{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T18:10:50Z","timestamp":1743012650328,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642252426"},{"type":"electronic","value":"9783642252433"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-25243-3_20","type":"book-chapter","created":{"date-parts":[[2011,11,2]],"date-time":"2011-11-02T06:18:58Z","timestamp":1320214738000},"page":"242-254","source":"Crossref","is-referenced-by-count":4,"title":["Linear Cryptanalysis of ARIA Block Cipher"],"prefix":"10.1007","author":[{"given":"Zhiqiang","family":"Liu","sequence":"first","affiliation":[]},{"given":"Dawu","family":"Gu","sequence":"additional","affiliation":[]},{"given":"Ya","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Juanru","family":"Li","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1007\/978-3-540-24691-6_32","volume-title":"Information Security and Cryptology - ICISC 2003","author":"D. Kwon","year":"2004","unstructured":"Kwon, D., Kim, J., Park, S., Sung, S.H., et al.: New Block Cipher: ARIA. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol.\u00a02971, pp. 432\u2013445. Springer, Heidelberg (2004)"},{"key":"20_CR2","unstructured":"National Security Research Institute, Korea. Specification of ARIA. Version 1.0 (2005)"},{"key":"20_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1007\/3-540-38424-3_1","volume-title":"Advances in Cryptology - CRYPTO \u201990","author":"E. Biham","year":"1991","unstructured":"Biham, E., Shamir, A.: Differential Cryptanalysis of DES-like Cryptosystems. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol.\u00a0537, pp. 2\u201321. Springer, Heidelberg (1991)"},{"key":"20_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"M. Matsui","year":"1994","unstructured":"Matsui, M.: Linear Cryptanalysis Method for DES Cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 386\u2013397. Springer, Heidelberg (1994)"},{"key":"20_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1007\/3-540-60590-8_16","volume-title":"Fast Software Encryption","author":"L.R. Knudsen","year":"1995","unstructured":"Knudsen, L.R.: Truncated and Higher Order Differentials. In: Preneel, B. (ed.) FSE 1994. LNCS, vol.\u00a01008, pp. 196\u2013211. Springer, Heidelberg (1995)"},{"issue":"4","key":"20_CR6","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/s00145-005-0129-3","volume":"18","author":"E. Biham","year":"2005","unstructured":"Biham, E., Biryukov, A., Shamir, A.: Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials. Journal of Cryptology\u00a018(4), 291\u2013311 (2005)","journal-title":"Journal of Cryptology"},{"key":"20_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1007\/3-540-45661-9_9","volume-title":"Fast Software Encryption","author":"L.R. Knudsen","year":"2002","unstructured":"Knudsen, L.R., Wagner, D.: Integral Cryptanalysis. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol.\u00a02365, pp. 112\u2013127. Springer, Heidelberg (2002)"},{"issue":"3","key":"20_CR8","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1007\/s11390-007-9056-0","volume":"22","author":"W. Wu","year":"2007","unstructured":"Wu, W., Zhang, W., Feng, D.: Impossible Differential Cryptanalysis of Reduced-Round ARIA and Camellia. Journal of Computer Science and Technology\u00a022(3), 449\u2013456 (2007)","journal-title":"Journal of Computer Science and Technology"},{"key":"20_CR9","unstructured":"Li, R., Sun, B., Zhang, P., Li, C.: New Impossible Differentials of ARIA. Cryptology ePrint Archive, Report 2008\/227 (2008), \n                    \n                      http:\/\/eprint.iacr.org\/"},{"key":"20_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1007\/978-3-642-17619-7_2","volume-title":"Cryptology and Network Security","author":"C. Du","year":"2010","unstructured":"Du, C., Chen, J.: Impossible Differential Cryptanalysis of ARIA Reduced to 7 Rounds. In: Heng, S.-H., Wright, R.N., Goi, B.-M. (eds.) CANS 2010. LNCS, vol.\u00a06467, pp. 20\u201330. Springer, Heidelberg (2010)"},{"key":"20_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-16342-5_1","volume-title":"Information Security and Cryptology","author":"P. Li","year":"2010","unstructured":"Li, P., Sun, B., Li, C.: Integral Cryptanalysis of ARIA. In: Bao, F., Yung, M., Lin, D., Jing, J. (eds.) Inscrypt 2009. LNCS, vol.\u00a06151, pp. 1\u201314. Springer, Heidelberg (2010)"},{"key":"20_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-642-12827-1_2","volume-title":"Information Security, Practice and Experience","author":"Y. Li","year":"2010","unstructured":"Li, Y., Wu, W., Zhang, L.: Integral Attacks on Reduced-Round ARIA Block Cipher. In: Kwak, J., Deng, R.H., Won, Y., Wang, G. (eds.) ISPEC 2010. LNCS, vol.\u00a06047, pp. 19\u201329. Springer, Heidelberg (2010)"},{"key":"20_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/978-3-642-17401-8_13","volume-title":"Progress in Cryptology - INDOCRYPT 2010","author":"E. Fleischmann","year":"2010","unstructured":"Fleischmann, E., Forler, C., Gorski, M., Lucks, S.: New Boomerang Attacks on ARIA. In: Gong, G., Gupta, K.C. (eds.) INDOCRYPT 2010. LNCS, vol.\u00a06498, pp. 163\u2013175. Springer, Heidelberg (2010)"},{"key":"20_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1007\/3-540-48519-8_12","volume-title":"Fast Software Encryption","author":"D. Wagner","year":"1999","unstructured":"Wagner, D.: The Boomerang Attack. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol.\u00a01636, pp. 156\u2013170. Springer, Heidelberg (1999)"},{"key":"20_CR15","unstructured":"Tang, X., Sun, B., Li, R., Li, C.: A Meet-in-the-middle Attack on ARIA. Cryptology ePrint Archive, Report 2010\/168 (2010), \n                    \n                      http:\/\/eprint.iacr.org\/"},{"key":"20_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/978-3-540-71039-4_7","volume-title":"Fast Software Encryption","author":"H. Demirci","year":"2008","unstructured":"Demirci, H., Sel\u00e7uk, A.A.: A Meet-in-the-Middle Attack on 8-Round AES. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol.\u00a05086, pp. 116\u2013126. Springer, Heidelberg (2008)"},{"issue":"1","key":"20_CR17","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/s00145-007-9013-7","volume":"21","author":"A.A. Sel\u00e7uk","year":"2008","unstructured":"Sel\u00e7uk, A.A.: On Probability of Success in Linear and Differential Cryptanalysis. Journal of Cryptology\u00a021(1), 131\u2013147 (2008)","journal-title":"Journal of Cryptology"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-25243-3_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,25]],"date-time":"2019-08-25T20:19:56Z","timestamp":1566764396000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-25243-3_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642252426","9783642252433"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-25243-3_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}