{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:45:53Z","timestamp":1742913953037,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":10,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811054204"},{"type":"electronic","value":"9789811054211"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-5421-1_6","type":"book-chapter","created":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T08:30:04Z","timestamp":1498120204000},"page":"58-72","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["On the Practical Implementation of Impossible Differential Cryptanalysis on Reduced-Round AES"],"prefix":"10.1007","author":[{"given":"Sourya","family":"Kakarla","sequence":"first","affiliation":[]},{"given":"Srinath","family":"Mandava","sequence":"additional","affiliation":[]},{"given":"Dhiman","family":"Saha","sequence":"additional","affiliation":[]},{"given":"Dipanwita Roy","family":"Chowdhury","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,23]]},"reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Bahrak, B., Aref, M.R.: Impossible differential attack on seven-round AES-128. IET Inform. Secur. 2(2), 28\u201332 (2008). \n                    http:\/\/dx.doi.org\/10.1049\/iet-ifs:20070078","DOI":"10.1049\/iet-ifs:20070078"},{"key":"6_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1007\/3-540-48910-X_2","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 99","author":"E Biham","year":"1999","unstructured":"Biham, E., Biryukov, A., Shamir, A.: Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 12\u201323. Springer, Heidelberg (1999). doi:\n                    10.1007\/3-540-48910-X_2"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Biham, E., Keller, N.: Cryptanalysis of Reduced Variants of Rijndael. In: 3rd AES Conference, vol. 230 (2002)","DOI":"10.1007\/3-540-45473-X_2"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. J. Cryptology 4(1), 3\u201372 (1991). \n                    http:\/\/dx.doi.org\/10.1007\/BF00630563","DOI":"10.1007\/BF00630563"},{"key":"6_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1007\/978-3-642-17401-8_20","volume-title":"Progress in Cryptology - INDOCRYPT 2010","author":"H Mala","year":"2010","unstructured":"Mala, H., Dakhilalian, M., Rijmen, V., Modarres-Hashemi, M.: Improved impossible differential cryptanalysis of 7-round AES-128. In: Gong, G., Gupta, K.C. (eds.) INDOCRYPT 2010. LNCS, vol. 6498, pp. 282\u2013291. Springer, Heidelberg (2010). doi:\n                    10.1007\/978-3-642-17401-8_20"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Daemen, J., Rijmen, V.: The Design of Rijndael: AES - The Advanced Encryption Standard. Information Security and Cryptography. Springer (2002). \n                    http:\/\/dx.doi.org\/10.1007\/978-3-662-04722-4","DOI":"10.1007\/978-3-662-04722-4"},{"key":"6_CR7","unstructured":"Gueron, S.: Intel\u00ae Advanced Encryption Standard (AES) New Instructions Set. Intel Corporation (2010). \n                    https:\/\/software.intel.com\/sites\/default\/files\/article\/165683\/aes-wp-2012-09-22-v01.pdf"},{"key":"6_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/978-3-540-89754-5_22","volume-title":"Progress in Cryptology - INDOCRYPT 2008","author":"J Lu","year":"2008","unstructured":"Lu, J., Dunkelman, O., Keller, N., Kim, J.: New impossible differential attacks on AES. In: Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. LNCS, vol. 5365, pp. 279\u2013293. Springer, Heidelberg (2008). doi:\n                    10.1007\/978-3-540-89754-5_22"},{"key":"6_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1007\/978-3-642-17401-8_20","volume-title":"Progress in Cryptology - INDOCRYPT 2010","author":"H Mala","year":"2010","unstructured":"Mala, H., Dakhilalian, M., Rijmen, V., Modarres-Hashemi, M.: Improved impossible differential cryptanalysis of 7-round AES-128. In: Gong, G., Gupta, K.C. (eds.) INDOCRYPT 2010. LNCS, vol. 6498, pp. 282\u2013291. Springer, Heidelberg (2010). doi:\n                    10.1007\/978-3-642-17401-8_20"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Phan, R.C.: Impossible differential cryptanalysis of 7-round Advanced Encryption Standard (AES). Inf. Process. Lett. 91(1), 33\u201338 (2004). \n                    http:\/\/dx.doi.org\/10.1016\/j.ipl.2004.02.018","DOI":"10.1016\/j.ipl.2004.02.018"}],"container-title":["Communications in Computer and Information Science","Applications and Techniques in Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-5421-1_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T23:18:50Z","timestamp":1558394330000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-5421-1_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811054204","9789811054211"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-5421-1_6","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"23 June 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ATIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applications and Techniques in Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Auckland","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New Zealand","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 July 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 July 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"atis2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/atis.massey.ac.nz\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}