{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T21:13:10Z","timestamp":1775769190782,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642385520","type":"print"},{"value":"9783642385537","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38553-7_3","type":"book-chapter","created":{"date-parts":[[2013,5,9]],"date-time":"2013-05-09T00:47:12Z","timestamp":1368060432000},"page":"43-60","source":"Crossref","is-referenced-by-count":28,"title":["On Constructions of Involutory MDS Matrices"],"prefix":"10.1007","author":[{"given":"Kishan","family":"Chand Gupta","sequence":"first","affiliation":[]},{"given":"Indranil","family":"Ghosh Ray","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","unstructured":"Barreto, P., Rijmen, V.: The Khazad Legacy-Level Block Cipher, Submission to the NESSIE Project (2000), \n                  \n                    http:\/\/cryptonessie.org"},{"key":"3_CR2","unstructured":"Barreto, P.S., Rijmen, V.: The Anubis block cipher, NESSIE Algorithm Submission (2000), \n                  \n                    http:\/\/cryptonessie.org"},{"issue":"3-4","key":"3_CR3","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1006\/jsco.1996.0125","volume":"24","author":"W. Bosma","year":"1997","unstructured":"Bosma, W., Cannon, J., Playoust, C.: The Magma Algebra System I: The User Language. J. Symbolic Comput.\u00a024(3-4), 235\u2013265 (1997); Computational algebra and number theory (London, 1993)","journal-title":"J. Symbolic Comput."},{"key":"3_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1007\/978-3-642-31410-0_17","volume-title":"Progress in Cryptology - AFRICACRYPT 2012","author":"J. Choy","year":"2012","unstructured":"Choy, J., Yap, H., Khoo, K., Guo, J., Peyrin, T., Poschmann, A., Tan, C.H.: SPN-Hash: Improving the Provable Resistance against Differential Collision Attacks. In: Mitrokotsa, A., Vaudenay, S. (eds.) AFRICACRYPT 2012. LNCS, vol.\u00a07374, pp. 270\u2013286. Springer, Heidelberg (2012)"},{"key":"3_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/BFb0052343","volume-title":"Fast Software Encryption","author":"J. Daemen","year":"1997","unstructured":"Daemen, J., Knudsen, L.R., Rijmen, V.: The block cipher SQUARE. In: Biham, E. (ed.) FSE 1997. LNCS, vol.\u00a01267, pp. 149\u2013165. Springer, Heidelberg (1997)"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Daemen, J., Rijmen, V.: The Design of Rijndael:AES - The Advanced Encryption Standard. Springer (2002)","DOI":"10.1007\/978-3-662-04722-4"},{"key":"3_CR7","unstructured":"Filho, G.D., Barreto, P., Rijmen, V.: The Maelstrom-0 Hash Function. In: Proceedings of the 6th Brazilian Symposium on Information and Computer Systems Security (2006)"},{"key":"3_CR8","unstructured":"Gauravaram, P., Knudsen, L.R., Matusiewicz, K., Mendel, F., Rechberger, C., Schlaffer, M., Thomsen, S.: Gr\u03c6stl a SHA-3 Candidate. Submission to NIST (2008), \n                  \n                    http:\/\/www.groestl.info"},{"key":"3_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1007\/978-3-642-22792-9_13","volume-title":"Advances in Cryptology \u2013 CRYPTO 2011","author":"J. Guo","year":"2011","unstructured":"Guo, J., Peyrin, T., Poschmann, A.: The PHOTON Family of Lightweight Hash Functions. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol.\u00a06841, pp. 222\u2013239. Springer, Heidelberg (2011)"},{"issue":"2","key":"3_CR10","first-page":"109","volume":"9","author":"J. Nakahara Jr.","year":"2009","unstructured":"Nakahara Jr., J., Abrahao, E.: A New Involutory MDS Matrix for the AES. International Journal of Network Security\u00a09(2), 109\u2013116 (2009)","journal-title":"International Journal of Network Security"},{"key":"3_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/978-3-540-30564-4_6","volume-title":"Selected Areas in Cryptography","author":"P. Junod","year":"2004","unstructured":"Junod, P., Vaudenay, S.: Perfect Diffusion Primitives for Block Ciphers Building Efficient MDS Matrices. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol.\u00a03357, pp. 84\u201399. Springer, Heidelberg (2004)"},{"key":"3_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/978-3-540-30564-4_8","volume-title":"Selected Areas in Cryptography","author":"P. Junod","year":"2004","unstructured":"Junod, P., Vaudenay, S.: FOX: A new family of block ciphers. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol.\u00a03357, pp. 114\u2013129. Springer, Heidelberg (2004)"},{"key":"3_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/978-3-642-03317-9_17","volume-title":"Fast Software Encryption","author":"P. Junod","year":"2009","unstructured":"Junod, P., Macchetti, M.: Revisiting the IDEA philosophy. In: Dunkelman, O. (ed.) FSE 2009. LNCS, vol.\u00a05665, pp. 277\u2013295. Springer, Heidelberg (2009)"},{"issue":"9","key":"3_CR14","doi-asserted-by":"publisher","first-page":"570","DOI":"10.1109\/LCOMM.2004.833807","volume":"8","author":"J. Lacan","year":"2004","unstructured":"Lacan, J., Fimes, J.: Systematic MDS erasure codes based on vandermonde matrices. IEEE Trans. Commun. Lett.\u00a08(9), 570\u2013572 (2004)","journal-title":"IEEE Trans. Commun. Lett."},{"issue":"4","key":"3_CR15","doi-asserted-by":"publisher","first-page":"917","DOI":"10.1016\/j.ins.2010.09.033","volume":"181","author":"J.W. Lo","year":"2011","unstructured":"Lo, J.W., Hwang, M.S., Liu, C.H.: An efficient key assignment scheme for access control in a large leaf class hierarchy. Journal of Information Sciences: An International Journal Archive\u00a0181(4), 917\u2013925 (2011)","journal-title":"Journal of Information Sciences: An International Journal Archive"},{"key":"3_CR16","unstructured":"MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error Correcting Codes. North Holland (1986)"},{"key":"3_CR17","unstructured":"Rao, A.R., Bhimasankaram, P.: Linear Algebra, 2nd edn. Hindustan Book Agency"},{"key":"3_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/3-540-60865-6_47","volume-title":"Fast Software Encryption","author":"V. Rijmen","year":"1996","unstructured":"Rijmen, V., Daemen, J., Preneel, B., Bosselaers, A., Win, E.D.: The cipher SHARK. In: Gollmann, D. (ed.) FSE 1996. LNCS, vol.\u00a01039, pp. 99\u2013112. Springer, Heidelberg (1996)"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Sajadieh, M., Dakhilalian, M., Mala, H., Omoomi, B.: On construction of involutory MDS matrices from Vandermonde Matrices in GF(2\n                  q\n                ). Design, Codes Cryptography, 1\u201322 (2012)","DOI":"10.1007\/s10623-011-9578-x"},{"key":"3_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1007\/978-3-642-34047-5_22","volume-title":"Fast Software Encryption","author":"M. Sajadieh","year":"2012","unstructured":"Sajadieh, M., Dakhilalian, M., Mala, H., Sepehrdad, P.: Recursive Diffusion Layers for Block Ciphers and Hash Functions. In: Canteaut, A. (ed.) FSE 2012. LNCS, vol.\u00a07549, pp. 385\u2013401. Springer, Heidelberg (2012)"},{"key":"3_CR21","unstructured":"Schneier, B., Kelsey, J., Whiting, D., Wagner, D., Hall, C., Ferguson, N.: Twofish: A 128-bit block cipher. In: The first AES Candidate Conference. National Institute for Standards and Technology (1998)"},{"key":"3_CR22","unstructured":"Schneier, B., Kelsey, J., Whiting, D., Wagner, D., Hall, C., Ferguson, N.: The Twofish encryption algorithm. Wiley (1999)"},{"key":"3_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/BFb0053423","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"C.-P. Schnorr","year":"1995","unstructured":"Schnorr, C.-P., Vaudenay, S.: Black Box Cryptanalysis of Hash Networks Based on Multipermutations. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 47\u201357. Springer, Heidelberg (1995)"},{"key":"3_CR24","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C.E. Shannon","year":"1949","unstructured":"Shannon, C.E.: Communication Theory of Secrecy Systems. Bell Syst. Technical J.\u00a028, 656\u2013715 (1949)","journal-title":"Bell Syst. Technical J."},{"key":"3_CR25","unstructured":"Sony Corporation, The 128-bit Block cipher CLEFIA Algorithm Specification (2007), \n                  \n                    http:\/\/www.sony.co.jp\/Products\/cryptography\/clefia\/download\/data\/clefia-spec-1.0.pdf"},{"key":"3_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1007\/3-540-60590-8_22","volume-title":"Fast Software Encryption","author":"S. Vaudenay","year":"1995","unstructured":"Vaudenay, S.: On the Need for Multipermutations: Cryptanalysis of MD4 and SAFER. In: Preneel, B. (ed.) FSE 1994. LNCS, vol.\u00a01008, pp. 286\u2013297. Springer, Heidelberg (1995)"},{"key":"3_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/3-540-45661-9_14","volume-title":"Fast Software Encryption","author":"D. Watanabe","year":"2002","unstructured":"Watanabe, D., Furuya, S., Yoshida, H., Takaragi, K., Preneel, B.: A new keystream generator MUGI. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol.\u00a02365, pp. 179\u2013194. Springer, Heidelberg (2002)"},{"key":"3_CR28","unstructured":"Youssef, A.M., Tavares, S.E., Heys, H.M.: A New Class of Substitution Permutation Networks. In: Workshop on Selected Areas in Cryptography, SAC 1996, Workshop Record, pp. 132\u2013147 (1996)"},{"key":"3_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1007\/978-3-642-35999-6_23","volume-title":"Selected Areas in Cryptography","author":"S. Wu","year":"2013","unstructured":"Wu, S., Wang, M., Wu, W.: Recursive Diffusion Layers for (Lightweight) Block Ciphers and Hash Functions. In: Knudsen, L.R., Wu, H. (eds.) SAC 2012. LNCS, vol.\u00a07707, pp. 355\u2013371. Springer, Heidelberg (2013)"},{"key":"3_CR30","unstructured":"Youssef, A.M., Mister, S., Tavares, S.E.: On the Design of Linear Transformations for Substitution Permutation Encryption Networks. In: Workshop on Selected Areas in Cryptography, SAC 1997, pp. 40\u201348 (1997)"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 AFRICACRYPT 2013"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38553-7_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,12]],"date-time":"2019-05-12T23:34:14Z","timestamp":1557704054000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38553-7_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642385520","9783642385537"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38553-7_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013]]}}}