{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T18:43:09Z","timestamp":1772044989188,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642340468","type":"print"},{"value":"9783642340475","type":"electronic"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34047-5_25","type":"book-chapter","created":{"date-parts":[[2012,9,10]],"date-time":"2012-09-10T06:56:19Z","timestamp":1347260179000},"page":"442-461","source":"Crossref","is-referenced-by-count":58,"title":["New Attacks on Keccak-224 and Keccak-256"],"prefix":"10.1007","author":[{"given":"Itai","family":"Dinur","sequence":"first","affiliation":[]},{"given":"Orr","family":"Dunkelman","sequence":"additional","affiliation":[]},{"given":"Adi","family":"Shamir","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"25_CR1","unstructured":"Aumasson, J.-P., Meier, W.: Zero-sum distinguishers for reduced Keccak-f and for the core functions of Luffa and Hamsi. NIST Mailing List (2009)"},{"key":"25_CR2","unstructured":"Bernstein, D.J.: Second preimages for 6 (7 (8??)) rounds of keccak? NIST mailing list (2010)"},{"key":"25_CR3","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Sponge functions. Presented at the ECRYPT Hash Workshop (2007)"},{"key":"25_CR4","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: The Keccak SHA-3 submission. Submission to NIST (Round 3) (2011)"},{"key":"25_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-19574-7_1","volume-title":"Selected Areas in Cryptography","author":"C. Boura","year":"2011","unstructured":"Boura, C., Canteaut, A.: Zero-Sum Distinguishers for Iterated Permutations and Application to Keccak-f and Hamsi-256. In: Biryukov, A., Gong, G., Stinson, D.R. (eds.) SAC 2010. LNCS, vol.\u00a06544, pp. 1\u201317. Springer, Heidelberg (2011)"},{"key":"25_CR6","unstructured":"Boura, C., Canteaut, A., Canni\u00e9re, C.D.: Higher-order differential properties of keccak and luffa. Cryptology ePrint Archive, Report 2010\/589 (2010), \n                    \n                      http:\/\/eprint.iacr.org\/"},{"issue":"1","key":"25_CR7","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1049\/iet-ifs:20060099","volume":"1","author":"J. Daemen","year":"2007","unstructured":"Daemen, J., Rijemn, V.: Plateau Characteristics. IET Information Security\u00a01(1), 11\u201317 (2007)","journal-title":"IET Information Security"},{"key":"25_CR8","doi-asserted-by":"crossref","unstructured":"Dinur, I., Dunkelman, O., Shamir, A.: New attacks on Keccak-224 and Keccak-256. Cryptology ePrint Archive, Report 2011\/624 (2011), \n                    \n                      http:\/\/eprint.iacr.org\/","DOI":"10.1007\/978-3-642-34047-5_25"},{"key":"25_CR9","unstructured":"Duan, M., Lai, X.: Improved zero-sum distinguisher for full round Keccak-f permutation. Cryptology ePrint Archive, Report 2011\/023 (2011)"},{"key":"25_CR10","doi-asserted-by":"crossref","unstructured":"Duc, A., Guo, J., Peyrin, T., Wei, L.: Unaligned rebound attack - application to keccak. Cryptology ePrint Archive, Report 2011\/420 (2011)","DOI":"10.1007\/978-3-642-34047-5_23"},{"key":"25_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1007\/978-3-642-05445-7_7","volume-title":"Selected Areas in Cryptography","author":"D. Khovratovich","year":"2009","unstructured":"Khovratovich, D.: Cryptanalysis of Hash Functions with Structures. In: Jacobson Jr., M.J., Rijmen, V., Safavi-Naini, R. (eds.) SAC 2009. LNCS, vol.\u00a05867, pp. 108\u2013125. Springer, Heidelberg (2009)"},{"key":"25_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1007\/978-3-642-00862-7_11","volume-title":"Topics in Cryptology \u2013 CT-RSA 2009","author":"D. Khovratovich","year":"2009","unstructured":"Khovratovich, D., Biryukov, A., Nikolic, I.: Speeding up Collision Search for Byte-Oriented Hash Functions. In: Fischlin, M. (ed.) CT-RSA 2009. LNCS, vol.\u00a05473, pp. 164\u2013181. Springer, Heidelberg (2009)"},{"key":"25_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1007\/978-3-642-03317-9_16","volume-title":"Fast Software Encryption","author":"F. Mendel","year":"2009","unstructured":"Mendel, F., Rechberger, C., Schl\u00e4ffer, M., Thomsen, S.S.: The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Gr\u00f8stl. In: Dunkelman, O. (ed.) FSE 2009. LNCS, vol.\u00a05665, pp. 260\u2013276. Springer, Heidelberg (2009)"},{"key":"25_CR14","unstructured":"Morawiecki, P., Srebrny, M.: A SAT-based preimage analysis of reduced KECCAK hash functions. Cryptology ePrint Archive, Report 2010\/285 (2010)"},{"key":"25_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1007\/978-3-642-25578-6_18","volume-title":"Progress in Cryptology \u2013 INDOCRYPT 2011","author":"M. Naya-Plasencia","year":"2011","unstructured":"Naya-Plasencia, M., R\u00f6ck, A., Meier, W.: Practical Analysis of Reduced-Round Keccak. In: Bernstein, D.J., Chatterjee, S. (eds.) INDOCRYPT 2011. LNCS, vol.\u00a07107, pp. 236\u2013254. Springer, Heidelberg (2011)"}],"container-title":["Lecture Notes in Computer Science","Fast Software Encryption"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34047-5_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,7]],"date-time":"2019-05-07T04:59:10Z","timestamp":1557205150000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34047-5_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642340468","9783642340475"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34047-5_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}