{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,12,17]],"date-time":"2023-12-17T03:36:12Z","timestamp":1702784172702},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2013,7,17]],"date-time":"2013-07-17T00:00:00Z","timestamp":1374019200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cryptol"],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1007\/s00145-013-9156-7","type":"journal-article","created":{"date-parts":[[2013,7,16]],"date-time":"2013-07-16T19:30:07Z","timestamp":1374003007000},"page":"772-798","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Improved Cryptanalysis of AES-like Permutations"],"prefix":"10.1007","volume":"27","author":[{"given":"J\u00e9r\u00e9my","family":"Jean","sequence":"first","affiliation":[]},{"given":"Mar\u00eda","family":"Naya-Plasencia","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Peyrin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,7,17]]},"reference":[{"key":"9156_CR1","doi-asserted-by":"crossref","first-page":"1384","DOI":"10.1007\/978-1-4419-5906-5_626","volume-title":"Encyclopedia of Cryptography and Security","author":"P.S.L.M. Barreto","year":"2011","unstructured":"P.S.L.M. Barreto, V. Rijmen, Whirlpool, in Encyclopedia of Cryptography and Security, ed. by H.C.A. van Tilborg, S. Jajodia, 2nd edn. (Springer, Berlin, 2011), pp. 1384\u20131385","edition":"2"},{"key":"9156_CR2","unstructured":"R. Benadjila, O. Billet, H. Gilbert, G. Macario-Rat, T. Peyrin, M. Robshaw, Y. Seurin, SHA-3, proposal: ECHO. Submission to NIST (updated) (2009)"},{"key":"9156_CR3","series-title":"LNCS","first-page":"252","volume-title":"FSE","author":"C. Boura","year":"2011","unstructured":"C. Boura, A. Canteaut, C.D. Canni\u00e8re, Higher-order differential properties of Keccakand Luffa, in FSE. LNCS, vol.\u00a06733 (Springer, Berlin, 2011), pp. 252\u2013269"},{"key":"9156_CR4","first-page":"343","volume-title":"AESCandidate Conference","author":"J. Daemen","year":"2000","unstructured":"J. Daemen, V. Rijmen, Rijndael for AES, in AES Candidate Conference (2000), pp. 343\u2013348"},{"key":"9156_CR5","unstructured":"P. Gauravaram, L.R. Knudsen, K. Matusiewicz, F. Mendel, C. Rechberger, M. Schl\u00e4ffer, S.S. Thomsen, Gr\u00f8stl\u2014a SHA-3candidate. Submitted to the SHA-3competition, NIST (2008)"},{"key":"9156_CR6","unstructured":"P. Gauravaram, L.R. Knudsen, K. Matusiewicz, F. Mendel, C. Rechberger, M. Schl\u00e4ffer, S.S. Thomsen, Gr\u00f8stl\u2014a SHA-3candidate (Updated version). Submitted to the SHA-3competition (2011)"},{"key":"9156_CR7","series-title":"FSE","first-page":"365","volume-title":"Lecture Notes in Computer Science","author":"H. Gilbert","year":"2010","unstructured":"H. Gilbert, T. Peyrin, Super-sbox cryptanalysis: improved attacks for AES-like permutations, in Lecture Notes in Computer Science, FSE, vol.\u00a06147, ed. by S. Hong, T. Iwata (Springer, Berlin, 2010), pp.\u00a0365\u2013383"},{"key":"9156_CR8","series-title":"CRYPTO","first-page":"222","volume-title":"Lecture Notes in Computer Science","author":"J. Guo","year":"2011","unstructured":"J. Guo, T. Peyrin, A. Poschmann, The PHOTONfamily of lightweight hash functions, in Lecture Notes in Computer Science, CRYPTO, vol.\u00a06841, ed. by P. Rogaway (Springer, Berlin, 2011), pp. 222\u2013239"},{"key":"9156_CR9","series-title":"CHES","first-page":"326","volume-title":"Lecture Notes in Computer Science.","author":"J. Guo","year":"2011","unstructured":"J. Guo, T. Peyrin, A. Poschmann, M.J.B. Robshaw, The LEDblock cipher, in Lecture Notes in Computer Science., CHES, vol.\u00a06917, ed. by B. Preneel, T. Takagi (Springer, Berlin, 2011), pp. 326\u2013341"},{"key":"9156_CR10","series-title":"FSE","first-page":"107","volume-title":"Lecture Notes in Computer Science","author":"J. Jean","year":"2011","unstructured":"J. Jean, P.A. Fouque, Practical near-collisions and collisions on round-reduced ECHO-256 compression function, in Lecture Notes in Computer Science, FSE, vol.\u00a06733, ed. by A. Joux (Springer, Berlin, 2011), pp. 107\u2013127"},{"key":"9156_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-642-28496-0_2","volume-title":"Selected Areas in Cryptography","author":"J. Jean","year":"2011","unstructured":"J. Jean, M. Naya-Plasencia, M. Schl\u00e4ffer, Improved analysis of ECHO-256, in Selected Areas in Cryptography, ed. by A. Miri, S. Vaudenay. Lecture Notes in Computer Science, vol.\u00a07118 (Springer, Berlin, 2011), pp. 19\u201336"},{"key":"9156_CR12","series-title":"FSE","first-page":"110","volume-title":"Lecture Notes in Computer Science","author":"J. Jean","year":"2012","unstructured":"J. Jean, M. Naya-Plasencia, T. Peyrin, Improved rebound attack on the finalist Gr\u00f8stl, in Lecture Notes in Computer Science, FSE, vol.\u00a07549, ed. by A. Canteaut (Springer, Berlin, 2012), pp. 110\u2013126"},{"key":"9156_CR13","series-title":"FSE","first-page":"196","volume-title":"Lecture Notes in Computer Science","author":"L.R. Knudsen","year":"1994","unstructured":"L.R. Knudsen, Truncated and higher order differentials, in Lecture Notes in Computer Science, FSE, vol.\u00a01008, ed. by B. Preneel (Springer, Berlin, 1994), pp. 196\u2013211"},{"key":"9156_CR14","doi-asserted-by":"crossref","unstructured":"M. Lamberger, F. Mendel, C. Rechberger, V. Rijmen, M. Schl\u00e4ffer, Rebound Distinguishers: Results on the Full Whirlpool Compression Function. [15] 126\u2013143","DOI":"10.1007\/978-3-642-10366-7_8"},{"key":"9156_CR15","unstructured":"M. Matsui (ed.), Advances in cryptology\u2014ASIACRYPT 2009, 15th international conference on the theory and application of cryptology and information security, Tokyo, Japan, December 6\u201310 (2009). Proceedings, in Lecture Notes in Computer Science, ASIACRYPT, vol.\u00a05912, ed. by M. Matsui (Springer, Berlin, 2009)"},{"key":"9156_CR16","doi-asserted-by":"crossref","unstructured":"K. Matusiewicz, M. Naya-Plasencia, I. Nikolic, Y. Sasaki, M. Schl\u00e4ffer, Rebound Attack on the Full LANECompression Function. [15] 106\u2013125","DOI":"10.1007\/978-3-642-10366-7_7"},{"key":"9156_CR17","series-title":"Lecture Notes in Computer Science.","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-642-05445-7_2","volume-title":"Selected Areas in Cryptography","author":"F. Mendel","year":"2009","unstructured":"F. Mendel, T. Peyrin, C. Rechberger, M. Schl\u00e4ffer, Improved cryptanalysis of the reduced Gr\u00f8stlcompression function, ECHOpermutation and AESblock cipher, in Selected Areas in Cryptography, ed. by M.J. Jacobson Jr., V. Rijmen, R. Safavi-Naini. Lecture Notes in Computer Science., vol.\u00a05867 (Springer, Berlin, 2009), pp. 16\u201335"},{"key":"9156_CR18","series-title":"Lecture Notes in Computer Science.","volume-title":"Fast Software Encryption\u2014FSE 2009","author":"F. Mendel","year":"2009","unstructured":"F. Mendel, C. Rechberger, M. Schl\u00e4ffer, S.S. Thomsen, The rebound attack: cryptanalysis of reduced Whirlpooland Gr\u00f8stl, in Fast Software Encryption\u2014FSE 2009. Lecture Notes in Computer Science., vol.\u00a05665 (Springer, Berlin, 2009)"},{"key":"9156_CR19","series-title":"CT-RSA","first-page":"350","volume-title":"Lecture Notes in Computer Science","author":"F. Mendel","year":"2010","unstructured":"F. Mendel, C. Rechberger, M. Schl\u00e4ffer, S.S. Thomsen, Rebound attacks on the reduced Gr\u00f8stlhash function, in Lecture Notes in Computer Science, CT-RSA vol.\u00a05985, ed. by J. Pieprzyk (Springer, Berlin, 2010), pp. 350\u2013365"},{"key":"9156_CR20","unstructured":"M. Naya-Plasencia, How to Improve Rebound Attacks. Cryptology ePrint Archive, Report 2010\/607 (extended version) (2010)"},{"key":"9156_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"188","DOI":"10.1007\/978-3-642-22792-9_11","volume-title":"Advances in Cryptology: CRYPTO 2011","author":"M. Naya-Plasencia","year":"2011","unstructured":"M. Naya-Plasencia, How to improve rebound attacks, in Advances in Cryptology: CRYPTO 2011. Lecture Notes in Computer Science, vol.\u00a06841 (Springer, Berlin, 2011), pp. 188\u2013205"},{"key":"9156_CR22","series-title":"ICISC","first-page":"29","volume-title":"Lecture Notes in Computer Science","author":"I. Nikolic","year":"2010","unstructured":"I. Nikolic, J. Pieprzyk, P. Sokolowski, R. Steinfeld, Known and chosen key differential distinguishers for block ciphers, in Lecture Notes in Computer Science, ICISC, vol.\u00a06829, ed. by K.H. Rhee, D. Nyang (Springer, Berlin, 2010), pp. 29\u201348"},{"key":"9156_CR23","series-title":"ASIACRYPT","first-page":"551","volume-title":"Lecture Notes in Computer Science","author":"T. Peyrin","year":"2007","unstructured":"T. Peyrin, Cryptanalysis of Grindahl, in Lecture Notes in Computer Science, ASIACRYPT, vol.\u00a04833, ed. by K. Kurosawa (Springer, Berlin, 2007), pp. 551\u2013567"},{"key":"9156_CR24","series-title":"CRYPTO","first-page":"370","volume-title":"Lecture Notes in Computer Science","author":"T. Peyrin","year":"2010","unstructured":"T. Peyrin, Improved differential attacks for ECHOand Gr\u00f8stl, in Lecture Notes in Computer Science, CRYPTO, vol.\u00a06223, ed. by T. Rabin (Springer, Berlin, 2010), pp. 370\u2013392"},{"key":"9156_CR25","series-title":"ASIACRYPT","first-page":"38","volume-title":"Lecture Notes in Computer Science","author":"Y. Sasaki","year":"2010","unstructured":"Y. Sasaki, Y. Li, L. Wang, K. Sakiyama, K. Ohta, Non-full-active super-sbox analysis: applications to ECHOand Gr\u00f8stl, in Lecture Notes in Computer Science, ASIACRYPT, vol.\u00a06477, ed. by M. Abe (Springer, Berlin, 2010), pp. 38\u201355"},{"key":"9156_CR26","series-title":"EUROCRYPT","first-page":"19","volume-title":"Lecture Notes in Computer Science","author":"X. Wang","year":"2005","unstructured":"X. Wang, H. Yu, How to break MD5and other hash functions, in Lecture Notes in Computer Science, EUROCRYPT vol.\u00a03494, ed. by R. Cramer (Springer, Berlin, 2005), pp. 19\u201335"},{"key":"9156_CR27","series-title":"CRYPTO","first-page":"17","volume-title":"Lecture Notes in Computer Science","author":"X. Wang","year":"2005","unstructured":"X. Wang, Y.L. Yin, H. Yu, Finding collisions in the full SHA-1, in Lecture Notes in Computer Science, CRYPTO vol.\u00a03621, ed. by V. Shoup (Springer, Berlin, 2005), pp. 17\u201336"}],"container-title":["Journal of Cryptology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-013-9156-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00145-013-9156-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-013-9156-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-013-9156-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,30]],"date-time":"2020-07-30T23:36:37Z","timestamp":1596152197000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00145-013-9156-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7,17]]},"references-count":27,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2014,10]]}},"alternative-id":["9156"],"URL":"https:\/\/doi.org\/10.1007\/s00145-013-9156-7","relation":{},"ISSN":["0933-2790","1432-1378"],"issn-type":[{"value":"0933-2790","type":"print"},{"value":"1432-1378","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,7,17]]},"assertion":[{"value":"27 July 2012","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 July 2013","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}