{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T05:00:03Z","timestamp":1743138003742,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642312830"},{"type":"electronic","value":"9783642312847"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31284-7_16","type":"book-chapter","created":{"date-parts":[[2012,6,13]],"date-time":"2012-06-13T06:15:58Z","timestamp":1339568158000},"page":"257-274","source":"Crossref","is-referenced-by-count":0,"title":["Cryptanalysis of 256-Bit Key HyRAL via Equivalent Keys"],"prefix":"10.1007","author":[{"given":"Yuki","family":"Asano","sequence":"first","affiliation":[]},{"given":"Shingo","family":"Yanagihara","sequence":"additional","affiliation":[]},{"given":"Tetsu","family":"Iwata","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1007\/3-540-48910-X_2","volume-title":"Advances in Cryptology - EUROCRYPT \u201999","author":"E. Biham","year":"1999","unstructured":"Biham, E., Biryukov, A., Shamir, A.: Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol.\u00a01592, pp. 12\u201323. Springer, Heidelberg (1999)"},{"issue":"1","key":"16_CR2","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E. Biham","year":"1991","unstructured":"Biham, E., Shamir, A.: Differential Cryptanalysis of DES-like Cryptosystems. J. Cryptology\u00a04(1), 3\u201372 (1991)","journal-title":"J. Cryptology"},{"key":"16_CR3","unstructured":"Cryptography Research and Evaluation\u00a0Committees (CRYPTREC), \n                    \n                      http:\/\/www.cryptrec.go.jp\/english\/index.html"},{"key":"16_CR4","unstructured":"Cryptography Research and Evaluation\u00a0Committees (CRYPTREC): CRYPTREC Report, Report of the Scheme Committee (2010) (in Japanese), \n                    \n                      http:\/\/www.cryptrec.go.jp\/english\/report.html"},{"key":"16_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/BFb0052343","volume-title":"Fast Software Encryption","author":"J. Daemen","year":"1997","unstructured":"Daemen, J., Knudsen, L.R., Rijmen, V.: The Block Cipher SQUARE. In: Biham, E. (ed.) FSE 1997. LNCS, vol.\u00a01267, pp. 149\u2013165. Springer, Heidelberg (1997)"},{"key":"16_CR6","unstructured":"Hirata, K.: Submission Documents of HyRAL to the CRYPTREC Project (2010), \n                    \n                      http:\/\/www.cryptrec.go.jp\/english\/topics\/cryptrec_20101001_callforattack.html"},{"key":"16_CR7","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1109\/IPTC.2010.179","volume-title":"Proceedings of the 2010 International Symposium on Intelligence Information Processing and Trusted Computing, IPTC 2010","author":"K. Hirata","year":"2010","unstructured":"Hirata, K.: The 128bit Block Cipher HyRAL (Hybrid Randomization Algorithm): Common Key Block Cipher. In: Proceedings of the 2010 International Symposium on Intelligence Information Processing and Trusted Computing, IPTC 2010, pp. 9\u201314. IEEE Computer Society, Washington, DC (2010), \n                    \n                      http:\/\/dx.doi.org\/10.1109\/IPTC.2010.179"},{"key":"16_CR8","unstructured":"Hirata, K.: The 128bit Blockcipher HyRAL. In: The 2010 Symposium on Cryptography and Information Security, 1D1-1, SCIS 2010 (2010) (in Japanese)"},{"key":"16_CR9","unstructured":"Igarashi, Y., Takagi, Y., Kaneko, T.: Security Evaluation of HyRAL against Linear Cryptanalysis. In: The 2010 Symposium on Cryptography and Information Security, 1D1-3, SCIS 2010 (2010) (in Japanese)"},{"issue":"142","key":"16_CR10","first-page":"1","volume":"111","author":"T. Inoue","year":"2011","unstructured":"Inoue, T., Kaneko, T.: Security Evaluation of HyRAL against Boomerang Attack. IEICE Tech.\u00a0Rep.\u00a0111(142), 1\u20136 (2011) (in Japanese); IT 2011-07-14","journal-title":"IEICE Tech.\u00a0Rep."},{"key":"16_CR11","unstructured":"Iwata, T.: Security Evaluation Report of HyRAL. In: Technical Report of CRYPTREC, Investigation Reports Related to Cryptographic Techniques in FY 2010 (2011) (in Japanese)"},{"key":"16_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1007\/3-540-57332-1_2","volume-title":"Advances in Cryptology - ASIACRYPT \u201991","author":"L.R. Knudsen","year":"1993","unstructured":"Knudsen, L.R.: Cryptanalysis of LOKI. In: Matsumoto, T., Imai, H., Rivest, R.L. (eds.) ASIACRYPT 1991. LNCS, vol.\u00a0739, pp. 22\u201335. Springer, Heidelberg (1993)"},{"key":"16_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1007\/3-540-60590-8_16","volume-title":"Fast Software Encryption","author":"L.R. Knudsen","year":"1995","unstructured":"Knudsen, L.R.: Truncated and Higher Order Differentials. In: Preneel, B. (ed.) FSE 1994. LNCS, vol.\u00a01008, pp. 196\u2013211. Springer, Heidelberg (1995)"},{"key":"16_CR14","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1007\/978-1-4615-2694-0_23","volume-title":"Communications and Cryptography: Two Sides of One Tapestry","author":"X. Lai","year":"1994","unstructured":"Lai, X.: Higher Order Derivatives and Differential Cryptanalysis. In: Blahut, R.E., Massey, J.L. (eds.) Communications and Cryptography: Two Sides of One Tapestry, pp. 227\u2013233. Kluwer Academic Publishers, Norwell (1994)"},{"key":"16_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"M. Matsui","year":"1994","unstructured":"Matsui, M.: Linear Cryptanalysis Method for DES Cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 386\u2013397. Springer, Heidelberg (1994)"},{"key":"16_CR16","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Advances in Cryptology - CRYPTO \u201994","author":"M. Matsui","year":"1994","unstructured":"Matsui, M.: The First Experimental Cryptanalysis of the Data Encryption Standard. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol.\u00a0839, pp. 1\u201311. Springer, Heidelberg (1994)"},{"key":"16_CR17","unstructured":"Shibayama, N., Igarashi, Y., Kaneko, T., Hangai, S.: Impossible Differential Attack on HyRAL. In: Forum on Information Technology, L-022 (2010) (in Japanese)"},{"key":"16_CR18","unstructured":"Shibayama, N., Igarashi, Y., Kaneko, T., Hangai, S.: On Impossible Differential of HyRAL Using MDS Characteristic. In: The 2010 IEICE Engineering Sciences Society Conference, A-7-8 (2010) (in Japanese)"},{"key":"16_CR19","unstructured":"Shibayama, N., Igarashi, Y., Kaneko, T., Hangai, S.: Security Evaluation of HyRAL against Saturation Cryptanalysis. In: The 33rd Symposium on Information Theory and its Applications, SITA 2010, 10.1 (2010) (in Japanese)"},{"key":"16_CR20","unstructured":"Shibayama, N., Igarashi, Y., Kaneko, T., Hangai, S.: Higher Order Differential Attack on HyRAL. IEICE Tech.\u00a0Rep. 110(443), 341\u2013347 (2011) (in Japanese); ISEC 2010-123"},{"key":"16_CR21","unstructured":"Shibayama, N., Igarashi, Y., Kaneko, T., Hangai, S.: Security Evaluation of HyRAL against Saturation Cryptanalysis (II). IEICE Tech.\u00a0Rep. 111(123),\u00a0103\u2013109 (2011) (in Japanese); ISEC 2011-19"},{"key":"16_CR22","unstructured":"Shibayama, N., Kaneko, T., Hangai, S.: New Saturation Characteristics of HyRAL. IEICE Tech.\u00a0Rep. 111(455),\u00a053\u201360 (2012) (in Japanese); ISEC 2011-81"},{"key":"16_CR23","unstructured":"Taga, B., Tanaka, H.: Higher Order Differential Characteristics of HyRAL. In: The 2011 Symposium on Cryptography and Information Security, 2B2-2, SCIS 2011 (2011) (in Japanese)"},{"key":"16_CR24","unstructured":"Takagi, Y., Igarashi, Y., Kaneko, T.: Security Evaluation of HyRAL against Differential Attack. In: The 2010 Symposium on Cryptography and Information Security, 1D1-2, SCIS 2010 (2010) (in Japanese)"},{"key":"16_CR25","unstructured":"Yamaguchi, Y., Shibayama, N., Kaneko, T.: Higher Order Differential Property of HyRAL (II). In: The 2012 Symposium on Cryptography and Information Security, 1C3-4, SCIS 2012 (2012) (in Japanese)"},{"key":"16_CR26","unstructured":"Yamaguchi, Y., Igarashi, Y., Kaneko, T.: Higher Order Differential Property of HyRAL. In: The 63rd Joint Conference of Electrical and Electronics Engineers in Kyushu, 02-1A-06 (2010) (in Japanese)"},{"key":"16_CR27","unstructured":"Youm, H.Y., Song, J.H., Lee, S.Y.: Security Analysis of HyRAL. In: Technical Report of CRYPTREC, Investigation Reports Related to Cryptographic Techniques in FY 2010 (2011)"}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31284-7_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T20:43:40Z","timestamp":1558298620000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31284-7_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642312830","9783642312847"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31284-7_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}