{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T16:14:50Z","timestamp":1764173690356},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642173721"},{"type":"electronic","value":"9783642173738"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17373-8_3","type":"book-chapter","created":{"date-parts":[[2010,12,2]],"date-time":"2010-12-02T15:22:55Z","timestamp":1291303375000},"page":"38-55","source":"Crossref","is-referenced-by-count":25,"title":["Non-full-active Super-Sbox Analysis: Applications to ECHO and Gr\u00f8stl"],"prefix":"10.1007","author":[{"given":"Yu","family":"Sasaki","sequence":"first","affiliation":[]},{"given":"Yang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Kazuo","family":"Sakiyama","sequence":"additional","affiliation":[]},{"given":"Kazuo","family":"Ohta","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/11426639_2","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"X. Wang","year":"2005","unstructured":"Wang, X., Yu, H.: How to break MD5 and other hash functions. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol.\u00a03494, pp. 19\u201335. Springer, Heidelberg (2005)"},{"key":"3_CR2","series-title":"Lecture Notes in Computer Science","first-page":"17","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"X. Wang","year":"2005","unstructured":"Wang, X., Yin, Y.L., Yu, H.: Finding collisions in the full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol.\u00a03621, pp. 17\u201336. Springer, Heidelberg (2005)"},{"unstructured":"U.S. Department of Commerce, National Institute of Standards and Technology: Federal Register \/Vol. 72, No. 212\/Friday, November 2, 2007\/Notices (2007)","key":"3_CR3"},{"unstructured":"U.S. Department of Commerce, National Institute of Standards and Technology: Specification for the ADVANCED ENCRYPTION STANDARD (AES) (Federal Information Processing Standards Publication 197) (2001)","key":"3_CR4"},{"key":"3_CR5","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The design of Rijndael: AES \u2013 the Advanced Encryption Standard (AES).","author":"J. Daemen","year":"2002","unstructured":"Daemen, J., Rijmen, V.: The design of Rijndael: AES \u2013 the Advanced Encryption Standard (AES). Springer, Heidelberg (2002)"},{"key":"3_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1007\/978-3-540-76900-2_34","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2007","author":"T. Peyrin","year":"2007","unstructured":"Peyrin, T.: Cryptanalysis of Grindahl. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol.\u00a04833, pp. 551\u2013567. Springer, Heidelberg (2007)"},{"key":"3_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1007\/978-3-642-03317-9_16","volume-title":"Fast Software Encryption","author":"F. Mendel","year":"2009","unstructured":"Mendel, F., Rechberger, C., Schl\u00e4ffer, M., Thomsen, S.S.: The rebound attack: Cryptanalysis of reduced Whirlpool and Gr\u00f8stl. In: Dunkelman, O. (ed.) Fast Software Encryption. LNCS, vol.\u00a05665, pp. 260\u2013276. Springer, Heidelberg (2009)"},{"key":"3_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-642-05445-7_2","volume-title":"Selected Areas in Cryptography","author":"F. Mendel","year":"2009","unstructured":"Mendel, F., Peyrin, T., Rechberger, C., Schl\u00e4ffer, M.: Improved cryptanalysis of the reduced Gr\u00f8stl compression function, ECHO permutation and AES block cipher. In: Jacobson Jr., M.J., Rijmen, V., Safavi-Naini, R. (eds.) SAC 2009. LNCS, vol.\u00a05867, pp. 16\u201335. Springer, Heidelberg (2009)"},{"key":"3_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"365","DOI":"10.1007\/978-3-642-13858-4_21","volume-title":"FSE 2010","author":"H. Gilbert","year":"2010","unstructured":"Gilbert, H., Peyrin, T.: Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations. In: Hong, S., Iwata, T. (eds.) FSE 2010. LNCS, vol.\u00a06147, pp. 365\u2013383. Springer, Heidelberg (2010)"},{"key":"3_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"286","DOI":"10.1007\/978-3-642-13858-4_16","volume-title":"FSE 2010","author":"V. Rijmen","year":"2010","unstructured":"Rijmen, V., Toz, D., Varici, K.: Rebound attack on reduced-round versions of JH. In: Hong, S., Iwata, T. (eds.) FSE 2010. LNCS, vol.\u00a06147, pp. 286\u2013303. Springer, Heidelberg (2010)"},{"key":"3_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1007\/978-3-642-05445-7_8","volume-title":"Selected Areas in Cryptography","author":"S. Wu","year":"2009","unstructured":"Wu, S., Feng, D., Wu, W.: Cryptanalysis of the LANE hash function. In: Jacobson Jr., M.J., Rijmen, V., Safavi-Naini, R. (eds.) SAC 2009. LNCS, vol.\u00a05867, pp. 126\u2013140. Springer, Heidelberg (2009)"},{"key":"3_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1007\/978-3-642-14423-3_20","volume-title":"Information, Security and Cryptology \u2013 ICISC 2009","author":"S. Wu","year":"2010","unstructured":"Wu, S., Feng, D., Wu, W.: Practical rebound attack on 12-round Cheetah-256. In: Lee, D., Hong, S. (eds.) ICISC 2009. LNCS, vol.\u00a05984, pp. 300\u2013314. Springer, Heidelberg (2010)"},{"key":"3_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1007\/978-3-642-10366-7_7","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2009","author":"K. Matusiewicz","year":"2009","unstructured":"Matusiewicz, K., Naya-Plasencia, M., Nikoli\u0107, I., Sasaki, Y., Schl\u00e4ffer, M.: Rebound attack on the full LANE compression function. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol.\u00a05912, pp. 106\u2013125. Springer, Heidelberg (2009)"},{"key":"3_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1007\/978-3-642-01957-9_21","volume-title":"Applied Cryptography and Network Security","author":"F. Mendel","year":"2009","unstructured":"Mendel, F., Rechberger, C., Schl\u00e4ffer, M.: Cryptanalysis of Twister. In: Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. LNCS, vol.\u00a05536, pp. 342\u2013353. Springer, Heidelberg (2009)"},{"key":"3_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1007\/978-3-642-10366-7_8","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2009","author":"M. Lamberger","year":"2009","unstructured":"Lamberger, M., Mendel, F., Rechberger, C., Rijmen, V., Schl\u00e4ffer, M.: Rebound distinguishers: Results on the full Whirlpool compression function. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol.\u00a05912, pp. 126\u2013143. Springer, Heidelberg (2009)"},{"unstructured":"Lamberger, M., Mendel, F., Rechberger, C., Rijmen, V., Schl\u00e4ffer, M.: The rebound attack and subspace distinguishers: Application to Whirlpool. Cryptology ePrint Archive, Report 2010\/198 (2010)","key":"3_CR16"},{"key":"3_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1007\/978-3-642-11925-5_24","volume-title":"Topics in Cryptology - CT-RSA 2010","author":"F. Mendel","year":"2010","unstructured":"Mendel, F., Rechberger, C., Schl\u00e4ffer, M., Thomsen, S.S.: Rebound attack on the reduced Gr\u00f8stl hash function. In: Pieprzyk, J. (ed.) Topics in Cryptology - CT-RSA 2010. LNCS, vol.\u00a05985, pp. 350\u2013365. Springer, Heidelberg (2010)"},{"unstructured":"Gauravaram, P., Knudsen, L.R., Matusiewicz, K., Mendel, F., Rechberger, C., Schl\u00e4ffer, M., Thomsen, S.S.: Gr\u00f8stl addendum. Submission to NIST (updated) (2009)","key":"3_CR18"},{"unstructured":"Benadjila, R., Billet, O., Gilbert, H., Macario-Rat, G., Peyrin, T., Robshaw, M., Seurin, Y.: SHA-3 proposal: ECHO. Submission to NIST (updated) (2009)","key":"3_CR19"},{"unstructured":"Wu, H.: The hash function JH. Submission to NIST (updated) (2009)","key":"3_CR20"},{"unstructured":"Khovratovich, D., Biryukov, A., Nikoli\u0107, I.: The hash function Cheetah: Specification and supporting documentation. Submission to NIST (2008)","key":"3_CR21"},{"unstructured":"Indesteege, S.: The LANE hash function. Submission to NIST (2008)","key":"3_CR22"},{"unstructured":"Ewan Fleischmann, C.F., Gorski, M.: The Twister hash function family. Submission to NIST (2008)","key":"3_CR23"},{"unstructured":"Rijmen, V., Barreto, P.S.L.M.: The Whirlpool hashing function. Submitted to NISSIE (2000)","key":"3_CR24"},{"key":"3_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1007\/978-3-642-14623-7_20","volume-title":"CRYPTO 2010","author":"T. Peyrin","year":"2010","unstructured":"Peyrin, T.: Improved differential attacks for ECHO and Gr\u00f8stl. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol.\u00a06223, pp. 370\u2013392. Springer, Heidelberg (2010)"},{"doi-asserted-by":"crossref","unstructured":"Peyrin, T.: Improved differential attacks for ECHO and Gr\u00f8stl. Cryptology ePrint Archive, Report 2010\/223 (2010) Extended version of the CRYPTO (2010) article","key":"3_CR26","DOI":"10.1007\/978-3-642-14623-7_20"},{"doi-asserted-by":"crossref","unstructured":"Schl\u00e4ffer, M.: Subspace distinguisher for 5\/8 rounds of the ECHO-256 hash function. In: Preproceedings of SAC 2010, pp. 379\u2013398 (2010)","key":"3_CR27","DOI":"10.1007\/978-3-642-19574-7_25"},{"doi-asserted-by":"crossref","unstructured":"Ideguchi, K., Tischhauser, E., Preneel, B.: Improved collision attacks on the reduced-round Gr??stl hash function. Cryptology ePrint Archive, Report 2010\/375 (2010);","key":"#cr-split#-3_CR28.1","DOI":"10.1007\/978-3-642-18178-8_1"},{"unstructured":"Appeared in the accepted papers list of ISC (2010)","key":"#cr-split#-3_CR28.2"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology - ASIACRYPT 2010"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17373-8_3.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:52:53Z","timestamp":1606186373000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17373-8_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642173721","9783642173738"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17373-8_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}