{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,27]],"date-time":"2025-07-27T07:14:13Z","timestamp":1753600453228},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642279003"},{"type":"electronic","value":"9783642279010"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-27901-0_8","type":"book-chapter","created":{"date-parts":[[2012,1,16]],"date-time":"2012-01-16T21:01:25Z","timestamp":1326747685000},"page":"90-101","source":"Crossref","is-referenced-by-count":1,"title":["A Related-Key Attack on Block Ciphers with Weak Recurrent Key Schedules"],"prefix":"10.1007","author":[{"given":"Marina","family":"Pudovkina","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","unstructured":"Swenson, C.: Modern Cryptanalysis. Techniques for Advanced Code Breaking. Wiley Publishing (2008)"},{"key":"8_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1007\/978-3-540-30108-0_20","volume-title":"Computer Security \u2013 ESORICS 2004","author":"L.R. Knudsen","year":"2004","unstructured":"Knudsen, L.R., Mathiassen, J.E.: On the Role of Key Schedules in Attacks on Iterated Ciphers. In: Samarati, P., Ryan, P.Y.A., Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol.\u00a03193, pp. 322\u2013334. Springer, Heidelberg (2004)"},{"key":"8_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1007\/3-540-48285-7_34","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"E. Biham","year":"1994","unstructured":"Biham, E.: New Types of Cryptanalytic Attacks Using Related Keys. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 398\u2013409. Springer, Heidelberg (1994)"},{"key":"8_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1007\/3-540-57220-1_62","volume-title":"Advances in Cryptology - AUSCRYPT \u201992","author":"L.R. Knudsen","year":"1993","unstructured":"Knudsen, L.R.: Cryptanalysis of LOKI91. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol.\u00a0718, pp. 196\u2013208. Springer, Heidelberg (1993)"},{"key":"8_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1007\/978-3-642-13190-5_15","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2010","author":"A. Biryukov","year":"2010","unstructured":"Biryukov, A., Dunkelman, O., Keller, N., Khovratovich, D., Shamir, A.: Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol.\u00a06110, pp. 299\u2013319. Springer, Heidelberg (2010)"},{"key":"8_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1007\/978-3-642-14623-7_21","volume-title":"Advances in Cryptology \u2013 CRYPTO 2010","author":"O. Dunkelman","year":"2010","unstructured":"Dunkelman, O., Keller, N., Shamir, A.: A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol.\u00a06223, pp. 393\u2013410. Springer, Heidelberg (2010)"},{"issue":"1","key":"8_CR7","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1587\/transfun.E94.A.3","volume":"94","author":"B. Koo","year":"2011","unstructured":"Koo, B., Yeom, Y., Song, J.: Related-Key Boomerang Attack on Block Cipher SQUARE. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences\u00a094(1), 3\u20139 (2011)","journal-title":"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"},{"key":"8_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1007\/978-3-540-77360-3_14","volume-title":"Selected Areas in Cryptography","author":"G. Wang","year":"2007","unstructured":"Wang, G., Keller, N., Dunkelman, O.: The Delicate Issues of Addition with Respect to XOR Differences. In: Adams, C., Miri, A., Wiener, M. (eds.) SAC 2007. LNCS, vol.\u00a04876, pp. 212\u2013231. Springer, Heidelberg (2007)"},{"key":"8_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1007\/978-3-642-00843-6_27","volume-title":"Information Security Practice and Experience","author":"E. Fleischmann","year":"2009","unstructured":"Fleischmann, E., Gorski, M., Lucks, S.: Memoryless Related-Key Boomerang Attack on 39-Round SHACAL-2. In: Bao, F., Li, H., Wang, G. (eds.) ISPEC 2009. LNCS, vol.\u00a05451, pp. 310\u2013323. Springer, Heidelberg (2009)"},{"key":"8_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1007\/3-540-68697-5_19","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"J. Kelsey","year":"1996","unstructured":"Kelsey, J., Schneier, B., Wagner, D.: Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 237\u2013251. Springer, Heidelberg (1996)"},{"key":"8_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/BFb0028479","volume-title":"Information and Communications Security","author":"J. Kelsey","year":"1997","unstructured":"Kelsey, J., Schneier, B., Wagner, D.: Related-Key Cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol.\u00a01334, pp. 233\u2013246. Springer, Heidelberg (1997)"},{"key":"8_CR12","unstructured":"Ciet, M., Piret, G., Quisquater, J.-J.: Related-Key and Slide Attacks: Analysis, Connections, and Improvements (1999), \n                    \n                      http:\/\/www.dice.ucl.ac.be\/crypto"},{"key":"8_CR13","unstructured":"Ciet, M., Piret, G., Quisquater, J.-J.: A Survey of Key Schedule Cryptanalysis. Technical Report CG-2002\/1, Universite catholique de Louvain, Crypto Group (2002), \n                    \n                      http:\/\/www.dice.ucl.ac.be\/crypto\/techreports.html"},{"key":"8_CR14","unstructured":"Courtois, N.T., Bard, G.V.: Algebraic and Slide Attacks on KeeLoq. Cryptology ePrint Archive, Report 2007\/062 (2007)"},{"key":"8_CR15","volume-title":"Applied Cryptography, Protocols, Algorithms, and Source Code in C","author":"B. Schneier","year":"1995","unstructured":"Schneier, B.: Applied Cryptography, Protocols, Algorithms, and Source Code in C, 2nd edn. John WileySons, Inc., New York (1995)","edition":"2"},{"key":"8_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/3-540-48519-8_18","volume-title":"Fast Software Encryption","author":"A. Biryukov","year":"1999","unstructured":"Biryukov, A., Wagner, D.: Slide Attacks. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol.\u00a01636, pp. 245\u2013259. Springer, Heidelberg (1999)"},{"key":"8_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1007\/3-540-44983-3_23","volume-title":"Selected Areas in Cryptography","author":"H. Seki","year":"2001","unstructured":"Seki, H., Kaneko, T.: Differential Cryptanalysis of Reduced Rounds of GOST. In: Stinson, D.R., Tavares, S. (eds.) SAC 2000. LNCS, vol.\u00a02012, pp. 315\u2013323. Springer, Heidelberg (2001)"},{"key":"8_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/978-3-540-74619-5_10","volume-title":"Fast Software Encryption","author":"E. Biham","year":"2007","unstructured":"Biham, E., Dunkelman, O., Keller, N.: Improved Slide Attacks. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol.\u00a04593, pp. 153\u2013166. Springer, Heidelberg (2007)"},{"key":"8_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1007\/978-3-540-89754-5_23","volume-title":"Progress in Cryptology - INDOCRYPT 2008","author":"O. Kara","year":"2008","unstructured":"Kara, O.: Reflection Cryptanalysis of Some Ciphers. In: Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. LNCS, vol.\u00a05365, pp. 294\u2013307. Springer, Heidelberg (2008)"},{"key":"8_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1007\/978-3-540-25937-4_19","volume-title":"Fast Software Encryption","author":"Y. Ko","year":"2004","unstructured":"Ko, Y., Hong, S., Lee, W., Lee, S., Kang, J.-S.: Related Key Differential Attacks on 27 Rounds of Xtea and Full-Round Gost. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol.\u00a03017, pp. 299\u2013316. Springer, Heidelberg (2004)"},{"key":"8_CR21","unstructured":"Rudskoy, V.: On Zero Practical Significance of \u201dKey Recovery Attack on Full GOST Block Cipher with Zero Time and Memory\u201d (2010), \n                    \n                      http:\/\/eprint.iacr.org\/2010"},{"key":"8_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1007\/978-3-642-21702-9_17","volume-title":"Fast Software Encryption","author":"T. Isobe","year":"2011","unstructured":"Isobe, T.: A Single-Key Attack on the Full GOST Block Cipher. In: Joux, A. (ed.) FSE 2011. LNCS, vol.\u00a06733, pp. 290\u2013305. Springer, Heidelberg (2011)"},{"key":"8_CR23","unstructured":"Courtois, N.: Security Evaluation of GOST 28147-89 in view of international standardisation (2011), \n                    \n                      http:\/\/eprint.iacr.org\/2011\/211"},{"key":"8_CR24","unstructured":"Pudovkina, M., Khoruzhenko, G.: Related-key attacks on the full GOST block cipher with 2 or 4 related keys. In: Western European Workshop on Research in Cryptology (2011), \n                    \n                      http:\/\/2011.weworc.org"}],"container-title":["Lecture Notes in Computer Science","Foundations and Practice of Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-27901-0_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,24]],"date-time":"2019-04-24T20:12:22Z","timestamp":1556136742000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-27901-0_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642279003","9783642279010"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-27901-0_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}