{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T14:18:33Z","timestamp":1772893113886,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642349607","type":"print"},{"value":"9783642349614","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34961-4_13","type":"book-chapter","created":{"date-parts":[[2012,11,16]],"date-time":"2012-11-16T09:22:26Z","timestamp":1353057746000},"page":"190-207","source":"Crossref","is-referenced-by-count":32,"title":["Differential Analysis of the LED Block Cipher"],"prefix":"10.1007","author":[{"given":"Florian","family":"Mendel","sequence":"first","affiliation":[]},{"given":"Vincent","family":"Rijmen","sequence":"additional","affiliation":[]},{"given":"Deniz","family":"Toz","sequence":"additional","affiliation":[]},{"given":"Kerem","family":"Var\u0131c\u0131","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-15031-9_1","volume-title":"Cryptographic Hardware and Embedded Systems, CHES 2010","author":"J.-P. Aumasson","year":"2010","unstructured":"Aumasson, J.-P., Henzen, L., Meier, W., Naya-Plasencia, M.: Quark: A Lightweight Hash. In: Mangard, S., Standaert, F.-X. (eds.) CHES 2010. LNCS, vol.\u00a06225, pp. 1\u201315. Springer, Heidelberg (2010)"},{"key":"13_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1007\/3-540-38424-3_1","volume-title":"Advances in Cryptology - CRYPTO \u201990","author":"E. Biham","year":"1991","unstructured":"Biham, E., Shamir, A.: Differential Cryptanalysis of DES-like Cryptosystems. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol.\u00a0537, pp. 2\u201321. Springer, Heidelberg (1991)"},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"Bogdanov, A., Knezevic, M., Leander, G., Toz, D., Var\u0131c\u0131, K., Verbauwhede, I.: SPONGENT: A Lightweight Hash Function. In: Preneel, Takagi [22], pp. 312\u2013325","DOI":"10.1007\/978-3-642-23951-9_21"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Bogdanov, A., Knudsen, L.R., Leander, G., Standaert, F.X., Steinberger, J.P., Tischhauser, E.: Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations - (Extended Abstract). In: Pointcheval, Johansson [21], pp. 45\u201362","DOI":"10.1007\/978-3-642-29011-4_5"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Daemen, J.: Limitations of the Even-Mansour Construction. In: Imai, et al. [15], pp. 495\u2013498","DOI":"10.1007\/3-540-57332-1_46"},{"issue":"1-2","key":"13_CR6","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/s00607-009-0034-y","volume":"85","author":"J. Daemen","year":"2009","unstructured":"Daemen, J., Lamberger, M., Pramstaller, N., Rijmen, V., Vercauteren, F.: Computational aspects of the expected differential probability of 4-round AES and AES-like ciphers. Computing\u00a085(1-2), 85\u2013104 (2009)","journal-title":"Computing"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Daemen, J., Rijmen, V.: The Design of Rijndael: AES - The Advanced Encryption Standard. Springer (2002)","DOI":"10.1007\/978-3-662-04722-4"},{"key":"13_CR8","unstructured":"Daemen, J., Rijmen, V.: The Pelican MAC Function. IACR Cryptology ePrint Archive 2005, 88 (2005)"},{"issue":"1","key":"13_CR9","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1049\/iet-ifs:20060099","volume":"1","author":"J. Daemen","year":"2007","unstructured":"Daemen, J., Rijmen, V.: Plateau characteristics. IET Information Security\u00a01(1), 11\u201317 (2007)","journal-title":"IET Information Security"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Dunkelman, O., Keller, N., Shamir, A.: Minimalism in Cryptography: The Even-Mansour Scheme Revisited. In: Pointcheval, Johansson [21], pp. 336\u2013354","DOI":"10.1007\/978-3-642-29011-4_21"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Even, S., Mansour, Y.: A Construction of a Cipher From a Single Pseudorandom Permutation. In: Imai, et al. [15], pp. 210\u2013224","DOI":"10.1007\/3-540-57332-1_17"},{"key":"13_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-25286-0_1","volume-title":"RFID. Security and Privacy","author":"Z. Gong","year":"2012","unstructured":"Gong, Z., Nikova, S., Law, Y.W.: KLEIN: A New Family of Lightweight Block Ciphers. In: Juels, A., Paar, C. (eds.) RFIDSec 2011. LNCS, vol.\u00a07055, pp. 1\u201318. Springer, Heidelberg (2012)"},{"key":"13_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1007\/978-3-642-22792-9_13","volume-title":"Advances in Cryptology \u2013 CRYPTO 2011","author":"J. Guo","year":"2011","unstructured":"Guo, J., Peyrin, T., Poschmann, A.: The PHOTON Family of Lightweight Hash Functions. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol.\u00a06841, pp. 222\u2013239. Springer, Heidelberg (2011)"},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Guo, J., Peyrin, T., Poschmann, A., Robshaw, M.J.B.: The LED Block Cipher. In: Preneel, Takagi [22], pp. 326\u2013341","DOI":"10.1007\/978-3-642-23951-9_22"},{"key":"13_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-57332-1","volume-title":"Advances in Cryptology - ASIACRYPT \u201991","author":"H. Imai","year":"1993","unstructured":"Imai, H., Rivest, R.L., Matsumoto, T.: ASIACRYPT 1991. LNCS, vol.\u00a0739. Springer, Heidelberg (1993)"},{"key":"13_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/978-3-642-31448-3_6","volume-title":"Information Security and Privacy","author":"T. Isobe","year":"2012","unstructured":"Isobe, T., Shibutani, K.: Security Analysis of the Lightweight Block Ciphers XTEA, LED and Piccolo. In: Susilo, W., Mu, Y., Seberry, J. (eds.) ACISP 2012. LNCS, vol.\u00a07372, pp. 71\u201386. Springer, Heidelberg (2012)"},{"key":"13_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1007\/3-540-46416-6_2","volume-title":"Advances in Cryptology - EUROCRYPT \u201991","author":"X. Lai","year":"1991","unstructured":"Lai, X., Massey, J.L., Murphy, S.: Markov Ciphers and Differential Cryptanalysis. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol.\u00a0547, pp. 17\u201338. Springer, Heidelberg (1991)"},{"key":"13_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1007\/978-3-642-03317-9_16","volume-title":"Fast Software Encryption","author":"F. Mendel","year":"2009","unstructured":"Mendel, F., Rechberger, C., Schl\u00e4ffer, M., Thomsen, S.S.: The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Gr\u00f8stl. In: Dunkelman, O. (ed.) FSE 2009. LNCS, vol.\u00a05665, pp. 260\u2013276. Springer, Heidelberg (2009)"},{"key":"13_CR19","doi-asserted-by":"crossref","unstructured":"Mendel, F., Rijmen, V., Toz, D., Var\u0131c\u0131, K.: Differential Analysis of the LED Block Cipher. Cryptology ePrint Archive, Report 2012\/544 (2012), http:\/\/eprint.iacr.org\/","DOI":"10.1007\/978-3-642-34961-4_13"},{"key":"13_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/978-3-540-39887-5_19","volume-title":"Fast Software Encryption","author":"S. Park","year":"2003","unstructured":"Park, S., Sung, S.H., Lee, S., Lim, J.: Improving the Upper Bound on the Maximum Differential and the Maximum Linear Hull Probability for SPN Structures and AES. In: Johansson, T. (ed.) FSE 2003. LNCS, vol.\u00a02887, pp. 247\u2013260. Springer, Heidelberg (2003)"},{"key":"13_CR21","series-title":"Lecture Notes in Computer Science","first-page":"2012","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2012","year":"2012","unstructured":"Pointcheval, D., Johansson, T. (eds.): EUROCRYPT 2012. LNCS, vol.\u00a07237, pp. 2012\u20132031. Springer, Heidelberg (2012)"},{"key":"13_CR22","series-title":"Lecture Notes in Computer Science","first-page":"2011","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2011","year":"2011","unstructured":"Preneel, B., Takagi, T. (eds.): CHES 2011. LNCS, vol.\u00a06917, pp. 2011\u20132013. Springer, Heidelberg (2011)"},{"key":"13_CR23","doi-asserted-by":"crossref","unstructured":"Shibutani, K., Isobe, T., Hiwatari, H., Mitsuda, A., Akishita, T., Shirai, T.: Piccolo: An Ultra-Lightweight Blockcipher. In: Preneel, Takagi [22], pp. 342\u2013357","DOI":"10.1007\/978-3-642-23951-9_23"},{"key":"13_CR24","unstructured":"Suzaki, T., Minematsu, K., Morioka, S., Kobayashi, E.: Twine: A Lightweight, Versatile Blockcipher. In: ECRYPT Workshop on Lightweight Cryptography (2011), http:\/\/www.uclouvain.be\/crypto\/ecrypt_lc11\/static\/post_proceedings.pdf"},{"key":"13_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1007\/3-540-36159-6_38","volume-title":"Information and Communications Security","author":"H. Wu","year":"2002","unstructured":"Wu, H.: Related-Cipher Attacks. In: Deng, R.H., Qing, S., Bao, F., Zhou, J. (eds.) ICICS 2002. LNCS, vol.\u00a02513, pp. 447\u2013455. Springer, Heidelberg (2002)"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 ASIACRYPT 2012"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34961-4_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T03:14:01Z","timestamp":1606187641000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34961-4_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642349607","9783642349614"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34961-4_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}