{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T09:32:03Z","timestamp":1758706323180},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642376818"},{"type":"electronic","value":"9783642376825"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-37682-5_13","type":"book-chapter","created":{"date-parts":[[2013,4,2]],"date-time":"2013-04-02T21:48:15Z","timestamp":1364939295000},"page":"170-183","source":"Crossref","is-referenced-by-count":2,"title":["New Impossible Differential Attack on SAFER\u2009+\u2009 and SAFER\u2009+\u2009+"],"prefix":"10.1007","author":[{"given":"Jingyuan","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Meiqin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jiazhe","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yuliang","family":"Zheng","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","unstructured":"Behnam, B., Taraneh, E., Mohammad, R.A.: Impossible Differential Cryptanalysis of SAFER++. In: Proceedings of the 2008 International Conference on Security Management, SAM 2008, pp. 10\u201314. CSREA Press (2008)"},{"key":"13_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1007\/3-540-48910-X_2","volume-title":"Advances in Cryptology - EUROCRYPT \u201999","author":"E. Biham","year":"1999","unstructured":"Biham, E., Biryukov, A., Shamir, A.: Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol.\u00a01592, pp. 12\u201323. Springer, Heidelberg (1999)"},{"key":"13_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/978-3-540-45146-4_12","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"A. Biryukov","year":"2003","unstructured":"Biryukov, A., De Canni\u00e8re, C., Dellkrantz, G.: Cryptanalysis of Safer++. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 195\u2013211. Springer, Heidelberg (2003)"},{"key":"13_CR4","unstructured":"BLUETOOTH SPECIFICATION Version 1.0B (November 29, 1999), \n                    \n                      http:\/\/www.bluetooth.com\/link\/spec\/bluetooth_b.pdf"},{"key":"13_CR5","unstructured":"Knudsen, L.: DEAL-A 128-bit Block Cipher. NIST AES proposal. Technial report\u00a0151 (February 21, 1998) (retrieved February 27, 2007)"},{"issue":"4","key":"13_CR6","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1007\/s001450010004","volume":"13","author":"L. Knudsen","year":"2000","unstructured":"Knudsen, L.: A Detailed Analysis of SAFER K. Journal of Cryptplogy\u00a013(4), 417\u2013436 (2000)","journal-title":"Journal of Cryptplogy"},{"key":"13_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1007\/3-540-60590-8_17","volume-title":"Fast Software Encryption","author":"J.L. Massey","year":"1995","unstructured":"Massey, J.L.: SAFER K-64: One Year Later. In: Preneel, B. (ed.) FSE 1994. LNCS, vol.\u00a01008, pp. 212\u2013241. Springer, Heidelberg (1995)"},{"key":"13_CR8","unstructured":"Massey, J.L., Khachatrian, G.H., Kuregian, M.K.: 1st AES Conference on Nomination of SAFER+ as Candidate Algorithm for The Advanced Encryption Standard, California, USA (June 1998), \n                    \n                      http:\/\/csrc.nist.gov\/encryption\/aes\/"},{"key":"13_CR9","unstructured":"Massey, J.L., Khachatrian, G.H., Kuregian, M.K.: 1st NESSIE Workshop on The SAFER++ Block Encryption Algorithm, Heverlee, Belgium (November 2000), \n                    \n                      http:\/\/cryptonessie.org"},{"key":"13_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/3-540-44706-7_17","volume-title":"Fast Software Encryption","author":"J. Nakahara Jr.","year":"2001","unstructured":"Nakahara Jr., J., Preneel, B., Vandewalle, J.: Linear Cryptanalysis of Reduced-Round Versions of the SAFER Block Cipher Family. In: Schneier, B. (ed.) FSE 2000. LNCS, vol.\u00a01978, pp. 244\u2013261. Springer, Heidelberg (2001)"},{"key":"13_CR11","unstructured":"Nakahara, J.: Cryptanalysis and Design of Block Ciphers. PhD thesis. Katholidke University, Leuven (2003)"},{"key":"13_CR12","unstructured":"Nakahara, J., Preneel, B.: Impossible Differential Attacks on Reduced-Round SAFER Ciphers. NESSIE Public Report, NES\/DOC\/KUL\/WP5\/30\/1 (2003)"},{"key":"13_CR13","unstructured":"NESSIE Project\u2013New European Schemes for Signatures, Integrity and Encryption, \n                    \n                      http:\/\/cryptonessie.org"},{"key":"13_CR14","unstructured":"Piret, G., Quisauater, J.: Integral Cryptanalysis on Reduced-Round SAFER++\u2013A Way to Extend The Attack? (2003), \n                    \n                      http:\/\/eprint.iacr.org\/2003\/033.pdf"},{"key":"13_CR15","unstructured":"Yemo, Y., Park, I.: Optimization of Integral Cryptanalysis on Reduced-Round SAFER++. Joho Shori Gakkai Shinpojiumu Ronbunshu\u00a02003(15) (2003) (published in Japan)"},{"key":"13_CR16","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1016\/j.compeleceng.2009.08.004","volume":"36","author":"S. Zheng","year":"2010","unstructured":"Zheng, S., Wang, C.L., Yang, Y.X.: A New Impossible Differential Attack on SAFER Ciphers. Computers and Electrical Engineering\u00a036, 180\u2013189 (2010)","journal-title":"Computers and Electrical Engineering"},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"Zhao, J., Wang, M., Chen, J., Zheng, Y.: New Impossible Differential Attack on SAFER\u2009+\u2009 and SAFER\u2009+\u2009+\u2009. IACR ePrint Archive report (2012)","DOI":"10.1007\/978-3-642-37682-5_13"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology \u2013 ICISC 2012"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-37682-5_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,11]],"date-time":"2019-05-11T23:09:53Z","timestamp":1557616193000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-37682-5_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642376818","9783642376825"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-37682-5_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}