{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T12:49:21Z","timestamp":1770900561590,"version":"3.50.1"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2016,10,7]],"date-time":"2016-10-07T00:00:00Z","timestamp":1475798400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cryptol"],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1007\/s00145-016-9237-5","type":"journal-article","created":{"date-parts":[[2016,10,7]],"date-time":"2016-10-07T19:49:42Z","timestamp":1475869782000},"page":"859-888","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":55,"title":["Differential-Linear Cryptanalysis Revisited"],"prefix":"10.1007","volume":"30","author":[{"given":"C\u00e9line","family":"Blondeau","sequence":"first","affiliation":[]},{"given":"Gregor","family":"Leander","sequence":"additional","affiliation":[]},{"given":"Kaisa","family":"Nyberg","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,7]]},"reference":[{"key":"9237_CR1","unstructured":"R. Anderson, E. Biham, L.R. Knudsen. Serpent: A Proposal for the Advanced Encryption Standard. NIST AES Proposal, 1998"},{"key":"9237_CR2","unstructured":"T. Baign\u00e8res, Quantitative Security of Block Ciphers: Designs and Cryptanalysis Tools. PhD thesis, \u00c9cole polytechnique f\u00e9d\u00e9rale de Lausanne, 2008"},{"key":"9237_CR3","doi-asserted-by":"crossref","unstructured":"E. Biham, A. Biryukov, A. Shamir, Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials, in J. Stern, editor, EUROCRYPT. LNCS, vol. 1592 (Springer, 1999), pp. 12\u201323","DOI":"10.1007\/3-540-48910-X_2"},{"key":"9237_CR4","doi-asserted-by":"crossref","unstructured":"E. Biham, O. Dunkelman, N. Keller, The Rectangle Attack - Rectangling the Serpent, in B. Pfitzmann, editor, EUROCRYPT. LNCS, vol. 2045 (Springer, 2001), pp. 340\u2013357","DOI":"10.1007\/3-540-44987-6_21"},{"key":"9237_CR5","doi-asserted-by":"crossref","unstructured":"E. Biham, O. Dunkelman, N. Keller, Enhancing Differential-Linear Cryptanalysis, in Y. Zheng, editor, ASIACRYPT. LNCS, vol. 2501 (Springer, 2002), pp. 254\u2013266","DOI":"10.1007\/3-540-36178-2_16"},{"key":"9237_CR6","doi-asserted-by":"crossref","unstructured":"E. Biham, O. Dunkelman, N. Keller, Differential-Linear Cryptanalysis of Serpent, in T. Johansson, editor, FSE. LNCS, vol. 2887 (Springer, 2003), pp. 9\u201321","DOI":"10.1007\/978-3-540-39887-5_2"},{"key":"9237_CR7","doi-asserted-by":"crossref","unstructured":"E. Biham, O. Dunkelman, N. Keller, New Combined Attacks on Block Ciphers, in H. Handschuh, H. Gilbert, editors, FSE. LNCS, vol. 3557 (Springer, 2005), pp. 126\u2013144","DOI":"10.1007\/11502760_9"},{"key":"9237_CR8","doi-asserted-by":"crossref","unstructured":"E. Biham, A. Shamir, Differential Cryptanalysis of DES-like Cryptosystems, in A. Menezes, S.A. Vanstone, editors, CRYPTO. LNCS, vol. 537 (Springer, 1990), pp. 2\u201321","DOI":"10.1007\/3-540-38424-3_1"},{"key":"9237_CR9","doi-asserted-by":"crossref","unstructured":"A. Biryukov, C. De Canni\u00e8re, M. Quisquater, On Multiple Linear Approximations, in M.K. Franklin, editor, CRYPTO. LNCS, vol. 3152 (Springer, 2004), pp. 1\u201322","DOI":"10.1007\/978-3-540-28628-8_1"},{"key":"9237_CR10","doi-asserted-by":"crossref","unstructured":"C. Blondeau, Improbable differential from impossible differential: On the validity of the model, in G. Paul, S. Vaudenay, editors, INDOCRYPT 2013. LNCS, vol. 8250 (Springer, 2013), pp. 149\u2013160","DOI":"10.1007\/978-3-319-03515-4_10"},{"key":"9237_CR11","doi-asserted-by":"crossref","unstructured":"C. Blondeau, G. Leander, K. Nyberg, Differential-Linear Cryptanalysis Revisited, in C. Cid, C. Rechberger, editors, FSE 2014. LNCS, vol. 8540 (Springer, 2015), pp 411\u2013430","DOI":"10.1007\/978-3-662-46706-0_21"},{"key":"9237_CR12","doi-asserted-by":"crossref","unstructured":"C. Blondeau, K. Nyberg, New Links between Differential and Linear Cryptanalysis, in T. Johansson, P.Q. Nguyen, editors, EUROCRYPT. LNCS, vol. 7881 (Springer, 2013), pp. 388\u2013404","DOI":"10.1007\/978-3-642-38348-9_24"},{"key":"9237_CR13","doi-asserted-by":"crossref","unstructured":"C. Blondeau, K. Nyberg, Links Between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities, in E. Oswald, P.Q. Nguyen, editors, Eurocrypt 2014, vol. 8441 (Springer-Verlag, 2014)","DOI":"10.1007\/978-3-642-55220-5_10"},{"key":"9237_CR14","doi-asserted-by":"crossref","unstructured":"A. Bogdanov, C. Boura, V. Rijmen, M. Wang, L. Wen, J. Zhao, Key difference invariant bias in block ciphers, in K. Sako, P. Sarkar, editors, ASIACRYPT (1). LNCS, vol. 8269 (Springer, 2013), pp. 357\u2013376","DOI":"10.1007\/978-3-642-42033-7_19"},{"key":"9237_CR15","doi-asserted-by":"crossref","unstructured":"A. Bogdanov, L.R. Knudsen, G. Leander, C. Paar, A. Poschmann, M.J.B. Robshaw, Y. Seurin, C. Vikkelsoe, PRESENT: An Ultra-Lightweight Block Cipher, in P. Paillier, I. Verbauwhede, editors, CHES. LNCS, vol. 4727 (Springer, 2007), pp. 450\u2013466","DOI":"10.1007\/978-3-540-74735-2_31"},{"key":"9237_CR16","unstructured":"A. Bogdanov, V. Rijmen, Zero-Correlation Linear Cryptanalysis of Block Ciphers. IACR Cryptol. ePrint Arch.\n                           2011, 123 (2011)"},{"key":"9237_CR17","doi-asserted-by":"crossref","unstructured":"A. Bogdanov, V. Rijmen, Linear hulls with correlation zero and linear cryptanalysis of block ciphers. Des. Codes Cryptogr.\n                           70(3), 369\u2013383 (2014)","DOI":"10.1007\/s10623-012-9697-z"},{"key":"9237_CR18","doi-asserted-by":"crossref","unstructured":"C. Carlet, Boolean functions for cryptography and error correcting, in Y. Crama, P.L. Hammer, editors, Boolean Models and Methods in Mathematics, Computer Science, and Engineering (Cambridge University Press, Oxford, 2010), pp. 257\u2013397","DOI":"10.1017\/CBO9780511780448.011"},{"key":"9237_CR19","doi-asserted-by":"crossref","unstructured":"F. Chabaud, S. Vaudenay, Links Between Differential and Linear Cryptanalysis, in A. De Santis, editor, EUROCRYPT. LNCS, vol. 950 (Springer, 1994), pp. 356\u2013365","DOI":"10.1007\/BFb0053450"},{"key":"9237_CR20","doi-asserted-by":"crossref","unstructured":"J.Y. Cho, Linear Cryptanalysis of Reduced-Round PRESENT, in J. Pieprzyk, editor, CT-RSA. LNCS, vol 5985 (Springer, 2010), pp. 302\u2013317","DOI":"10.1007\/978-3-642-11925-5_21"},{"key":"9237_CR21","unstructured":"N. Courtois, CTC2 and fast algebraic attacks on block ciphers revisited. IACR Cryptol. ePrint Arch.\n                           2007, 152 (2007)"},{"key":"9237_CR22","doi-asserted-by":"crossref","unstructured":"J. Daemen, V. Rijmen, The Design of Rijndael: AES\u2014The Advanced Encryption Standard. Springer, 2002.","DOI":"10.1007\/978-3-662-04722-4"},{"key":"9237_CR23","doi-asserted-by":"crossref","unstructured":"C. Dobraunig, M. Eichlseder, F. Mendel, M. Schl\u00e4ffer, Cryptanalysis of Ascon, in K. Nyberg, editor, CT-RSA 2015. LNCS, vol. 9048 (Springer, 2015), pp. 371\u2013387","DOI":"10.1007\/978-3-319-16715-2_20"},{"key":"9237_CR24","doi-asserted-by":"crossref","unstructured":"O. Dunkelman, S. Indesteege, N. Keller, A Differential-Linear Attack on 12-Round Serpent, in D.R. Chowdhury, V. Rijmen, A. Das, editors, INDOCRYPT. LNCS, vol. 5365 (Springer, 2008), pp. 308\u2013321","DOI":"10.1007\/978-3-540-89754-5_24"},{"key":"9237_CR25","doi-asserted-by":"crossref","unstructured":"O. Dunkelman, N. Keller, Cryptanalysis of CTC2, in M. Fischlin, editor, CT-RSA 2009. LNCS, vol. 5473 (Springer, 2009), pp. 226\u2013239","DOI":"10.1007\/978-3-642-00862-7_15"},{"key":"9237_CR26","doi-asserted-by":"crossref","unstructured":"C. Guo, H. Zhang, D. Lin, Estimating Differential-Linear Distinguishers and Applications to CTC2, in J. Lopez, Y. Wu, editors, ISPEC 2015. LNCS, vol. 9065 (Springer, 2015), pp. 220\u2013234","DOI":"10.1007\/978-3-319-17533-1_16"},{"key":"9237_CR27","doi-asserted-by":"crossref","unstructured":"M. Hermelin, J.Y. Cho, K. Nyberg, Multidimensional Extension of Matsui\u2019s Algorithm 2, in O. Dunkelman, editor, FSE. LNCS, vol. 5665 (Springer, 2009), pp. 209\u2013227","DOI":"10.1007\/978-3-642-03317-9_13"},{"key":"9237_CR28","doi-asserted-by":"crossref","unstructured":"T. Huang, I. Tjuawinata, H. Wu, Differential-Linear Cryptanalysis of ICEPOLE, in G. Leander, editor, FSE 2015. LNCS, vol. 9054 (Springer, 2015), pp. 243\u2013263","DOI":"10.1007\/978-3-662-48116-5_12"},{"key":"9237_CR29","doi-asserted-by":"crossref","unstructured":"J. Kelsey, T. Kohno, B. Schneier, Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent, in B. Schneier, editor, FSE. LNCS, vol. 1978 (Springer, 2000), pp. 75\u201393","DOI":"10.1007\/3-540-44706-7_6"},{"key":"9237_CR30","doi-asserted-by":"crossref","unstructured":"L.R. Knudsen, Truncated and Higher Order Differentials, in B. Preneel, editor, FSE. LNCS, vol. 1008 (Springer, 1994), pp. 196\u2013211","DOI":"10.1007\/3-540-60590-8_16"},{"key":"9237_CR31","unstructured":"L.R. Knudsen, DEAL\u2014A 128-bit Block-Cipher. NIST AES Proposal, 1998."},{"key":"9237_CR32","doi-asserted-by":"crossref","unstructured":"X. Lai, Higher Order Derivatives and Differential Cryptanalysis, in R.E. Blahut, D.J. Costello, U. Maurer, T. Mittelholzer, editors, Communications and Cryptography. The Springer International Series in Engineering and Computer Science, vol. 276 (Springer US, 1994), pp. 227\u2013233","DOI":"10.1007\/978-1-4615-2694-0_23"},{"key":"9237_CR33","doi-asserted-by":"crossref","unstructured":"X. Lai, J.L. Massey, S. Murphy, Markov Ciphers and Differential Cryptanalysis, in D.W. Davies, editor, EUROCRYPT. LNCS, vol. 547 (Springer, 1991), pp. 17\u201338","DOI":"10.1007\/3-540-46416-6_2"},{"key":"9237_CR34","unstructured":"S.K. Langford, Differential-Linear Cryptanalysis and Threshold Signatures. Ph.D. Thesis, 1995."},{"key":"9237_CR35","doi-asserted-by":"crossref","unstructured":"S.K. Langford, M.E. Hellman, Differential-Linear Cryptanalysis, in Y. Desmedt, editor, CRYPTO. LNCS, vol. 839 (Springer, 1994), pp. 17\u201325","DOI":"10.1007\/3-540-48658-5_3"},{"key":"9237_CR36","unstructured":"G. Leander, Small Scale Variants Of The Block Cipher PRESENT. IACR Cryptology ePrint Archive, 2010:143, 2010."},{"key":"9237_CR37","doi-asserted-by":"crossref","unstructured":"G. Leurent, Improved Differential-Linear Cryptanalysis of 7-round Chaskey with Partitioning, in M. Fischlin, J.-S. Coron, editors, EUROCRYPT 2016. LNCS, vol. 9665 (Springer, 2016), pp. 344\u2013371","DOI":"10.1007\/978-3-662-49890-3_14"},{"key":"9237_CR38","doi-asserted-by":"crossref","unstructured":"Z. Liu, D. Gu, J. Zhang, W. Li, Differential-Multiple Linear Cryptanalysis, in F. Bao, M. Yung, D. Lin, J. Jing, editors, Inscrypt. LNCS, vol. 6151 (Springer, 2009), pp. 35\u201349","DOI":"10.1007\/978-3-642-16342-5_3"},{"key":"9237_CR39","doi-asserted-by":"crossref","unstructured":"J. Lu, A Methodology for Differential-Linear Cryptanalysis and Its Applications - (Extended Abstract), in A. Canteaut, editor, FSE. LNCS, vol. 7549 (Springer, 2012), pp. 69\u201389","DOI":"10.1007\/978-3-642-34047-5_5"},{"key":"9237_CR40","doi-asserted-by":"crossref","unstructured":"J. Lu, A methodology for differential-linear cryptanalysis and its applications. Des. Codes Cryptogr., 77(1), 11\u201348 (2015)","DOI":"10.1007\/s10623-014-9985-x"},{"key":"9237_CR41","doi-asserted-by":"crossref","unstructured":"M. Matsui, Linear Cryptanalysis Method for DES Cipher, In T. Helleseth, editor, EUROCRYPT. LNCS, vol. 765 (Springer, 1993), pp. 386\u2013397","DOI":"10.1007\/3-540-48285-7_33"},{"key":"9237_CR42","doi-asserted-by":"crossref","unstructured":"J. McLaughlin, J.A. Clark, Filtered nonlinear cryptanalysis of reduced-round Serpent, and the Wrong-Key Randomization Hypothesis. Cryptology ePrint Archive, Report 2013\/089, 2013","DOI":"10.1007\/978-3-642-45239-0_8"},{"key":"9237_CR43","doi-asserted-by":"crossref","unstructured":"P. Morawiecki, K. Gaj, E. Homsirikamol, K. Matusiewicz, J. Pieprzyk, M. Rogawski, M. Srebrny, M. Wojcik, Icepole: High-speed, hardware-oriented authenticated encryption. Cryptology ePrint Archive, Report 2014\/266, 2014. \n                    http:\/\/eprint.iacr.org\/","DOI":"10.1007\/978-3-662-44709-3_22"},{"key":"9237_CR44","doi-asserted-by":"crossref","unstructured":"P.H. Nguyen, H. Wu, H. Wang, Improving the Algorithm 2 in Multidimensional Linear Cryptanalysis, in U. Parampalli, P. Hawkes, editors, ACISP. LNCS, vol. 6812 (Springer, 2011), pp. 61\u201374","DOI":"10.1007\/978-3-642-22497-3_5"},{"key":"9237_CR45","doi-asserted-by":"crossref","unstructured":"K. Nyberg, Linear Approximation of Block Ciphers. In A. De Santis, editor, EUROCRYPT. LNCS, vol. 950 (Springer, 1994), pp. 439\u2013444","DOI":"10.1007\/BFb0053460"},{"key":"9237_CR46","doi-asserted-by":"crossref","unstructured":"A.A. Sel\u00e7uk, On Probability of Success in Linear and Differential Cryptanalysis. J. Cryptol., 21(1), 131\u2013147 (2008)","DOI":"10.1007\/s00145-007-9013-7"},{"key":"9237_CR47","doi-asserted-by":"crossref","unstructured":"B. Sun, Z. Liu, V. Rijmen, R. Li, L. Ceng, Q. Wang, H. AlKhzaimi, C. Li, Links Among Impossible Differential, Integral and Zero-Correlation Linear Cryptanalysis, in R. Gennaro, M. Robshaw, editors, CRYPTO, Part I. LNCS, vol. 9215 (Springer, 2015), pp. 95\u2013115","DOI":"10.1007\/978-3-662-47989-6_5"},{"key":"9237_CR48","doi-asserted-by":"crossref","unstructured":"D. Wagner, The Boomerang Attack, in L.R. Knudsen, editor, FSE. LNCS, vol. 1636 (Springer, 1999), pp. 156\u2013170","DOI":"10.1007\/3-540-48519-8_12"},{"key":"9237_CR49","doi-asserted-by":"crossref","unstructured":"D. Wagner, Towards a Unifying View of Block Cipher Cryptanalysis, in B.K. Roy, W. Meier, editors, FSE. LNCS, vol. 3017 (Springer, 2004), pp. 16\u201333","DOI":"10.1007\/978-3-540-25937-4_2"}],"container-title":["Journal of Cryptology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00145-016-9237-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-016-9237-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-016-9237-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,8]],"date-time":"2020-04-08T08:17:28Z","timestamp":1586333848000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00145-016-9237-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,7]]},"references-count":49,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,7]]}},"alternative-id":["9237"],"URL":"https:\/\/doi.org\/10.1007\/s00145-016-9237-5","relation":{},"ISSN":["0933-2790","1432-1378"],"issn-type":[{"value":"0933-2790","type":"print"},{"value":"1432-1378","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,10,7]]},"assertion":[{"value":"27 January 2015","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 June 2016","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 October 2016","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}