{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T21:34:48Z","timestamp":1772487288114,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":34,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819551248","type":"print"},{"value":"9789819551255","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-5125-5_8","type":"book-chapter","created":{"date-parts":[[2025,12,7]],"date-time":"2025-12-07T11:42:22Z","timestamp":1765107742000},"page":"224-255","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Quantum Periodic Distinguisher Construction: Symbolization Method and\u00a0Automated Tool"],"prefix":"10.1007","author":[{"given":"Qun","family":"Liu","sequence":"first","affiliation":[]},{"given":"Haoyang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jinliang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Boyun","family":"Li","sequence":"additional","affiliation":[]},{"given":"Meiqin","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,12,8]]},"reference":[{"key":"8_CR1","doi-asserted-by":"publisher","unstructured":"Beierle, C., et al.: The SKINNY family of block ciphers and its low-latency variant MANTIS. In: Robshaw, M., Katz, J. (eds.) CRYPTO 2016, Part II. LNCS, vol. 9815, pp. 123\u2013153. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53008-5_5","DOI":"10.1007\/978-3-662-53008-5_5"},{"key":"8_CR2","doi-asserted-by":"publisher","unstructured":"Beierle, C., Leander, G., Moradi, A., Rasoolzadeh, S.: CRAFT: lightweight tweakable block cipher with efficient protection against DFA attacks. IACR Trans. Symmetric Cryptol. 2019(1), 5\u201345 (2019). https:\/\/doi.org\/10.13154\/TOSC.V2019.I1.5-45","DOI":"10.13154\/TOSC.V2019.I1.5-45"},{"key":"8_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/978-3-319-07536-5_17","volume-title":"Applied Cryptography and Network Security","author":"C Blondeau","year":"2014","unstructured":"Blondeau, C., Bogdanov, A., Wang, M.: On the (In)equivalence of impossible differential and zero-correlation distinguishers for Feistel- and Skipjack-type ciphers. In: Boureanu, I., Owesarski, P., Vaudenay, S. (eds.) ACNS 2014. LNCS, vol. 8479, pp. 271\u2013288. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-07536-5_17"},{"key":"8_CR4","doi-asserted-by":"publisher","unstructured":"Bonnetain, X., Hosoyamada, A., Naya-Plasencia, M., Sasaki, Yu., Schrottenloher, A.: Quantum attacks without superposition queries: the offline Simon\u2019s algorithm. In: Galbraith, S.D., Moriai, S. (eds.) ASIACRYPT 2019, Part I. LNCS, vol. 11921, pp. 552\u2013583. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-34578-5_20","DOI":"10.1007\/978-3-030-34578-5_20"},{"key":"8_CR5","doi-asserted-by":"publisher","unstructured":"Bonnetain, X., Leurent, G., Naya-Plasencia, M., Schrottenloher, A.: Quantum linearization attacks. In: Tibouchi, M., Wang, H. (eds.) ASIACRYPT 2021, Part I. LNCS, vol. 13090, pp. 422\u2013452. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-92062-3_15","DOI":"10.1007\/978-3-030-92062-3_15"},{"key":"8_CR6","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"779","DOI":"10.1007\/978-3-031-15982-4_26","volume-title":"CRYPTO 2022, Part III","author":"F Canale","year":"2022","unstructured":"Canale, F., Leander, G., Stennes, L.: Simon\u2019s algorithm and symmetric crypto: Generalizations and automatized applications. In: Dodis, Y., Shrimpton, T. (eds.) CRYPTO 2022, Part III. LNCS, vol. 13509, pp. 779\u2013808. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-15982-4_26"},{"key":"8_CR7","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1007\/978-981-96-4734-7_21","volume-title":"Information Security and Cryptology","author":"J Chen","year":"2025","unstructured":"Chen, J., Liu, Q., Li, B., Qiao, J., Wang, J.: Simplified periodic distinguishers searching: application to GFS-4F\/2F and TWINE. In: Lin, D., Wang, M., Yung, M. (eds.) Information Security and Cryptology. LNCS, pp. 425\u2013443. Springer, Singapore (2025). https:\/\/doi.org\/10.1007\/978-981-96-4734-7_21"},{"key":"8_CR8","doi-asserted-by":"publisher","unstructured":"Cid, C., Hosoyamada, A., Liu, Y., Sim, S.M.: Quantum cryptanalysis on contracting Feistel structures and observation on related-key settings. In: Bhargavan, K., Oswald, E., Prabhakaran, M. (eds.) INDOCRYPT 2020. LNCS, vol. 12578, pp. 373\u2013394. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-65277-7_17","DOI":"10.1007\/978-3-030-65277-7_17"},{"key":"8_CR9","doi-asserted-by":"publisher","unstructured":"Cui, J., Guo, J., Ding, S.: Applications of Simon\u2019s algorithm in quantum attacks on Feistel variants. Quantum Inf. Process. 20(3), 117 (2021). https:\/\/doi.org\/10.1007\/S11128-021-03027-X","DOI":"10.1007\/S11128-021-03027-X"},{"key":"8_CR10","doi-asserted-by":"publisher","unstructured":"Daemen, J., Rijmen, V.: The Design of Rijndael - The Advanced Encryption Standard (AES), Second Edition. Information Security and Cryptography, Springer (2020). https:\/\/doi.org\/10.1007\/978-3-662-60769-5","DOI":"10.1007\/978-3-662-60769-5"},{"key":"8_CR11","doi-asserted-by":"publisher","unstructured":"Dong, X., Dong, B., Wang, X.: Quantum attacks on some Feistel block ciphers. Des. Codes Cryptogr. 88(6), 1179\u20131203 (2020). https:\/\/doi.org\/10.1007\/S10623-020-00741-Y","DOI":"10.1007\/S10623-020-00741-Y"},{"key":"8_CR12","doi-asserted-by":"publisher","unstructured":"Dong, X., Li, Z., Wang, X.: Quantum cryptanalysis on some generalized Feistel schemes. Sci. China Inf. Sci. 62(2), 22501:1\u201322501:12 (2019). https:\/\/doi.org\/10.1007\/S11432-017-9436-7","DOI":"10.1007\/S11432-017-9436-7"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Grover, L.K.: A fast quantum mechanical algorithm for database search. In: Miller, G.L. (ed.) Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, Philadelphia, Pennsylvania, USA, 22\u201324 May 1996, pp. 212\u2013219. ACM (1996)","DOI":"10.1145\/237814.237866"},{"key":"8_CR14","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1007\/978-3-031-68385-5_2","volume-title":"CRYPTO 2024, Part IV","author":"H Hadipour","year":"2024","unstructured":"Hadipour, H., Derbez, P., Eichlseder, M.: Revisiting differential-linear attacks via a boomerang perspective with application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT. In: Reyzin, L., Stebila, D. (eds.) CRYPTO 2024, Part IV. LNCS, vol. 14923, pp. 38\u201372. Springer, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-68385-5_2"},{"key":"8_CR15","doi-asserted-by":"publisher","unstructured":"Hod\u017ei\u0107, S., Knudsen Ramkilde, L., Brasen Kidmose, A.: On quantum distinguishers for type-3 generalized Feistel network based on separability. In: Ding, J., Tillich, J.-P. (eds.) PQCrypto 2020. LNCS, vol. 12100, pp. 461\u2013480. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-44223-1_25","DOI":"10.1007\/978-3-030-44223-1_25"},{"key":"8_CR16","doi-asserted-by":"publisher","unstructured":"Hosoyamada, A., Aoki, K.: On Quantum Related-Key Attacks on Iterated Even-Mansour Ciphers. In: Obana, S., Chida, K. (eds.) IWSEC 2017. LNCS, vol. 10418, pp. 3\u201318. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-64200-0_1","DOI":"10.1007\/978-3-319-64200-0_1"},{"key":"8_CR17","doi-asserted-by":"publisher","unstructured":"Hosoyamada, A., Sasaki, Yu.: Quantum Demiric-Sel\u00e7uk meet-in-the-middle attacks: applications to 6-round generic Feistel constructions. In: Catalano, D., De Prisco, R. (eds.) SCN 2018. LNCS, vol. 11035, pp. 386\u2013403. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-98113-0_21","DOI":"10.1007\/978-3-319-98113-0_21"},{"key":"8_CR18","doi-asserted-by":"publisher","unstructured":"Ito, G., Hosoyamada, A., Matsumoto, R., Sasaki, Yu., Iwata, T.: Quantum chosen-ciphertext attacks against Feistel ciphers. In: Matsui, M. (ed.) CT-RSA 2019. LNCS, vol. 11405, pp. 391\u2013411. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-12612-4_20","DOI":"10.1007\/978-3-030-12612-4_20"},{"key":"8_CR19","doi-asserted-by":"publisher","unstructured":"Kaplan, M., Leurent, G., Leverrier, A., Naya-Plasencia, M.: Breaking symmetric cryptosystems using\u00a0quantum\u00a0period finding. In: Robshaw, M., Katz, J. (eds.) CRYPTO 2016, Part II. LNCS, vol. 9815, pp. 207\u2013237. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53008-5_8","DOI":"10.1007\/978-3-662-53008-5_8"},{"key":"8_CR20","doi-asserted-by":"publisher","unstructured":"Knudsen, L.R., Wagner, D.A.: On the structure of skipjack. Discret. Appl. Math. 111(1\u20132), 103\u2013116 (2001). https:\/\/doi.org\/10.1016\/S0166-218X(00)00347-4","DOI":"10.1016\/S0166-218X(00)00347-4"},{"key":"8_CR21","doi-asserted-by":"publisher","unstructured":"Kuwakado, H., Morii, M.: Quantum distinguisher between the 3-round Feistel cipher and the random permutation. In: IEEE International Symposium on Information Theory, ISIT 2010, Austin, Texas, USA, 13\u201318 June 2010, Proceedings, pp. 2682\u20132685. IEEE (2010). https:\/\/doi.org\/10.1109\/ISIT.2010.5513654","DOI":"10.1109\/ISIT.2010.5513654"},{"key":"8_CR22","doi-asserted-by":"publisher","unstructured":"Leander, G., May, A.: Grover meets Simon \u2013 quantumly attacking the FX-construction. In: Takagi, T., Peyrin, T. (eds.) ASIACRYPT 2017, Part II. LNCS, vol. 10625, pp. 161\u2013178. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70697-9_6","DOI":"10.1007\/978-3-319-70697-9_6"},{"key":"8_CR23","unstructured":"Liu, Q., Wang, H., Wang, J., Li, B., Wang, M.: Quantum periodic distinguisher construction: symbolization method and automated tool. Cryptology ePrint Archive, Paper 2025\/681 (2025). https:\/\/eprint.iacr.org\/2025\/681"},{"key":"8_CR24","doi-asserted-by":"publisher","unstructured":"Ni, B., Ito, G., Dong, X., Iwata, T.: Quantum attacks against type-1 generalized Feistel ciphers and applications to CAST-256. In: Hao, F., Ruj, S., Sen Gupta, S. (eds.) INDOCRYPT 2019. LNCS, vol. 11898, pp. 433\u2013455. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-35423-7_22","DOI":"10.1007\/978-3-030-35423-7_22"},{"key":"8_CR25","unstructured":"NIST: Skipjack and kea algorithm specifications (1998). https:\/\/csrc.nist.gov\/CSRC\/media\/\/Projects\/Cryptographic-Algorithm-Validation-Program\/documents\/skipjack\/skipjack.pdf"},{"key":"8_CR26","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/BFB0034838","volume-title":"ASIACRYPT 1996","author":"K Nyberg","year":"1996","unstructured":"Nyberg, K.: Generalized Feistel networks. In: Kim, K., Matsumoto, T. (eds.) ASIACRYPT 1996. LNCS, vol. 1163, pp. 91\u2013104. Springer, Heidelberg (1996). https:\/\/doi.org\/10.1007\/BFB0034838"},{"key":"8_CR27","doi-asserted-by":"publisher","unstructured":"Shibutani, K., Isobe, T., Hiwatari, H., Mitsuda, A., Akishita, T., Shirai, T.: Piccolo: an ultra-lightweight blockcipher. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 342\u2013357. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-23951-9_23","DOI":"10.1007\/978-3-642-23951-9_23"},{"key":"8_CR28","doi-asserted-by":"publisher","unstructured":"Simon, D.R.: On the power of quantum computation. In: 35th Annual Symposium on Foundations of Computer Science, Santa Fe, New Mexico, USA, 20\u201322 November 1994, pp. 116\u2013123. IEEE Computer Society (1994). https:\/\/doi.org\/10.1109\/SFCS.1994.365701","DOI":"10.1109\/SFCS.1994.365701"},{"key":"8_CR29","doi-asserted-by":"crossref","unstructured":"Sun, H.W., Cai, B.B., Qin, S.J., Wen, Q.Y., Gao, F.: Quantum attacks on type-1 generalized feistel schemes. Adv. Quant. Technol. 6(10), 2300155 (2023)","DOI":"10.1002\/qute.202300155"},{"key":"8_CR30","doi-asserted-by":"publisher","unstructured":"Suzaki, T., Minematsu, K., Morioka, S., Kobayashi, E.: $$\\mathit{TWINE}$$: a lightweight block cipher for multiple platforms. In: Knudsen, L.R., Wu, H. (eds.) SAC 2012. LNCS, vol. 7707, pp. 339\u2013354. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-35999-6_22","DOI":"10.1007\/978-3-642-35999-6_22"},{"key":"8_CR31","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/978-3-031-88661-4_5","volume-title":"CT-RSA 2025","author":"X Wang","year":"2025","unstructured":"Wang, X., Xiang, Z., Zhang, S., Chen, S., Zeng, X.: Quantum chosen-ciphertext attacks based on Simon\u2019s algorithm against unified structures. In: Patra, A. (ed.) CT-RSA 2025. LNCS, vol. 15598, pp. 99\u2013122. Springer, Cham (2025). https:\/\/doi.org\/10.1007\/978-3-031-88661-4_5"},{"key":"8_CR32","doi-asserted-by":"publisher","unstructured":"Wu, W., Zhang, L.: LBlock: a lightweight block cipher. In: Lopez, J., Tsudik, G. (eds.) ACNS 2011. LNCS, vol. 6715, pp. 327\u2013344. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-21554-4_19","DOI":"10.1007\/978-3-642-21554-4_19"},{"key":"8_CR33","doi-asserted-by":"publisher","unstructured":"Xiang, Z., et al.: Links between quantum distinguishers based on Simon\u2019s algorithm and truncated differentials. IACR Trans. Symmetric Cryptol. 2024(2), 296\u2013321 (2024). https:\/\/doi.org\/10.46586\/TOSC.V2024.I2.296-321","DOI":"10.46586\/TOSC.V2024.I2.296-321"},{"key":"8_CR34","doi-asserted-by":"publisher","unstructured":"Xu, Y., Du, X., Jia, M., Wang, X., Zou, J.: Quantum attacks on generalized Feistel networks based on the strong-weak separability. Quantum Inf. Process. 22(10), 375 (2023). https:\/\/doi.org\/10.1007\/S11128-023-04135-6","DOI":"10.1007\/S11128-023-04135-6"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 ASIACRYPT 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-5125-5_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,7]],"date-time":"2025-12-07T11:42:24Z","timestamp":1765107744000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-5125-5_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,8]]},"ISBN":["9789819551248","9789819551255"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-5125-5_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,8]]},"assertion":[{"value":"8 December 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ASIACRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on the Theory and Application of Cryptology and Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Melbourne, VIC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 December 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"asiacrypt2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/asiacrypt.iacr.org\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}