{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T23:35:21Z","timestamp":1769297721624,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642340468","type":"print"},{"value":"9783642340475","type":"electronic"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34047-5_24","type":"book-chapter","created":{"date-parts":[[2012,9,10]],"date-time":"2012-09-10T10:56:19Z","timestamp":1347274579000},"page":"422-441","source":"Crossref","is-referenced-by-count":25,"title":["Differential Propagation Analysis of Keccak"],"prefix":"10.1007","author":[{"given":"Joan","family":"Daemen","sequence":"first","affiliation":[]},{"given":"Gilles","family":"Van Assche","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"24_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/978-3-540-78967-3_11","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2008","author":"G. Bertoni","year":"2008","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: On the Indifferentiability of the Sponge Construction. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol.\u00a04965, pp. 181\u2013197. Springer, Heidelberg (2008), \n                    \n                      http:\/\/sponge.noekeon.org\/"},{"key":"24_CR2","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Cryptographic sponge functions (January 2011), \n                    \n                      http:\/\/sponge.noekeon.org\/"},{"key":"24_CR3","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: On alignment in Keccak. In: ECRYPT II Hash Workshop 2011 (2011)"},{"key":"24_CR4","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: The Keccak reference (January 2011), \n                    \n                      http:\/\/keccak.noekeon.org\/"},{"key":"24_CR5","doi-asserted-by":"crossref","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: KeccakTools software (April 2012), \n                    \n                      http:\/\/keccak.noekeon.org\/","DOI":"10.1007\/978-3-642-38348-9_19"},{"key":"24_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1007\/3-540-38424-3_1","volume-title":"Advances in Cryptology - CRYPTO \u201990","author":"E. Biham","year":"1991","unstructured":"Biham, E., Shamir, A.: Differential Cryptanalysis of DES-like Cryptosystems. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol.\u00a0537, pp. 2\u201321. Springer, Heidelberg (1991)"},{"key":"24_CR7","doi-asserted-by":"crossref","unstructured":"Daemen, J., Van Assche, G.: Differential propagation analysis of Keccak. Cryptology ePrint Archive, Report 2012\/163 (2012), \n                    \n                      http:\/\/eprint.iacr.org\/","DOI":"10.1007\/978-3-642-34047-5_24"},{"key":"24_CR8","doi-asserted-by":"crossref","unstructured":"Daemen, J., Peeters, M., Van Assche, G., Rijmen, V.: Nessie proposal: the block cipher Noekeon, Nessie submission (2000), \n                    \n                      http:\/\/gro.noekeon.org\/","DOI":"10.1007\/10721064_22"},{"key":"24_CR9","doi-asserted-by":"crossref","unstructured":"Daemen, J., Rijmen, V.: The design of Rijndael \u2014 AES, the advanced encryption standard. Springer (2002)","DOI":"10.1007\/978-3-662-04722-4"},{"issue":"1","key":"24_CR10","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1049\/iet-ifs:20060099","volume":"1","author":"J. Daemen","year":"2007","unstructured":"Daemen, J., Rijmen, V.: Plateau characteristics and AES. IET Information Security\u00a01(1), 11\u201317 (2007)","journal-title":"IET Information Security"},{"key":"24_CR11","series-title":"LNCS","first-page":"447","volume-title":"FSE 2012","author":"I. Dinur","year":"2012","unstructured":"Dinur, I., Dunkelman, O., Shamir, A.: New Attacks on Keccak-224 and Keccak-256. In: Canteaut, A. (ed.) FSE 2012. LNCS, vol.\u00a07549, pp. 447\u2013463. Springer, Heidelberg (2012)"},{"key":"24_CR12","series-title":"LNCS","first-page":"407","volume-title":"FSE 2012","author":"A. Duc","year":"2012","unstructured":"Duc, A., Guo, J., Peyrin, T., Wei, L.: Unaligned rebound attack: Application to Keccak. In: Canteaut, A. (ed.) FSE 2012. LNCS, vol.\u00a07549, pp. 407\u2013426. Springer, Heidelberg (2012)"},{"key":"24_CR13","unstructured":"Gauravaram, P., Knudsen, L.R., Matusiewicz, K., Mendel, F., Rechberger, C., Schl\u00e4ffer, M., Thomsen, S.S.: Gr\u00f8stl \u2013 a SHA-3 candidate. Submission to NIST (round 3) (2011)"},{"key":"24_CR14","unstructured":"Heilman, E.: Restoring the differential security of MD6. In: ECRYPT II Hash Workshop 2011 (2011)"},{"key":"24_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1007\/978-3-642-25578-6_18","volume-title":"Progress in Cryptology \u2013 INDOCRYPT 2011","author":"M. Naya-Plasencia","year":"2011","unstructured":"Naya-Plasencia, M., R\u00f6ck, A., Meier, W.: Practical Analysis of Reduced-Round Keccak. In: Bernstein, D.J., Chatterjee, S. (eds.) INDOCRYPT 2011. LNCS, vol.\u00a07107, pp. 236\u2013254. Springer, Heidelberg (2011)"},{"key":"24_CR16","unstructured":"NIST, Announcing request for candidate algorithm nominations for a new cryptographic hash algorithm (SHA-3) family. Federal Register Notices 72(212), 62212\u201362220 (2007), \n                    \n                      http:\/\/csrc.nist.gov\/groups\/ST\/hash\/index.html"},{"key":"24_CR17","unstructured":"Rivest, R., Agre, B., Bailey, D.V., Cheng, S., Crutchfield, C., Dodis, Y., Fleming, K.E., Khan, A., Krishnamurthy, J., Lin, Y., Reyzin, L., Shen, E., Sukha, J., Sutherland, D., Tromer, E., Yin, Y.L.: The MD6 hash function \u2013 a proposal to NIST for SHA-3. Submission to NIST (2008), \n                    \n                      http:\/\/groups.csail.mit.edu\/cis\/md6\/"},{"key":"24_CR18","unstructured":"Wu, H.: The hash function JH. Submission to NIST (round 3) (2011)"}],"container-title":["Lecture Notes in Computer Science","Fast Software Encryption"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34047-5_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,7]],"date-time":"2019-05-07T09:57:33Z","timestamp":1557223053000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34047-5_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642340468","9783642340475"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34047-5_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}