{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T04:55:16Z","timestamp":1764996916678},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642204647"},{"type":"electronic","value":"9783642204654"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-20465-4_18","type":"book-chapter","created":{"date-parts":[[2011,5,2]],"date-time":"2011-05-02T14:42:47Z","timestamp":1304347367000},"page":"303-322","source":"Crossref","is-referenced-by-count":35,"title":["On Linear Hulls, Statistical Saturation Attacks, PRESENT and a Cryptanalysis of PUFFIN"],"prefix":"10.1007","author":[{"given":"Gregor","family":"Leander","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"M. Matsui","year":"1994","unstructured":"Matsui, M.: Linear cryptanalysis method for DES cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 386\u2013397. Springer, Heidelberg (1994)"},{"key":"18_CR2","unstructured":"Murphy, S.: The Effectiveness of the Linear Hull Effect. Technical Report, RHUL-MA-2009-19 (2009)"},{"key":"18_CR3","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1016\/S0021-9800(70)80032-1","volume":"8","author":"D. Knuth","year":"1970","unstructured":"Knuth, D.: Notes on central groupoids. J. Combin. Theory\u00a08, 376\u2013390 (1970)","journal-title":"J. Combin. Theory"},{"key":"18_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/978-3-642-03317-9_13","volume-title":"Fast Software Encryption","author":"M. Hermelin","year":"2009","unstructured":"Hermelin, M., Cho, J.Y., Nyberg, K.: Multidimensional extension of matsui\u2019s algorithm 2. In: Dunkelman, O. (ed.) FSE 2009. LNCS, vol.\u00a05665, pp. 209\u2013227. Springer, Heidelberg (2009)"},{"key":"18_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/978-3-642-00862-7_13","volume-title":"Topics in Cryptology \u2013 CT-RSA 2009","author":"B. Collard","year":"2009","unstructured":"Collard, B., Standaert, F.X.: A statistical saturation attack against the block cipher present. In: Fischlin, M. (ed.) CT-RSA 2009. LNCS, vol.\u00a05473, pp. 195\u2013210. Springer, Heidelberg (2009)"},{"key":"18_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1007\/978-3-642-11925-5_21","volume-title":"Topics in Cryptology - CT-RSA 2010","author":"J.Y. Cho","year":"2010","unstructured":"Cho, J.Y.: Linear cryptanalysis of reduced-round present. In: Pieprzyk, J. (ed.) CT-RSA 2010. LNCS, vol.\u00a05985, pp. 302\u2013317. Springer, Heidelberg (2010)"},{"key":"18_CR7","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The Design of Rijndael: AES - The Advanced Encryption Standard","author":"J. Daemen","year":"2002","unstructured":"Daemen, J., Rijmen, V.: The Design of Rijndael: AES - The Advanced Encryption Standard. Springer, Heidelberg (2002)"},{"key":"18_CR8","unstructured":"Carlet, C.: Vectorial (multi-output) Boolean Functions for Cryptography. Cambridge University Press, Cambridge (to appear)"},{"key":"18_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1007\/BFb0053460","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"K. Nyberg","year":"1995","unstructured":"Nyberg, K.: Linear approximation of block ciphers. In: Santis, A.D. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 439\u2013444. Springer, Heidelberg (1995)"},{"key":"18_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/978-3-642-05445-7_16","volume-title":"Selected Areas in Cryptography","author":"K. Ohkuma","year":"2009","unstructured":"Ohkuma, K.: Weak keys of reduced-round present for linear cryptanalysis. In: Jacobson Jr., M.J., Rijmen, V., Safavi-Naini, R. (eds.) SAC 2009. LNCS, vol.\u00a05867, pp. 249\u2013265. Springer, Heidelberg (2009)"},{"key":"18_CR11","first-page":"383","volume-title":"DSD","author":"H. Cheng","year":"2008","unstructured":"Cheng, H., Heys, H.M., Wang, C.: Puffin: A novel compact block cipher targeted to embedded digital systems. In: Fanucci, L. (ed.) DSD, pp. 383\u2013390. IEEE, Los Alamitos (2008)"},{"key":"18_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1007\/978-3-540-74735-2_31","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"A. Bogdanov","year":"2007","unstructured":"Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y., Vikkelsoe, C.: Present: An ultra-lightweight block cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol.\u00a04727, pp. 450\u2013466. Springer, Heidelberg (2007)"},{"key":"18_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/978-3-540-73074-3_13","volume-title":"Arithmetic of Finite Fields","author":"G. Leander","year":"2007","unstructured":"Leander, G., Poschmann, A.: On the classification of 4 bit s-boxes. In: Carlet, C., Sunar, B. (eds.) WAIFI 2007. LNCS, vol.\u00a04547, pp. 159\u2013176. Springer, Heidelberg (2007)"},{"key":"18_CR14","doi-asserted-by":"crossref","unstructured":"K\u00fcndgen, A., Leander, G., Thomassen, C.: Switchings, extensions, and reductions in central digraphs (2010) (preprint)","DOI":"10.1016\/j.jcta.2011.03.009"},{"issue":"4","key":"18_CR15","doi-asserted-by":"publisher","first-page":"1494","DOI":"10.1109\/18.923730","volume":"47","author":"A. Canteaut","year":"2001","unstructured":"Canteaut, A., Carlet, C., Charpin, P., Fontaine, C.: On cryptographic properties of the cosets of r(1, m). IEEE Transactions on Information Theory\u00a047(4), 1494\u20131513 (2001)","journal-title":"IEEE Transactions on Information Theory"},{"key":"18_CR16","unstructured":"Carlet, C.: Boolean Functions for Cryptography and Error Correcting Codes (to appear)"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 EUROCRYPT 2011"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-20465-4_18.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:58:17Z","timestamp":1606186697000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-20465-4_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642204647","9783642204654"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-20465-4_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}