{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T22:16:54Z","timestamp":1775081814960,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":13,"publisher":"Springer Singapore","isbn-type":[{"value":"9789811580604","type":"print"},{"value":"9789811580611","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,12,11]],"date-time":"2020-12-11T00:00:00Z","timestamp":1607644800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,12,11]],"date-time":"2020-12-11T00:00:00Z","timestamp":1607644800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-15-8061-1_11","type":"book-chapter","created":{"date-parts":[[2020,12,10]],"date-time":"2020-12-10T20:08:45Z","timestamp":1607630925000},"page":"125-141","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Cryptanalysis of Kalyna Block Cipher Using Impossible Differential Technique"],"prefix":"10.1007","author":[{"given":"Sunny","family":"Kumar Gupta","sequence":"first","affiliation":[]},{"given":"Mohona","family":"Ghosh","sequence":"additional","affiliation":[]},{"given":"Sraban Kumar","family":"Mohanty","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,12,11]]},"reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Akshima CD, Ghosh M, Goel A, Sanadhya SK (2015) Single key recovery attacks on 9-round kalyna-128\/256 and kalyna-256\/512. In: Kwon S, Yun A (eds) Information security and cryptology - ICISC 2015 - 18th international conference, Seoul, South Korea, 25\u201327 November 2015, Revised Selected Papers. Lecture notes in computer science, vol\u00a09558. Springer, pp 119\u2013135. 10.1007\/978-3-319-30840-1, https:\/\/doi.org\/10.1007\/978-3-319-30840-1","DOI":"10.1007\/978-3-319-30840-1"},{"issue":"4","key":"11_CR2","doi-asserted-by":"publisher","first-page":"1246","DOI":"10.1587\/transinf.2015EDL8174","volume":"99","author":"R AlTawy","year":"2016","unstructured":"AlTawy R, Abdelkhalek A, Youssef AM (2016) A meet-in-the-middle attack on reduced-round kalyna-b\/2b. IEICE Trans Inf Syst 99(4):1246\u20131250","journal-title":"IEICE Trans Inf Syst"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Daemen J, Rijmen V (2002) The design of Rijndael: AES - the advanced encryption standard. Springer","DOI":"10.1007\/978-3-662-04722-4_1"},{"key":"#cr-split#-11_CR4.1","unstructured":"Demirci H, Sel\u00e7uk AA (2008) A meet-in-the-middle attack on 8-round AES. In: Nyberg K"},{"key":"#cr-split#-11_CR4.2","unstructured":"(ed) Fast software encryption, 15th international workshop, FSE 2008, Lausanne, Switzerland, 10-13 February 2008, Revised Selected Papers. Lecture notes in computer science, vol\u00a05086. Springer, pp 116-126"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Derbez P, Fouque P, Jean J (2013) Improved key recovery attacks on reduced-round AES in the single-key setting. In: Johansson T, Nguyen PQ (eds) Advances in cryptology - EUROCRYPT 2013, 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, 26\u201330 May 2013. Proceedings. Lecture notes in computer science, vol\u00a07881. Springer, pp 371\u2013387","DOI":"10.1007\/978-3-642-38348-9_23"},{"issue":"3","key":"11_CR6","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1007\/s00145-013-9159-4","volume":"28","author":"O Dunkelman","year":"2015","unstructured":"Dunkelman O, Keller N, Shamir A (2015) Improved single-key attacks on 8-round AES-192 and AES-256. J Cryptol 28(3):397\u2013422","journal-title":"J Cryptol"},{"key":"11_CR7","unstructured":"Li L, Jia K, Wang X (2014) Improved single-key attacks on 9-round AES-192\/256. In: Cid C, Rechberger C (eds) Fast software encryption - 21st international workshop, FSE 2014, London, UK, 3\u20135 March 2014. Revised Selected Papers. Lecture notes in computer science, vol\u00a08540. Springer, pp 127\u2013146"},{"issue":"4","key":"11_CR8","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1007\/s10623-017-0353-5","volume":"86","author":"L Lin","year":"2018","unstructured":"Lin L, Wu W (2018) Improved meet-in-the-middle attacks on reduced-round kalyna-128\/256 and kalyna-256\/512. Des Codes Cryptogr 86(4):721\u2013741. https:\/\/doi.org\/10.1007\/s10623-017-0353-5","journal-title":"Des Codes Cryptogr"},{"key":"11_CR9","unstructured":"Medeiros SF, G\u00e9rard F, Veshchikov N, Lerman L, Markowitch O (2016) Breaking kalyna 128\/128 with power attacks. In: Carlet C, Hasan MA, Saraswat V (eds) Security, privacy, and applied cryptography engineering - 6th international conference, SPACE 2016, Hyderabad, India, 14\u201318 December 2016, Proceedings. Lecture notes in computer science, vol 10076. Springer, pp 402\u2013414"},{"key":"11_CR10","unstructured":"Oliynykov R (2014) Next generation of block ciphers providing high-level security. Winter School in Information Security, Finse"},{"key":"11_CR11","unstructured":"Oliynykov R, Gorbenko I, Kazymyrov O, Ruzhentsev V, Kuznetsov O, Gorbenko Y, Dyrda O, Dolgov V, Pushkaryov A, Mordvinov R, Kaidalov D (2015) A new encryption standard of ukraine: the kalyna block cipher. IACR Cryptol 2015:650. http:\/\/eprint.iacr.org\/2015\/650"},{"key":"11_CR12","unstructured":"Rongjia L, Chenhui J (2015) Meet-in-the-middle attacks on 10-round AES-256. Designs, Codes and cryptography, pp 1\u201313"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the Sixth International Conference on Mathematics and Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-8061-1_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,10]],"date-time":"2020-12-10T20:12:19Z","timestamp":1607631139000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-8061-1_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,11]]},"ISBN":["9789811580604","9789811580611"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-8061-1_11","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,12,11]]},"assertion":[{"value":"11 December 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}