{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T16:21:25Z","timestamp":1764174085725},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662434130"},{"type":"electronic","value":"9783662434147"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-43414-7_27","type":"book-chapter","created":{"date-parts":[[2014,5,20]],"date-time":"2014-05-20T14:57:06Z","timestamp":1400597826000},"page":"533-550","source":"Crossref","is-referenced-by-count":16,"title":["Multiple Limited-Birthday Distinguishers and Applications"],"prefix":"10.1007","author":[{"given":"J\u00e9r\u00e9my","family":"Jean","sequence":"first","affiliation":[]},{"given":"Mar\u00eda","family":"Naya-Plasencia","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Peyrin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,5,21]]},"reference":[{"key":"27_CR1","doi-asserted-by":"crossref","unstructured":"Barreto, P.S.L.M., Rijmen, V.: Whirlpool. In: van Tilborg, H.C.A., Jajodia, S. (eds.) Encyclopedia of Cryptography and Security, 2nd edn, pp. 1384\u20131385. Springer, New York (2011)","DOI":"10.1007\/978-1-4419-5906-5_626"},{"key":"27_CR2","series-title":"LNCS","first-page":"92","volume-title":"EUROCRYPT 1994","author":"M Bellare","year":"1995","unstructured":"Bellare, M., Rogaway, P.: Optimal asymmetric encryption. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 92\u2013111. Springer, Heidelberg (1995)"},{"key":"27_CR3","unstructured":"Benadjila, R., Billet, O., Gilbert, H., Macario-Rat, G., Peyrin, T., Robshaw, M., Seurin, Y.: SHA-3 proposal: ECHO. Submission to NIST (2008)"},{"key":"27_CR4","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Assche, G.V.: The Keccak reference. Submission to NIST (Round 3) (2011)"},{"key":"27_CR5","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1007\/978-3-642-25385-0_19","volume-title":"ASIACRYPT 2011","author":"A Bogdanov","year":"2011","unstructured":"Bogdanov, A., Khovratovich, D., Rechberger, C.: Biclique cryptanalysis of the full AES. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 344\u2013371. Springer, Heidelberg (2011)"},{"key":"27_CR6","series-title":"LNCS","first-page":"252","volume-title":"FSE 2011","author":"C Boura","year":"2011","unstructured":"Boura, C., Canteaut, A., De Canni\u00e8re, C.: Higher-order differential properties of Keccak and Luffa. In: Joux, A. (ed.) FSE 2011. LNCS, vol. 6733, pp. 252\u2013269. Springer, Heidelberg (2011)"},{"issue":"4","key":"27_CR7","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1145\/1008731.1008734","volume":"51","author":"R Canetti","year":"2004","unstructured":"Canetti, R., Goldreich, O., Halevi, S.: The random oracle methodology. Revisited J. ACM 51(4), 557\u2013594 (2004)","journal-title":"Revisited J. ACM"},{"key":"27_CR8","series-title":"LNCS","volume-title":"FSE 2012","year":"2012","unstructured":"Canteaut, A. (ed.): FSE 2012. LNCS, vol. 7549. Springer, Heidelberg (2012)"},{"key":"27_CR9","unstructured":"Daemen, J., Rijmen, V.: Rijndael for AES. In: AES Candidate Conference, pp. 343\u2013348 (2000)"},{"key":"27_CR10","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/978-3-642-34931-7_14","volume-title":"INDOCRYPT 2012","author":"P Derbez","year":"2012","unstructured":"Derbez, P., Fouque, P.-A., Jean, J.: Faster chosen-key distinguishers on reduced-round AES. In: Galbraith, S., Nandi, M. (eds.) INDOCRYPT 2012. LNCS, vol. 7668, pp. 225\u2013243. Springer, Heidelberg (2012)"},{"key":"27_CR11","doi-asserted-by":"crossref","unstructured":"Duc, A., Guo, J., Peyrin, T., Wei, L.: Unaligned rebound attack: application to Keccak. In: [8] pp. 402\u2013421","DOI":"10.1007\/978-3-642-34047-5_23"},{"key":"27_CR12","unstructured":"Gauravaram, P., Knudsen, L.R., Matusiewicz, K., Mendel, F., Rechberger, C., Schl\u00e4ffer, M., Thomsen, S.S.: Gr\u00f8stl - a SHA-3 candidate. Submitted to the competition, NIST (2008)"},{"key":"27_CR13","doi-asserted-by":"crossref","unstructured":"Gilbert, H., Peyrin, T.: Super-Sbox cryptanalysis: improved attacks for AES-like permutations. In: [26] pp. 365\u2013383","DOI":"10.1007\/978-3-642-13858-4_21"},{"key":"27_CR14","doi-asserted-by":"crossref","unstructured":"Guo, J., Peyrin, T., Poschmann, A.: The PHOTON family of lightweight hash functions. In: [26] pp. 222\u2013239","DOI":"10.1007\/978-3-642-22792-9_13"},{"key":"27_CR15","series-title":"LNCS","first-page":"326","volume-title":"CHES 2011","author":"J Guo","year":"2011","unstructured":"Guo, J., Peyrin, T., Poschmann, A., Robshaw, M.: The LED block cipher. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 326\u2013341. Springer, Heidelberg (2011)"},{"key":"27_CR16","series-title":"LNCS","volume-title":"FSE 2010","year":"2010","unstructured":"Hong, S., Iwata, T. (eds.): FSE 2010. LNCS, vol. 6147. Springer, Berlin (2010)"},{"key":"27_CR17","doi-asserted-by":"crossref","unstructured":"Jean, J., Naya-Plasencia, M., Peyrin, T.: Improved rebound attack on the finalist Gr\u00f8stl. In: [8] pp. 110\u2013126","DOI":"10.1007\/978-3-642-34047-5_7"},{"key":"27_CR18","doi-asserted-by":"crossref","unstructured":"Khovratovich, D., Nikolic, I.: Rotational cryptanalysis of ARX. In: [16] pp. 333\u2013346","DOI":"10.1007\/978-3-642-13858-4_19"},{"key":"27_CR19","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1007\/978-3-642-10366-7_8","volume-title":"ASIACRYPT 2009","author":"M Lamberger","year":"2009","unstructured":"Lamberger, M., Mendel, F., Rechberger, C., Rijmen, V., Schl\u00e4ffer, M.: Rebound distinguishers: results on the full Whirlpool compression function. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 126\u2013143. Springer, Heidelberg (2009)"},{"key":"27_CR20","unstructured":"Lamberger, M., Mendel, F., Rechberger, C., Rijmen, V., Schl\u00e4ffer, M.: The rebound attack and subspace distinguishers: application to whirlpool. Cryptology ePrint Archive, Report 2010\/198 (2010)"},{"key":"27_CR21","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1007\/978-3-642-10366-7_7","volume-title":"ASIACRYPT 2009","author":"K Matusiewicz","year":"2009","unstructured":"Matusiewicz, K., Naya-Plasencia, M., Nikoli\u0107, I., Sasaki, Y., Schl\u00e4ffer, M.: Rebound attack on the full Lane compression function. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 106\u2013125. Springer, Heidelberg (2009)"},{"key":"27_CR22","series-title":"LNCS","first-page":"16","volume-title":"SAC 2009","author":"F Mendel","year":"2009","unstructured":"Mendel, F., Peyrin, T., Rechberger, C., Schl\u00e4ffer, M.: Improved cryptanalysis of the reduced Gr\u00f8stl compression function, ECHO permutation and AES block cipher. In: Jacobson Jr, M.J., Rijmen, V., Safavi-Naini, R. (eds.) SAC 2009. LNCS, vol. 5867, pp. 16\u201335. Springer, Heidelberg (2009)"},{"key":"27_CR23","series-title":"LNCS","first-page":"260","volume-title":"FSE 2009","author":"F Mendel","year":"2009","unstructured":"Mendel, F., Rechberger, C., Schl\u00e4ffer, M., Thomsen, S.S.: The rebound attack: cryptanalysis of reduced Whirlpool and Gr\u00f8stl. In: Dunkelman, O. (ed.) FSE 2009. LNCS, vol. 5665, pp. 260\u2013276. Springer, Heidelberg (2009)"},{"key":"27_CR24","doi-asserted-by":"crossref","unstructured":"Naya-Plasencia, M.: How to improve rebound attacks. In: [26] pp. 188\u2013205","DOI":"10.1007\/978-3-642-22792-9_11"},{"key":"27_CR25","doi-asserted-by":"crossref","unstructured":"Nikolic, I., Wang, L., Wu, S.: Cryptanalysis of Round-Reduced LED. In: FSE. Lecture Notes in Computer Science (2013) (To appear)","DOI":"10.1007\/978-3-662-43933-3_7"},{"key":"27_CR26","series-title":"LNCS","volume-title":"CRYPTO 2011","year":"2011","unstructured":"Rogaway, P. (ed.): CRYPTO 2011. LNCS, vol. 6841. Springer, Heidelberg (2011)"},{"key":"27_CR27","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1007\/978-3-642-17373-8_3","volume-title":"ASIACRYPT 2010","author":"Y Sasaki","year":"2010","unstructured":"Sasaki, Y., Li, Y., Wang, L., Sakiyama, K., Ohta, K.: Non-full-active Super-Sbox analysis: applications to ECHO and Gr\u00f8stl. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 38\u201355. Springer, Heidelberg (2010)"},{"key":"27_CR28","unstructured":"Schl\u00e4ffer, M.: Updated differential analysis of Gr\u00f8stl. Gr\u00f8stl website (2011)"}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography -- SAC 2013"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-43414-7_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,19]],"date-time":"2020-08-19T17:30:02Z","timestamp":1597858202000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-43414-7_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662434130","9783662434147"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-43414-7_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}