996","unstructured":"Lucks, S.: Faster Luby-Rackoff ciphers. In: Gollmann, D. (ed.) FSE 1996. LNCS, vol.\u00a01039, pp. 189\u2013203. Springer, Heidelberg (1996)"},{"key":"4_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/3-540-48519-8_13","volume-title":"Fast Software Encryption","author":"S. Patel","year":"1999","unstructured":"Patel, S., Ramzan, Z., Sundaram, G.: Towards making Luby-Rackoff ciphers optimal and practical. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol.\u00a01636, pp. 171\u2013185. Springer, Heidelberg (1999)"},{"issue":"1","key":"4_CR7","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1007\/PL00003817","volume":"12","author":"M. Naor","year":"1999","unstructured":"Naor, M., Reingold, O.: On the construction of pseudorandom permutations Luby-Rackoff revisited. Journal of Cryptology\u00a012(1), 9\u201366 (1999)","journal-title":"Journal of Cryptology"},{"key":"4_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"544","DOI":"10.1007\/3-540-39200-9_34","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"U. Maurer","year":"2003","unstructured":"Maurer, U., Pietrzak, K.: The security of Many-Round Luby-Rackoff Pseudorandom Permutation. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656, pp. 544\u2013561. Springer, Heidelberg (2003)"},{"key":"4_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1007\/978-3-540-28628-8_7","volume-title":"Advances in Cryptology \u2013 CRYPTO 2004","author":"J. Patarin","year":"2004","unstructured":"Patarin, J.: Security of Random Feistel schemes with 5 or more rounds. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol.\u00a03152, pp. 106\u2013122. Springer, Heidelberg (2004)"},{"issue":"1","key":"4_CR10","first-page":"1","volume":"12","author":"W. Wenling","year":"2006","unstructured":"Wenling, W.: Pseudorandomness of Camellia-like scheme. Journal of Computer Science and Technology\u00a012(1), 1\u201310 (2006)","journal-title":"Journal of Computer Science and Technology"},{"key":"4_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1007\/3-540-60865-6_54","volume-title":"Fast Software Encryption","author":"M. Matsui","year":"1996","unstructured":"Matsui, M.: New Structure of Block Ciphers with Provable Security against Differential and Linear Cryptanalysis. In: Gollmann, D. (ed.) FSE 1996. LNCS, vol.\u00a01039, pp. 205\u2013217. Springer, Heidelberg (1996)"},{"key":"4_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/BFb0052334","volume-title":"Fast Software Encryption","author":"M. Matsui","year":"1997","unstructured":"Matsui, M.: New Block Encryption Algorithm MISTY. In: Biham, E. (ed.) FSE 1997. LNCS, vol.\u00a01267, pp. 54\u201368. Springer, Heidelberg (1997)"},{"key":"4_CR13","unstructured":"ETSI, Universal Mobile Telecommunications System (UMTS), Specification of the 3GPP confidentiality and integrity algorithms, Document 2: Kasumi specification (2007), \n                    \n                      http:\/\/www.etsi.org\/website\/document\/algorithms\/ts_135202v070000p.pdf"},{"key":"4_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/3-540-45473-X_20","volume-title":"Fast Software Encryption","author":"T. Iwata","year":"2002","unstructured":"Iwata, T., Yoshino, T., Yuasa, T., Kurosawa, K.: Round security and super- pseudorandomness of MISTY type structure. In: Matsui, M. (ed.) FSE 2001. LNCS, vol.\u00a02355, pp. 233\u2013247. Springer, Heidelberg (2002)"},{"key":"4_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1007\/978-3-540-30564-4_7","volume-title":"Selected Areas in Cryptography","author":"G. Piret","year":"2004","unstructured":"Piret, G., Quisquater, J.-J.: Security of the MISTY Structure in the Luby-Rackoff Model: Improved Results. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol.\u00a03357, pp. 100\u2013115. Springer, Heidelberg (2004)"},{"key":"4_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1007\/3-540-47719-5_7","volume-title":"Information Security and Privacy","author":"J.S. Kang","year":"2001","unstructured":"Kang, J.S., Yi, O., Hong, D., et al.: Pseudorandomness of Misty-type Transformations and the Block Cipher KASUMI. In: Varadharajan, V., Mu, Y. (eds.) ACISP 2001. LNCS, vol.\u00a02119, pp. 60\u201373. Springer, Heidelberg (2001)"},{"key":"4_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/3-540-45067-X_12","volume-title":"Information Security and Privacy","author":"T. Iwata","year":"2003","unstructured":"Iwata, T., Yagi, T., Kurosawa, K.: On the Pseudorandomness of KASUMI Type Permutations. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol.\u00a02727, pp. 217\u2013289. Springer, Heidelberg (2003)"},{"key":"4_CR18","series-title":"Lecture Notes in Computer Science","first-page":"9","volume-title":"Advances in Cryptology - ASIACRYPT\u201999","author":"S. Vaudenay","year":"1999","unstructured":"Vaudenay, S.: On the Lai-Massey Scheme. In: Lam, K.-Y., Okamoto, E., Xing, C. (eds.) ASIACRYPT 1999. LNCS, vol.\u00a01716, pp. 9\u201319. Springer, Heidelberg (1999)"},{"key":"4_CR19","series-title":"Lecture Notes in Computer Science","first-page":"131","volume-title":"Selected Areas in Cryptography","author":"P. Junod","year":"2004","unstructured":"Junod, P., Vaudenay, S.: FOX: a new Family of Block Ciphers. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol.\u00a03357, pp. 131\u2013146. Springer, Heidelberg (2004)"},{"key":"4_CR20","series-title":"Lecture Notes in Computer Science","first-page":"121","volume-title":"Fast Software Encryption","author":"B. Schneier","year":"2005","unstructured":"Schneier, B., Kelsey, J.: Unbalanced Feistel Networks and Block Cipher Design. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol.\u00a03557, pp. 121\u2013144. Springer, Heidelberg (2005)"},{"issue":"3","key":"4_CR21","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1023\/A:1008229029587","volume":"12","author":"C. Adams","year":"1997","unstructured":"Adams, C.: Constructing Symmetric Ciphers Using the CAST Design Procedure. Designs, Codes and Cryptography\u00a012(3), 283\u2013316 (1997)","journal-title":"Designs, Codes and Cryptography"},{"key":"4_CR22","unstructured":"MARS Block cipher, \n                    \n                      http:\/\/www.nist.gov\/aes\/"},{"key":"4_CR23","unstructured":"Specification of SMS4, Block Cipher for WLAN Products-SMS4 (in Chinese), \n                    \n                      http:\/\/www.oscca.gov.cn\/UpFile\/200621016423197990.pdf"},{"key":"4_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/978-3-540-74619-5_12","volume-title":"Fast Software Encryption","author":"T. Shirai","year":"2007","unstructured":"Shirai, T., Shibutani, K., Akishita, T., Moriai, S., Iwata, T.: The 128-bit blockcipher CLEFIA (Extended abstract). In: Biryukov, A. (ed.) FSE 2007. LNCS, vol.\u00a04593, pp. 181\u2013195. Springer, Heidelberg (2007)"},{"key":"4_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/3-540-44448-3_22","volume-title":"Advances in Cryptology - ASIACRYPT 2000","author":"S. Moriai","year":"2000","unstructured":"Moriai, S., Vaudenay, S.: On the Pseudorandomness of Top-Level Schemes of Block Ciphers. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol.\u00a01976, pp. 289\u2013302. Springer, Heidelberg (2000)"},{"key":"4_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/BFb0034838","volume-title":"Advances in Cryptology - ASIACRYPT \u201996","author":"K. Nyberg","year":"1996","unstructured":"Nyberg, K.: Generlized Feistel networks. In: Kim, K.-c., Matsumoto, T. (eds.) ASIACRYPT 1996. LNCS, vol.\u00a01163, pp. 91\u2013104. Springer, Heidelberg (1996)"},{"issue":"3","key":"4_CR27","first-page":"296","volume":"2","author":"W. Wu","year":"2006","unstructured":"Wu, W., Zhang, W., Lin, D.: On the Security of Generalized Feistel Scheme with SP Round Function. International Journal Network Security\u00a02(3), 296\u2013305 (2006)","journal-title":"International Journal Network Security"},{"key":"4_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/11799313_4","volume-title":"Fast Software Encryption","author":"T. Shirai","year":"2006","unstructured":"Shirai, T., Shibutani, K.: On Feistel structures using a diffusion switching mechanism. In: Robshaw, M.J.B. (ed.) FSE 2006. LNCS, vol.\u00a04047, pp. 41\u201356. Springer, Heidelberg (2006)"},{"key":"4_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1007\/978-3-642-02620-1_6","volume-title":"ACISP 2009","author":"J. Choy","year":"2009","unstructured":"Choy, J., Chew, G., Khoo, K., Yap, H.: Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure. In: Boyd, C., Gonz\u00e1lez Nieto, J. (eds.) ACISP 2009. LNCS, vol.\u00a05594, pp. 73\u201389. Springer, Heidelberg (2009)"},{"key":"4_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1007\/3-540-48910-X_2","volume-title":"Advances in Cryptology - EUROCRYPT \u201999","author":"E. Biham","year":"1999","unstructured":"Biham, E., Biryukov, A., Shamir, A.: Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol.\u00a01592, pp. 12\u201323. Springer, Heidelberg (1999)"},{"issue":"1","key":"4_CR31","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.ipl.2004.02.018","volume":"91","author":"R.C.-W. Phan","year":"2004","unstructured":"Phan, R.C.-W.: Impossible Differential Cryptanalysis of 7-round AES. Information Processing Letters\u00a091(1), 33\u201338 (2004)","journal-title":"Information Processing Letters"},{"key":"4_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/978-3-540-76788-6_19","volume-title":"Information Security and Cryptology - ICISC 2007","author":"W. Zhang","year":"2007","unstructured":"Zhang, W., Wu, W., Feng, D.: New Results on Impossible Differential Cryptanalysis of Reduced AES. In: Nam, K.-H., Rhee, G. (eds.) ICISC 2007. LNCS, vol.\u00a04817, pp. 239\u2013250. Springer, Heidelberg (2007)"},{"issue":"3","key":"4_CR33","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1007\/s11390-007-9056-0","volume":"22","author":"W. Wu","year":"2007","unstructured":"Wu, W., Zhang, W., Feng, D.: Impossible Differential Cryptanalysis of Reduced-Round ARIA and Camellia. Journal of Computer Science and Technology\u00a022(3), 449\u2013456 (2007)","journal-title":"Journal of Computer Science and Technology"},{"key":"4_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1007\/978-3-540-71039-4_25","volume-title":"Fast Software Encryption","author":"Y. Tsunoo","year":"2008","unstructured":"Tsunoo, Y., Tsujihara, E., Shigeri, M., Saito, T., Suzaki, T., Kubo, H.: Impossible differential cryptanalysis of CLEFIA. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol.\u00a05086, pp. 398\u2013411. Springer, Heidelberg (2008)"},{"key":"4_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1007\/978-3-540-89255-7_27","volume-title":"Advances in Cryptology - ASIACRYPT 2008","author":"O. Dunkelman","year":"2008","unstructured":"Dunkelman, O., Keller, N.: An Improved Impossible Differential Attack on MISTY1. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol.\u00a05350, pp. 441\u2013454. Springer, Heidelberg (2008)"},{"key":"4_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1007\/978-3-540-24582-7_6","volume-title":"Progress in Cryptology - INDOCRYPT 2003","author":"J.-S. Kim","year":"2003","unstructured":"Kim, J.-S., Hong, S.H., Sung, J., Lee, S.-J., Lim, J.-I., Sung, S.H.: Impossible differential cryptanalysis for block cipher structures. In: Johansson, T., Maitra, S. (eds.) INDOCRYPT 2003. LNCS, vol.\u00a02904, pp. 82\u201396. Springer, Heidelberg (2003)"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-11145-7_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,25]],"date-time":"2019-08-25T20:11:19Z","timestamp":1566763879000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-11145-7_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642111440","9783642111457"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-11145-7_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}