{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T02:48:10Z","timestamp":1764557290630},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2013,12,13]],"date-time":"2013-12-13T00:00:00Z","timestamp":1386892800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cryptol"],"published-print":{"date-parts":[[2015,7]]},"DOI":"10.1007\/s00145-013-9175-4","type":"journal-article","created":{"date-parts":[[2013,12,12]],"date-time":"2013-12-12T19:53:50Z","timestamp":1386878030000},"page":"718-744","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":28,"title":["Reflection Cryptanalysis of PRINCE-Like Ciphers"],"prefix":"10.1007","volume":"28","author":[{"given":"Hadi","family":"Soleimany","sequence":"first","affiliation":[]},{"given":"C\u00e9line","family":"Blondeau","sequence":"additional","affiliation":[]},{"given":"Xiaoli","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Wenling","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Kaisa","family":"Nyberg","sequence":"additional","affiliation":[]},{"given":"Huiling","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yanfeng","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,12,13]]},"reference":[{"key":"9175_CR1","unstructured":"F. Abed, E. List, S. Lucks, On the Security of the Core of PRINCE Against Biclique and Differential Cryptanalysis. Cryptology ePrint Archive, Report 2012\/712 (2012). \n                    http:\/\/eprint.iacr.org\/"},{"key":"9175_CR2","unstructured":"P.S.L.M. Barreto, V. Rijmen, The ANUBIS Block Cipher. Submission to the NESSIE project (2000). \n                    http:\/\/www.larc.usp.br\/~pbarreto\/AnubisPage.html"},{"key":"9175_CR3","unstructured":"P.S.L.M. Barreto, V. Rijmen, The KHAZAD Legacy-level Block Cipher. Submission to the NESSIE project (2000). \n                    http:\/\/www.larc.usp.br\/~pbarreto\/KhazadPage.html"},{"issue":"4","key":"9175_CR4","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/BF00203965","volume":"7","author":"E. Biham","year":"1994","unstructured":"E. Biham, New types of cryptanalytic attacks using related keys. J. Cryptol.\n                  7(4), 229\u2013246 (1994)","journal-title":"J. Cryptol."},{"key":"9175_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1007\/3-540-48519-8_18","volume-title":"FSE 1999","author":"A. Biryukov","year":"1999","unstructured":"A. Biryukov, D. Wagner, Slide attacks, in FSE 1999, ed. by L.R. Knudsen. Lecture Notes in Computer Science, vol.\u00a01636 (Springer, Berlin, 1999), pp.\u00a0245\u2013259"},{"issue":"1\u20133","key":"9175_CR6","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s10623-010-9452-2","volume":"59","author":"C. Blondeau","year":"2011","unstructured":"C. Blondeau, B. G\u00e9rard, J.-P. Tillich, Accurate estimates of the data complexity and success probability for various cryptanalyses. Des. Codes Cryptogr.\n                  59(1\u20133), 3\u201334 (2011)","journal-title":"Des. Codes Cryptogr."},{"key":"9175_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1007\/978-3-642-34961-4_14","volume-title":"ASIACRYPT 2012","author":"J. Borghoff","year":"2012","unstructured":"J. Borghoff, A. Canteaut, T. G\u00fcneysu, E. Bilge Kavun, M. Knezevic, L.R. Knudsen, G. Leander, V.\u00a0Nikov, C. Paar, C. Rechberger, P. Rombouts, S.S. Thomsen, T. Yal\u00e7in, PRINCE\u2014a low-latency block cipher for pervasive computing applications\u2014extended abstract, in ASIACRYPT 2012, ed. by X.\u00a0Wang, K. Sako. Lecture Notes in Computer Science, vol.\u00a07658 (Springer, Berlin, 2012), pp.\u00a0208\u2013225"},{"key":"9175_CR8","unstructured":"J. Borghoff, A. Canteaut, T. G\u00fcneysu, E. Bilge Kavun, M. Knezevic, L.R. Knudsen, G. Leander, V.\u00a0Nikov, C. Paar, C. Rechberger, P. Rombouts, S.S. Thomsen, T. Yal\u00e7in, PRINCE\u2014A Low-latency Block Cipher for Pervasive Computing Applications (Full version). Cryptology ePrint Archive, Report 2012\/529 (2012). \n                    http:\/\/eprint.iacr.org\/"},{"key":"9175_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1007\/978-3-642-13858-4_20","volume-title":"FSE 2010","author":"C. Bouillaguet","year":"2010","unstructured":"C. Bouillaguet, O. Dunkelman, G. Leurent, P.-A. Fouque, Another look at complementation properties, in FSE 2010, ed. by S. Hong, T. Iwata. Lecture Notes in Computer Science, vol.\u00a06147 (Springer, Berlin, 2010), pp.\u00a0347\u2013364"},{"key":"9175_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1007\/978-3-642-40041-4_13","volume-title":"CRYPTO 2013","author":"A. Canteaut","year":"2013","unstructured":"A. Canteaut, M. Naya-Plasencia, B. Vayssi\u00e8re, Sieve-in-the-middle: improved MITM attacks, in CRYPTO 2013, ed. by R. Canetti, J.A. Garay. Lecture Notes in Computer Science, vol.\u00a08042 (Springer, Berlin, 2013), pp. 222\u2013240"},{"key":"9175_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"535","DOI":"10.1007\/3-540-39799-X_42","volume-title":"CRYPTO 1985","author":"D. Coppersmith","year":"1986","unstructured":"D. Coppersmith, The real reason for rivest\u2019s phenomenon, in CRYPTO 1985, ed. by H.C. Williams. Lecture Notes in Computer Science, vol.\u00a0218 (Springer, Berlin, 1986), pp.\u00a0535\u2013536"},{"key":"9175_CR12","unstructured":"I. Dinur, O. Dunkelman, N. Keller, A. Shamir, An Improved Attack on 4-Round Even\u2013Mansour with 2 Alternating Keys. Rump session of CRYPTO 2013 (2013)"},{"key":"9175_CR13","unstructured":"I. Dinur, O. Dunkelman, N. Keller, A. Shamir, Key Recovery Attacks on 3-round Even\u2013Mansour, 8-step LED-128, and Full AES2. Cryptology ePrint Archive, Report 2013\/391 (2013). \n                    http:\/\/eprint.iacr.org\/\n                    \n                  , extended version of ASIACRYPT 2013"},{"key":"9175_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1007\/978-3-642-34047-5_2","volume-title":"FSE 2012","author":"I. Dinur","year":"2012","unstructured":"I. Dinur, O. Dunkelman, A. Shamir, Improved attacks on full GOST, in FSE 2012, ed. by A. Canteaut. Lecture Notes in Computer Science, vol.\u00a07549 (Springer, Berlin, 2012), pp. 9\u201328"},{"key":"9175_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"336","DOI":"10.1007\/978-3-642-29011-4_21","volume-title":"EUROCRYPT","author":"O. Dunkelman","year":"2012","unstructured":"O. Dunkelman, N. Keller, A. Shamir, Minimalism in cryptography: the even\u2013mansour scheme revisited, in EUROCRYPT, ed. by D. Pointcheval, T. Johansson. Lecture Notes in Computer Science, vol.\u00a07237 (Springer, Berlin, 2012), pp.\u00a0336\u2013354"},{"key":"9175_CR16","series-title":"Lecture Notes in Computer Science","first-page":"210","volume-title":"ASIACRYPT","author":"E. Shimon","year":"1991","unstructured":"E. Shimon, Y. Mansour, A construction of a cipher from a single pseudorandom permutation, in ASIACRYPT, ed. by H. Imai, R.L. Rivest, T. Matsumoto. Lecture Notes in Computer Science, vol.\u00a0739 (Springer, Berlin, 1991), pp. 210\u2013224"},{"key":"9175_CR17","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511801655","volume-title":"Analytic Combinatorics","author":"P. Flajolet","year":"2009","unstructured":"P. Flajolet, R. Sedgewick, Analytic Combinatorics (Cambridge University Press, Cambridge, 2009)"},{"key":"9175_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"326","DOI":"10.1007\/978-3-642-23951-9_22","volume-title":"CHES 2011","author":"J. Guo","year":"2011","unstructured":"J. Guo, T. Peyrin, A. Poschmann, M.J.B. Robshaw, The LED block cipher, in CHES 2011, ed. by B.\u00a0Preneel, T. Takagi. Lecture Notes in Computer Science, vol.\u00a06917 (Springer, Berlin, 2011), pp.\u00a0326\u2013341"},{"key":"9175_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"290","DOI":"10.1007\/978-3-642-21702-9_17","volume-title":"FSE 2011","author":"T. Isobe","year":"2011","unstructured":"T. Isobe, A single-key attack on the full GOST block cipher, in FSE 2011, ed. by A. Joux. Lecture Notes in Computer Science, vol.\u00a06733 (Springer, Berlin, 2011), pp.\u00a0290\u2013305"},{"key":"9175_CR20","volume-title":"FSE 2013","author":"J. Jean","year":"2013","unstructured":"J. Jean, I. Nikolic, T. Peyrin, L. Wang, S. Wu, Security analysis of PRINCE, in FSE 2013 ed. by S.\u00a0Moriai (2013 to appear)"},{"key":"9175_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1007\/978-3-540-89754-5_23","volume-title":"INDOCRYPT 2008","author":"K. Orhun","year":"2008","unstructured":"K. Orhun, Reflection cryptanalysis of some ciphers, in INDOCRYPT 2008, ed. by D.R. Chowdhury, V.\u00a0Rijmen, A. Das. Lecture Notes in Computer Science, vol.\u00a05365 (Springer, Berlin, 2008), pp.\u00a0294\u2013307"},{"key":"9175_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1007\/978-3-540-74619-5_11","volume-title":"FSE 2007","author":"O. Kara","year":"2007","unstructured":"O. Kara, C. Manap, A new class of weak keys for blowfish, in FSE 2007, ed. by A. Biryukov. Lecture Notes in Computer Science, vol.\u00a04593 (Springer, Berlin, 2007), pp.\u00a0167\u2013180"},{"key":"9175_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"252","DOI":"10.1007\/3-540-68697-5_20","volume-title":"CRYPTO 1996","author":"J. Kilian","year":"1996","unstructured":"J. Kilian, P. Rogaway, How to protect DES against exhaustive key search, in CRYPTO 1996, ed. by N.\u00a0Koblitz. Lecture Notes in Computer Science, vol.\u00a01109 (Springer, Berlin, 1996), pp. 252\u2013267"},{"key":"9175_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1007\/978-3-642-15031-9_2","volume-title":"CHES 2010","author":"L.R. Knudsen","year":"2010","unstructured":"L.R. Knudsen, G. Leander, A. Poschmann, M.J.B. Robshaw, PRINTcipher: a block cipher for IC-printing, in CHES 2010, ed. by S. Mangard, F.-X. Standaert. Lecture Notes in Computer Science, vol.\u00a06225 (Springer, Berlin, 2010), pp.\u00a016\u201332"},{"key":"9175_CR25","volume-title":"WCC 2013","author":"G. Leander","year":"2013","unstructured":"G. Leander, Design and analysis of block cipher\u2014Links to Boolean functions and coding theory (invited talk), in WCC 2013 (2013)"},{"key":"9175_CR26","series-title":"Lecture Notes in Computer Science","first-page":"9","volume-title":"CRYPTO 1986","author":"J.H. Moore","year":"1987","unstructured":"J.H. Moore, G.J. Simmons, Cycle structures of the DES with weak and semi-weak keys, in CRYPTO 1986, ed. by A.M. Odlyzko. Lecture Notes in Computer Science, vol.\u00a0263 (Springer, Berlin, 1987), pp.\u00a09\u201332"},{"key":"9175_CR27","series-title":"Lecture Notes in Computer Science","volume-title":"FSE 2013","author":"I. Nikolic","year":"2013","unstructured":"I. Nikolic, L. Wang, S. Wu, Cryptanalysis of round-reduced LED, in FSE 2013, ed. by S. Moriai. Lecture Notes in Computer Science (2013 to appear)"},{"key":"9175_CR28","series-title":"Lecture Notes in Computer Science","volume-title":"FSE 2013","author":"H. Soleimany","year":"2013","unstructured":"H. Soleimany, C. Blondeau, X. Yu, W. Wu, K. Nyberg, H. Zhang, L. Zhang, Y. Wang, Reflection cryptanalysis of PRINCE-like ciphers, in FSE 2013, ed. by S. Moriai. Lecture Notes in Computer Science (Springer, Berlin, 2013 to appear)."},{"key":"9175_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1007\/978-3-540-25937-4_18","volume-title":"FSE","author":"F.-X. Standaert","year":"2004","unstructured":"F.-X. Standaert, G. Piret, G. Rouvroy, J.-J. Quisquater, J.-D. Legat, ICEBERG: an involutional cipher efficient for block encryption in reconfigurable hardware, in FSE, ed. by B.K. Roy, W. Meier. Lecture Notes in Computer Science, vol.\u00a03017 (Springer, Berlin, 2004), pp.\u00a0279\u2013299"}],"container-title":["Journal of Cryptology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-013-9175-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00145-013-9175-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-013-9175-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-013-9175-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,8]],"date-time":"2020-04-08T08:15:13Z","timestamp":1586333713000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00145-013-9175-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12,13]]},"references-count":29,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2015,7]]}},"alternative-id":["9175"],"URL":"https:\/\/doi.org\/10.1007\/s00145-013-9175-4","relation":{},"ISSN":["0933-2790","1432-1378"],"issn-type":[{"value":"0933-2790","type":"print"},{"value":"1432-1378","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,12,13]]},"assertion":[{"value":"27 April 2013","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 December 2013","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}