{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T12:59:34Z","timestamp":1772283574554,"version":"3.50.1"},"reference-count":15,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2013,11,22]],"date-time":"2013-11-22T00:00:00Z","timestamp":1385078400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cryptol"],"published-print":{"date-parts":[[2015,4]]},"DOI":"10.1007\/s00145-013-9163-8","type":"journal-article","created":{"date-parts":[[2013,11,21]],"date-time":"2013-11-21T16:45:40Z","timestamp":1385052340000},"page":"240-256","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Efficient Recursive Diffusion Layers for Block Ciphers and Hash Functions"],"prefix":"10.1007","volume":"28","author":[{"given":"Mahdi","family":"Sajadieh","sequence":"first","affiliation":[]},{"given":"Mohammad","family":"Dakhilalian","sequence":"additional","affiliation":[]},{"given":"Hamid","family":"Mala","sequence":"additional","affiliation":[]},{"given":"Pouyan","family":"Sepehrdad","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,11,22]]},"reference":[{"key":"9163_CR1","unstructured":"D.J. Bernstein, The Salsa20 Stream Cipher (2005). \n                    http:\/\/www.ecrypt.eu.org\/stream\/salsa20p2.html"},{"key":"9163_CR2","series-title":"Lecture Notes in Computer Science","first-page":"2","volume-title":"CRYPTO\u201990","author":"E. Biham","year":"1990","unstructured":"E. Biham, A. Shamir, Differential Cryptanalysis of DES-Like Cryptosystems, in CRYPTO\u201990. Lecture Notes in Computer Science, vol.\u00a0537 (Springer, Berlin, 1990), pp. 2\u201321"},{"key":"9163_CR3","unstructured":"J. Daemen, Cipher and Hash function design strategies based on linear and differential cryptanalysis. Ph.D. thesis, Elektrotechniek Katholieke Universiteit Leuven, Belgium (1995)"},{"key":"9163_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The Design of Rijndael: AES\u2014The Advanced Encryption Standard","author":"J. Daemen","year":"2002","unstructured":"J. Daemen, V. Rijmen, The Design of Rijndael: AES\u2014The Advanced Encryption Standard (Springer, Berlin, 2002)"},{"key":"9163_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1007\/978-3-642-22792-9_13","volume-title":"CRYPTO\u201911","author":"J. Guo","year":"2011","unstructured":"J. Guo, T. Peyrin, A. Poschmann, The PHOTON family of lightweight Hash functions, in CRYPTO\u201911. Lecture Notes in Computer Science, vol.\u00a06841 (Springer, Berlin, 2011), pp. 222\u2013239"},{"key":"9163_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"326","DOI":"10.1007\/978-3-642-23951-9_22","volume-title":"CHES\u201911","author":"J. Guo","year":"2011","unstructured":"J. Guo, T. Peyrin, A. Poschmann, M. Robshaw, The LED block cipher, in CHES\u201911. Lecture Notes in Computer Science, vol.\u00a06917 (Springer, Berlin, 2011), pp. 326\u2013341"},{"key":"9163_CR7","volume-title":"Error control coding: fundamentals and applications","author":"S. Lin","year":"2004","unstructured":"S. Lin, D. Costello, Error control coding: fundamentals and applications (Prentice Hall, New York, 2004)"},{"key":"9163_CR8","series-title":"Lecture Notes in Computer Science","first-page":"386","volume-title":"EUROCRYPT\u201993","author":"M. Matsui","year":"1993","unstructured":"M. Matsui, Linear cryptanalysis method for DES cipher, in EUROCRYPT\u201993. Lecture Notes in Computer Science, vol.\u00a0765 (Springer, Berlin, 1993), pp. 386\u2013397"},{"key":"9163_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1007\/3-540-44983-3_6","volume-title":"SAC\u201901","author":"K. Ohkuma","year":"2001","unstructured":"K. Ohkuma, H. Muratani, F. Sano, S. Kawamura, The block cipher hierocrypt, in SAC\u201901. Lecture Notes in Computer Science, vol.\u00a02012 (Springer, Berlin, 2001), pp. 72\u201388"},{"issue":"1","key":"9163_CR10","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1049\/iet-ifs.2010.0289","volume":"5","author":"M. Sajadieh","year":"2011","unstructured":"M. Sajadieh, M. Dakhilalian, H. Mala, Perfect involutory diffusion layers based on invertibility of some linear functions. IET Inf. Secur. J.\n                  5(1), 228\u2013236 (2011)","journal-title":"IET Inf. Secur. J."},{"key":"9163_CR11","series-title":"Lecture Notes in Computer Science","first-page":"47","volume-title":"EUROCRYPT\u201994","author":"C. Schnorr","year":"1994","unstructured":"C. Schnorr, S. Vaudenay, Black box cryptoanalysis of Hash networks based on multipermutations, in EUROCRYPT\u201994. Lecture Notes in Computer Science, vol.\u00a0950 (Springer, Berlin, 1994), pp. 47\u201357"},{"key":"9163_CR12","series-title":"Lecture Notes in Computer Science","first-page":"286","volume-title":"FSE\u201994","author":"S. Vaudenay","year":"1994","unstructured":"S. Vaudenay, On the need for multipermutations: cryptanalysis of MD4 and SAFER, in FSE\u201994. Lecture Notes in Computer Science, vol.\u00a01008 (Springer, Berlin, 1994), pp. 286\u2013297"},{"key":"9163_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1007\/978-3-642-05445-7_15","volume-title":"SAC\u201909","author":"M. Wang","year":"2009","unstructured":"M. Wang, J. Nakahara, Y. Sun, Cryptanalysis of the full MMB block cipher, in SAC\u201909. Lecture Notes in Computer Science, vol.\u00a05867 (Springer, Berlin, 2009), pp. 231\u2013248"},{"key":"9163_CR14","unstructured":"H. Wu, The Hash Function JH (2008). \n                    http:\/\/icsd.i2r.astar.edu.sg\/staff\/hongjun\/jh\/jh.pdf"},{"key":"9163_CR15","series-title":"Science in China Series F-Information Sciences","first-page":"359","volume-title":"A Trinomial Type of \u03c3-LFSR Oriented Toward Software Implementation","author":"G. Zeng","year":"2007","unstructured":"G. Zeng, K. He, W. Han, A Trinomial Type of\n                  \u03c3-LFSR Oriented Toward Software Implementation. Science in China Series F-Information Sciences, vol.\u00a050 (Springer, Berlin, 2007), pp. 359\u2013372"}],"container-title":["Journal of Cryptology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-013-9163-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00145-013-9163-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-013-9163-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-013-9163-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,8]],"date-time":"2020-04-08T08:13:54Z","timestamp":1586333634000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00145-013-9163-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11,22]]},"references-count":15,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2015,4]]}},"alternative-id":["9163"],"URL":"https:\/\/doi.org\/10.1007\/s00145-013-9163-8","relation":{},"ISSN":["0933-2790","1432-1378"],"issn-type":[{"value":"0933-2790","type":"print"},{"value":"1432-1378","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,11,22]]},"assertion":[{"value":"27 August 2012","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 November 2013","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}