{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T15:57:53Z","timestamp":1772467073045,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642340468","type":"print"},{"value":"9783642340475","type":"electronic"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34047-5_22","type":"book-chapter","created":{"date-parts":[[2012,9,10]],"date-time":"2012-09-10T10:56:19Z","timestamp":1347274579000},"page":"385-401","source":"Crossref","is-referenced-by-count":42,"title":["Recursive Diffusion Layers for Block Ciphers and Hash Functions"],"prefix":"10.1007","author":[{"given":"Mahdi","family":"Sajadieh","sequence":"first","affiliation":[]},{"given":"Mohammad","family":"Dakhilalian","sequence":"additional","affiliation":[]},{"given":"Hamid","family":"Mala","sequence":"additional","affiliation":[]},{"given":"Pouyan","family":"Sepehrdad","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","unstructured":"Bernstein, D.J.: The Salsa20 Stream Cipher. Symmetric Key Encryption Workshop, SKEW (2005), \n                    \n                      http:\/\/www.ecrypt.eu.org\/stream\/salsa20p2.html"},{"key":"22_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1007\/3-540-38424-3_1","volume-title":"Advances in Cryptology - CRYPTO \u201990","author":"E. Biham","year":"1991","unstructured":"Biham, E., Shamir, A.: Differential Cryptanalysis of DES-like Cryptosystems. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol.\u00a0537, pp. 2\u201321. Springer, Heidelberg (1991)"},{"key":"22_CR3","unstructured":"Daemen, J.: Cipher and Hash Function Design Strategies Based on Linear and Differential Cryptanalysis. PhD thesis, Elektrotechniek Katholieke Universiteit Leuven, Belgium (1995)"},{"key":"22_CR4","doi-asserted-by":"crossref","unstructured":"Daemen, J., Rijmen, V.: The Design of Rijndael: AES - The Advanced Encryption Standard. Springer (2002)","DOI":"10.1007\/978-3-662-04722-4"},{"key":"22_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1007\/978-3-642-22792-9_13","volume-title":"Advances in Cryptology \u2013 CRYPTO 2011","author":"J. Guo","year":"2011","unstructured":"Guo, J., Peyrin, T., Poschmann, A.: The PHOTON Family of Lightweight Hash Functions. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol.\u00a06841, pp. 222\u2013239. Springer, Heidelberg (2011)"},{"key":"22_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1007\/978-3-642-23951-9_22","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2011","author":"J. Guo","year":"2011","unstructured":"Guo, J., Peyrin, T., Poschmann, A., Robshaw, M.: The LED Block Cipher. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol.\u00a06917, pp. 326\u2013341. Springer, Heidelberg (2011)"},{"key":"22_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/978-3-540-30564-4_6","volume-title":"Selected Areas in Cryptography","author":"P. Junod","year":"2004","unstructured":"Junod, P., Vaudenay, S.: Perfect Diffusion Primitives for Block Ciphers. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol.\u00a03357, pp. 84\u201399. Springer, Heidelberg (2004)"},{"issue":"4","key":"22_CR8","doi-asserted-by":"publisher","first-page":"158","DOI":"10.4218\/etrij.01.0101.0402","volume":"23","author":"J. Kang","year":"2001","unstructured":"Kang, J., Hong, S., Lee, S., Yi, O., Park, C., Lim, J.: Practical and Provable Security Against Differential and Linear Cryptanalysis for Substitution-Permutation Networks. ETRI Journal\u00a023(4), 158\u2013167 (2001)","journal-title":"ETRI Journal"},{"key":"22_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"446","DOI":"10.1007\/11751595_48","volume-title":"Computational Science and Its Applications - ICCSA 2006","author":"C. Lee","year":"2006","unstructured":"Lee, C., Kim, J., Sung, J., Hong, S., Lee, S.: Provable Security for an RC6-like Structure and a MISTY-FO-like Structure Against Differential Cryptanalysis. In: Gavrilova, M.L., Gervasi, O., Kumar, V., Tan, C.J.K., Taniar, D., Lagan\u00e1, A., Mun, Y., Choo, H. (eds.) ICCSA 2006. LNCS, vol.\u00a03982, pp. 446\u2013455. Springer, Heidelberg (2006)"},{"key":"22_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"M. Matsui","year":"1994","unstructured":"Matsui, M.: Linear Cryptanalysis Method for DES Cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 386\u2013397. Springer, Heidelberg (1994)"},{"key":"22_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/3-540-60865-6_54","volume-title":"Fast Software Encryption","author":"M. Matsui","year":"1996","unstructured":"Matsui, M.: New Structure of Block Ciphers with Provable Security Against Differential and Linear Cryptanalysis. In: Gollmann, D. (ed.) FSE 1996. LNCS, vol.\u00a01039, pp. 205\u2013218. Springer, Heidelberg (1996)"},{"issue":"1","key":"22_CR12","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/BF00204800","volume":"8","author":"K. Nyberg","year":"1995","unstructured":"Nyberg, K., Knudsen, L.: Provable Security Against a Differential Attack. Journal of Cryptology\u00a08(1), 27\u201337 (1995)","journal-title":"Journal of Cryptology"},{"key":"22_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1007\/3-540-44983-3_6","volume-title":"Selected Areas in Cryptography","author":"K. Ohkuma","year":"2001","unstructured":"Ohkuma, K., Muratani, H., Sano, F., Kawamura, S.: The Block Cipher Hierocrypt. In: Stinson, D.R., Tavares, S. (eds.) SAC 2000. LNCS, vol.\u00a02012, pp. 72\u201388. Springer, Heidelberg (2001)"},{"issue":"1","key":"22_CR14","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1049\/iet-ifs.2010.0289","volume":"5","author":"M. Sajadieh","year":"2011","unstructured":"Sajadieh, M., Dakhilalian, M., Mala, H.: Perfect Involutory Diffusion Layers Based on Invertibility of Some Linear Functions. IET Information Security Journal\u00a05(1), 228\u2013236 (2011)","journal-title":"IET Information Security Journal"},{"key":"22_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/BFb0053423","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"C.-P. Schnorr","year":"1995","unstructured":"Schnorr, C.-P., Vaudenay, S.: Black Box Cryptanalysis of Hash Networks Based on Multipermutations. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 47\u201357. Springer, Heidelberg (1995)"},{"key":"22_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1007\/3-540-60590-8_22","volume-title":"Fast Software Encryption","author":"S. Vaudenay","year":"1995","unstructured":"Vaudenay, S.: On the Need for Multipermutations: Cryptanalysis of MD4 and SAFER. In: Preneel, B. (ed.) FSE 1994. LNCS, vol.\u00a01008, pp. 286\u2013297. Springer, Heidelberg (1995)"},{"key":"22_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/978-3-642-05445-7_15","volume-title":"Selected Areas in Cryptography","author":"M. Wang","year":"2009","unstructured":"Wang, M., Nakahara Jr., J., Sun, Y.: Cryptanalysis of the Full MMB Block Cipher. In: Jacobson Jr., M.J., Rijmen, V., Safavi-Naini, R. (eds.) SAC 2009. LNCS, vol.\u00a05867, pp. 231\u2013248. Springer, Heidelberg (2009)"},{"key":"22_CR18","unstructured":"Wu, H.: The Hash Function JH. Submission to NIST (2008)"}],"container-title":["Lecture Notes in Computer Science","Fast Software Encryption"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34047-5_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,7]],"date-time":"2019-05-07T10:00:01Z","timestamp":1557223201000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34047-5_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642340468","9783642340475"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34047-5_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}