{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T02:25:22Z","timestamp":1705026322071},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2020,2,11]],"date-time":"2020-02-11T00:00:00Z","timestamp":1581379200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,2,11]],"date-time":"2020-02-11T00:00:00Z","timestamp":1581379200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cryptol"],"published-print":{"date-parts":[[2020,4]]},"DOI":"10.1007\/s00145-020-09343-2","type":"journal-article","created":{"date-parts":[[2020,2,11]],"date-time":"2020-02-11T23:17:30Z","timestamp":1581463050000},"page":"567-594","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Revisiting the Wrong-Key-Randomization Hypothesis"],"prefix":"10.1007","volume":"33","author":[{"given":"Tomer","family":"Ashur","sequence":"first","affiliation":[]},{"given":"Tim","family":"Beyne","sequence":"additional","affiliation":[]},{"given":"Vincent","family":"Rijmen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,11]]},"reference":[{"key":"9343_CR1","doi-asserted-by":"crossref","unstructured":"M.A. Abdelraheem, M. \u00c5gren, P. Beelen, G. Leander, On the Distribution of Linear Biases: Three Instructive Examples (Springer, Berlin, 2012), pp. 50\u201367. https:\/\/doi.org\/10.1007\/978-3-642-32009-5_4","DOI":"10.1007\/978-3-642-32009-5_4"},{"key":"9343_CR2","unstructured":"R. Beaulieu, D. Shors, J. Smith, S. Treatman-Clark, B. Weeks, L. Wingers, The SIMON and SPECK families of lightweight block ciphers. Cryptology ePrint Archive, Report 2013\/404 (2013). https:\/\/eprint.iacr.org\/2013\/404"},{"key":"9343_CR3","doi-asserted-by":"crossref","unstructured":"A. Biryukov, C.D. Canni\u00e8re, M. Quisquater, On multiple linear approximations, in M.K. Franklin, editor, Advances in Cryptology\u2014CRYPTO 2004, 24th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15\u201319, 2004, Proceedings. Lecture Notes in Computer Science, vol. 3152 (Springer, 2004), pp. 1\u201322. https:\/\/doi.org\/10.1007\/978-3-540-28628-8_1","DOI":"10.1007\/978-3-540-28628-8_1"},{"issue":"1\u20133","key":"9343_CR4","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s10623-010-9452-2","volume":"59","author":"C Blondeau","year":"2011","unstructured":"C. Blondeau, B. G\u00e9rard, J. Tillich, Accurate estimates of the data complexity and success probability for various cryptanalyses. Des. Codes Cryptogr.\u00a059(1-3), 3\u201334 (2011). https:\/\/doi.org\/10.1007\/s10623-010-9452-2","journal-title":"Des. Codes Cryptography"},{"issue":"1","key":"9343_CR5","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/s10623-016-0268-6","volume":"82","author":"C Blondeau","year":"2017","unstructured":"C. Blondeau, K. Nyberg, Joint data and key distribution of simple, multiple, and multidimensional linear cryptanalysis test statistic and its impact to data complexity. Des. Codes Cryptogr.\u00a082(1), 319\u2013349 (2017). https:\/\/doi.org\/10.1007\/s10623-016-0268-6","journal-title":"Designs, Codes and Cryptography"},{"key":"9343_CR6","doi-asserted-by":"crossref","unstructured":"A. Bogdanov, E.B. Kavun, E. Tischhauser, T. Yal\u00e7in, Large-scale high-resolution computational validation of novel complexity models in linear cryptanalysis. J. Comput. Appl. Math.\u00a0259, 592\u2013598 (2014). https:\/\/doi.org\/10.1016\/j.cam.2013.10.020","DOI":"10.1016\/j.cam.2013.10.020"},{"key":"9343_CR7","unstructured":"A. Bogdanov, V. Rijmen, Zero-correlation linear cryptanalysis of block ciphers. IACR Cryptology ePrint Archive 2011, 123 (2011). http:\/\/eprint.iacr.org\/2011\/123"},{"issue":"3","key":"9343_CR8","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/s10623-012-9697-z","volume":"70","author":"A Bogdanov","year":"2014","unstructured":"A. Bogdanov, V. Rijmen, Linear hulls with correlation zero and linear cryptanalysis of block ciphers. Des. Codes Cryptogr.\u00a070(3), 369\u2013383 (2014). https:\/\/doi.org\/10.1007\/s10623-012-9697-z","journal-title":"Des. Codes Cryptography"},{"key":"9343_CR9","doi-asserted-by":"crossref","unstructured":"A. Bogdanov, E. Tischhauser, On the wrong key randomisation and key equivalence hypotheses in Matsui\u2019s algorithm 2, in S. Moriai, editor, Fast Software Encryption\u201420th International Workshop, FSE 2013, Singapore, March 11\u201313, 2013. Revised Selected Papers. Lecture Notes in Computer Science, vol. 8424 (Springer, 2013), pp. 19\u201338. https:\/\/doi.org\/10.1007\/978-3-662-43933-3_2","DOI":"10.1007\/978-3-662-43933-3_2"},{"key":"9343_CR10","unstructured":"A. Bogdanov, E. Tischhauser, P.S. Vejre, Multivariate linear cryptanalysis: the past and future of present. IACR Cryptology ePrint Archive 2016, 667 (2016). http:\/\/eprint.iacr.org\/2016\/667"},{"issue":"3","key":"9343_CR11","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1515\/JMC.2007.011","volume":"1","author":"J Daemen","year":"2007","unstructured":"J. Daemen, V. Rijmen, Probability distributions of correlation and differentials in block ciphers. J. Math. Cryptol.\u00a01(3), (2007) 221\u2013242. https:\/\/doi.org\/10.1515\/JMC.2007.011","journal-title":"J. Mathematical Cryptology"},{"key":"9343_CR12","unstructured":"W. Feller, An Introduction to Probability Theory and Its Applications, vol.\u00a01 (Wiley, 1967), exercise 10"},{"key":"9343_CR13","doi-asserted-by":"crossref","unstructured":"K. Fu, M. Wang, Y. Guo, S. Sun, L. Hu, Milp-based automatic search algorithms for differential and linear trails for speck, in International Conference on Fast Software Encryption (Springer, 2016), pp. 268\u2013288","DOI":"10.1007\/978-3-662-52993-5_14"},{"key":"9343_CR14","doi-asserted-by":"crossref","unstructured":"C. Harpes, G.G. Kramer, J.L. Massey, A generalization of linear cryptanalysis and the applicability of Matsui\u2019s piling-up lemma, in Advances in Cryptology\u2014EUROCRYPT \u201995, International Conference on the Theory and Application of Cryptographic Techniques, Saint-Malo, France, May 21\u201325, 1995, Proceeding. Lecture Notes in Computer Science, vol. 921 (Springer, 1995), pp. 24\u201338","DOI":"10.1007\/3-540-49264-X_3"},{"key":"9343_CR15","doi-asserted-by":"crossref","unstructured":"C. Harpes, J.L. Massey, Partitioning cryptanalysis, in E. Biham, editor, Fast Software Encryption, 4th International Workshop, FSE \u201997, Haifa, Israel, January 20\u201322, 1997, Proceedings. Lecture Notes in Computer Science, vol. 1267 (Springer, 1997), pp. 13\u201327. https:\/\/doi.org\/10.1007\/BFb0052331","DOI":"10.1007\/BFb0052331"},{"key":"9343_CR16","doi-asserted-by":"crossref","unstructured":"M. Hermelin, J.Y. Cho, K. Nyberg, Multidimensional linear cryptanalysis of reduced round serpent, in Y. Mu, W. Susilo, J. Seberry, editors, Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7\u20139, 2008, Proceedings. Lecture Notes in Computer Science, vol. 5107 (Springer, 2008), pp. 203\u2013215. https:\/\/doi.org\/10.1007\/978-3-540-70500-0_15","DOI":"10.1007\/978-3-540-70500-0_15"},{"key":"9343_CR17","doi-asserted-by":"crossref","unstructured":"P. Junod, S. Vaudenay, Optimal key ranking procedures in a statistical cryptanalysis, in T. Johansson, editor, Fast Software Encryption, 10th International Workshop, FSE 2003, Lund, Sweden, February 24\u201326, 2003, Revised Papers. Lecture Notes in Computer Science, vol. 2887 (Springer, 2003), pp. 235\u2013246. https:\/\/doi.org\/10.1007\/978-3-540-39887-5_18","DOI":"10.1007\/978-3-540-39887-5_18"},{"key":"9343_CR18","unstructured":"Z. Liu, Y. Li, M. Wang, The security of SIMON-like ciphers against linear cryptanalysis. Cryptology ePrint Archive, Report 2017\/576 (2017). https:\/\/eprint.iacr.org\/2017\/576"},{"key":"9343_CR19","doi-asserted-by":"crossref","unstructured":"M. Matsui, Linear cryptanalysis method for DES cipher, in T. Helleseth, editor, Advances in Cryptology\u2014EUROCRYPT \u201993, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23\u201327, 1993, Proceedings. Lecture Notes in Computer Science, vol. 765 (Springer, 1993), pp. 386\u2013397. https:\/\/doi.org\/10.1007\/3-540-48285-7_33","DOI":"10.1007\/3-540-48285-7_33"},{"key":"9343_CR20","unstructured":"W. Molenaar, Approximations to the Poisson, Binomial and Hypergeometric Distribution Functions. Ph.D. thesis, Mathematisch Centrum Amsterdam (1970)"},{"key":"9343_CR21","doi-asserted-by":"crossref","unstructured":"K. Nyberg, Linear approximation of block ciphers, in A.D. Santis, editor, Advances in Cryptology\u2014EUROCRYPT \u201994, Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, May 9\u201312, 1994, Proceedings. Lecture Notes in Computer Science, vol. 950 (Springer, 1994), pp. 439\u2013444. https:\/\/doi.org\/10.1007\/BFb0053460","DOI":"10.1007\/BFb0053460"},{"key":"9343_CR22","unstructured":"M.A. Pinsky, The normal approximation to the hypergeometric distribution. Unpublished manuscript. https:\/\/www.dartmouth.edu\/~chance\/teaching_aids\/books_articles\/probability_book\/pinsky-hypergeometric.pdf"},{"issue":"1","key":"9343_CR23","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/s00145-007-9013-7","volume":"21","author":"AA Sel\u00e7uk","year":"2008","unstructured":"A.A. Sel\u00e7uk, On probability of success in linear and differential cryptanalysis. J. Cryptol. 21(1), 131\u2013147 (2008). https:\/\/doi.org\/10.1007\/s00145-007-9013-7","journal-title":"J. Cryptology"}],"container-title":["Journal of Cryptology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-020-09343-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00145-020-09343-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-020-09343-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,10]],"date-time":"2021-02-10T07:09:41Z","timestamp":1612940981000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00145-020-09343-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2,11]]},"references-count":23,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,4]]}},"alternative-id":["9343"],"URL":"https:\/\/doi.org\/10.1007\/s00145-020-09343-2","relation":{},"ISSN":["0933-2790","1432-1378"],"issn-type":[{"value":"0933-2790","type":"print"},{"value":"1432-1378","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,2,11]]},"assertion":[{"value":"7 July 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 January 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 February 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}