{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T10:08:10Z","timestamp":1761646090650},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2020,2,14]],"date-time":"2020-02-14T00:00:00Z","timestamp":1581638400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,2,14]],"date-time":"2020-02-14T00:00:00Z","timestamp":1581638400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cryptol"],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1007\/s00145-020-09344-1","type":"journal-article","created":{"date-parts":[[2020,2,14]],"date-time":"2020-02-14T19:03:47Z","timestamp":1581707027000},"page":"1156-1183","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Block Cipher Invariants as Eigenvectors of Correlation Matrices"],"prefix":"10.1007","volume":"33","author":[{"given":"Tim","family":"Beyne","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,14]]},"reference":[{"key":"9344_CR1","doi-asserted-by":"crossref","unstructured":"M.A. Abdelraheem, M. \u00c5gren, P. Beelen, G. Leander, On the distribution of linear biases: three instructive examples, in R. Safavi-Naini, R. Canetti, editors, CRYPTO\u00a02012. LNCS, vol.\u00a07417 (Springer, Heidelberg, Germany, Santa Barbara, CA, USA, August 19\u201323, 2012), pp. 50\u201367","DOI":"10.1007\/978-3-642-32009-5_4"},{"issue":"1","key":"9344_CR2","doi-asserted-by":"publisher","first-page":"192","DOI":"10.13154\/tosc.v2019.i1.192-235","volume":"2019","author":"R Ankele","year":"2019","unstructured":"R. Ankele, C. Dobraunig, J. Guo, E. Lambooij, G. Leander, Y. Todo,Zero-correlation attacks on tweakable block ciphers with linear tweakey expansion. IACR Trans. Symmetric Cryptol.2019(1), 192\u2013235 (2019). https:\/\/doi.org\/10.13154\/tosc.v2019.i1.192-235","journal-title":"IACR Trans. Symmetric Cryptol"},{"key":"9344_CR3","doi-asserted-by":"publisher","unstructured":"S. Banik, A. Bogdanov, T. Isobe, K. Shibutani, H. Hiwatari, T. Akishita, F. Regazzoni, Midori: A block cipher for low energy, in T. Iwata, J.H. Cheon, editors, ASIACRYPT\u00a02015, Part\u00a0II. LNCS, vol.\u00a09453 (Springer, Heidelberg, Germany, Auckland, New Zealand, Nov\u00a030\u2013Dec\u00a03, 2015), pp. 411\u2013436. https:\/\/doi.org\/10.1007\/978-3-662-48800-3_17","DOI":"10.1007\/978-3-662-48800-3_17"},{"key":"9344_CR4","doi-asserted-by":"crossref","unstructured":"C. Beierle, A. Canteaut, G. Leander, Y. Rotella, Proving resistance against invariant attacks: How to choose the round constants, in J. Katz, H. Shacham, editors, CRYPTO\u00a02017, Part\u00a0II. LNCS, vol. 10402 (Springer, Heidelberg, Germany, Santa Barbara, CA, USA, Aug\u00a020\u201324, 2017), pp. 647\u2013678","DOI":"10.1007\/978-3-319-63715-0_22"},{"key":"9344_CR5","doi-asserted-by":"publisher","unstructured":"C. Beierle, J. Jean, S. K\u00f6lbl, G. Leander, A. Moradi, T. Peyrin, Y. Sasaki, P. Sasdrich, S.M. Sim, The SKINNY family of block ciphers and its low-latency variant MANTIS, in M. Robshaw, J. Katz, editor, CRYPTO\u00a02016, Part\u00a0II. LNCS, vol.\u00a09815 (Springer, Heidelberg, Germany, Santa Barbara, CA, USA, Aug\u00a014\u201318, 2016), pp. 123\u2013153. https:\/\/doi.org\/10.1007\/978-3-662-53008-5_5","DOI":"10.1007\/978-3-662-53008-5_5"},{"key":"9344_CR6","doi-asserted-by":"publisher","unstructured":"T. Beyne, Block cipher invariants as eigenvectors of correlation matrices, in ASIACRYPT\u00a02018, Part\u00a0I. LNCS (Springer, Heidelberg, Germany, Dec 2018), pp. 3\u201331. https:\/\/doi.org\/10.1007\/978-3-030-03326-2_1","DOI":"10.1007\/978-3-030-03326-2_1"},{"key":"9344_CR7","unstructured":"T. Beyne, Block cipher invariants as eigenvectors of correlation matrices (full version). Cryptology ePrint Archive, Report 2018\/763 (2018). https:\/\/eprint.iacr.org\/2018\/763"},{"key":"9344_CR8","unstructured":"A. Biryukov, L. Perrin, State of the art in lightweight symmetric cryptography. Cryptology ePrint Archive, Report 2017\/511 (2017). http:\/\/eprint.iacr.org\/2017\/511"},{"key":"9344_CR9","doi-asserted-by":"publisher","unstructured":"J. Borghoff, A. Canteaut, T. G\u00fcneysu, E.B. Kavun, M. Kne\u017eevi\u0107, L.R. Knudsen, G. Leander, V. Nikov, C. Paar, C. Rechberger, P. Rombouts, S.S. Thomsen, T. Yal\u00e7in, PRINCE: a low-latency block cipher for pervasive computing applications-extended abstract, in X. Wang, K. Sako, editor, ASIACRYPT\u00a02012. LNCS, vol.\u00a07658 (Springer, Heidelberg, Germany, Beijing, China, Dec\u00a02\u20136, 2012), pp. 208\u2013225. https:\/\/doi.org\/10.1007\/978-3-642-34961-4_14","DOI":"10.1007\/978-3-642-34961-4_14"},{"key":"9344_CR10","doi-asserted-by":"crossref","unstructured":"T. Ceccherini-Silberstein, F. Scarabotti, F. Tolli, in Harmonic Analysis on Finite Groups (Cambridge University Press, Cambridge, 2008)","DOI":"10.1017\/CBO9780511619823"},{"key":"9344_CR11","doi-asserted-by":"crossref","unstructured":"J. Daemen, R. Govaerts, J. Vandewalle, Correlation matrices, in B. Preneel, editor, FSE\u201994. LNCS, vol.\u00a01008 (Springer, Heidelberg, Germany, Leuven, Belgium, Dec\u00a014\u201316, 1995), pp. 275\u2013285","DOI":"10.1007\/3-540-60590-8_21"},{"key":"9344_CR12","doi-asserted-by":"crossref","unstructured":"J. Daemen, V. Rijmen, The wide trail design strategy, in B. Honary, editor, 8th IMA International Conference on Cryptography and Coding, Dec\u00a017\u201319, 2001. LNCS, vol.\u00a02260 (Springer, Heidelberg, Germany, Cirencester, UK), pp. 222\u2013238","DOI":"10.1007\/3-540-45325-3_20"},{"key":"9344_CR13","doi-asserted-by":"publisher","unstructured":"P. Diaconis, in Group Representations in Probability and Statistics, Lecture Notes\u2013Monograph Series. vol.\u00a011 (Institute of Mathematical Statistics, Hayward, CA, 1988). https:\/\/doi.org\/10.1214\/lnms\/1215467418","DOI":"10.1214\/lnms\/1215467418"},{"key":"9344_CR14","doi-asserted-by":"publisher","unstructured":"C. Dobraunig, M. Eichlseder, D. Kales, F. Mendel, Practical key-recovery attack on MANTIS5. IACR Trans. Symm. Cryptol. 2016(2), 248\u2013260 (2016). https:\/\/doi.org\/10.13154\/tosc.v2016.i2.248-260, http:\/\/tosc.iacr.org\/index.php\/ToSC\/article\/view\/573","DOI":"10.13154\/tosc.v2016.i2.248-260"},{"key":"9344_CR15","doi-asserted-by":"publisher","unstructured":"B. Dravie, J. Parriaux, P. Guillot, G. Mill\u00e9rioux, Matrix representations of vectorial Boolean functions and eigenanalysis. Cryptogr. Commun. Discrete Struct. Boolean Funct. Seq. 8(4), 555\u2013577 (2016). https:\/\/doi.org\/10.1007\/s12095-015-0160-7, https:\/\/hal.archives-ouvertes.fr\/hal-01259921","DOI":"10.1007\/s12095-015-0160-7"},{"key":"9344_CR16","doi-asserted-by":"publisher","unstructured":"M. Eichlseder, D. Kales, Clustering related-tweak characteristics: application to MANTIS-6. IACR Trans. Symm. Cryptol.2018(2), 111\u2013132 (2018). https:\/\/doi.org\/10.13154\/tosc.v2018.i2.111-132","DOI":"10.13154\/tosc.v2018.i2.111-132"},{"key":"9344_CR17","unstructured":"W. Feller, in An Introduction to Probability Theory and Its Applicatons. vol.\u00a02 (Wiley, New York, 1971)"},{"key":"9344_CR18","doi-asserted-by":"publisher","unstructured":"J. Guo, J. Jean, I. Nikolic, K. Qiao, Y. Sasaki, S.M. Sim, Invariant subspace attack against Midori64 and the resistance criteria for S-box designs. IACR Trans. Symm. Cryptol.2016(1), 33\u201356 (2016). https:\/\/doi.org\/10.13154\/tosc.v2016.i1.33-56, http:\/\/tosc.iacr.org\/index.php\/ToSC\/article\/view\/534","DOI":"10.13154\/tosc.v2016.i1.33-56"},{"key":"9344_CR19","unstructured":"L.R. Knudsen, D. Wagner, Integral cryptanalysis, in J. Daemen, V. Rijmen, editors, FSE\u00a02002, Feb\u00a04\u20136, 2002. LNCS, vol.\u00a02365 (Springer, Heidelberg, Germany, Leuven, Belgium), pp. 112\u2013127"},{"key":"9344_CR20","doi-asserted-by":"crossref","unstructured":"G. Leander, M.A. Abdelraheem, H. AlKhzaimi, E. Zenner, A cryptanalysis of PRINTcipher: the invariant subspace attack, in P. Rogaway, editor, CRYPTO\u00a02011, Aug\u00a014\u201318, 2011. LNCS, vol.\u00a06841 (Springer, Heidelberg, Germany, Santa Barbara, CA, USA), pp. 206\u2013221","DOI":"10.1007\/978-3-642-22792-9_12"},{"issue":"1","key":"9344_CR21","doi-asserted-by":"publisher","first-page":"215","DOI":"10.13154\/tosc.v2017.i1.215-239","volume":"2017","author":"L Lin","year":"2017","unstructured":"L. Lin, W. Wu, Meet-in-the-middle attacks on reduced-round Midori64. IACR Trans. Symm. Cryptol.2017(1), 215\u2013239 (2017). https:\/\/doi.org\/10.13154\/tosc.v2017.i1.215-239","journal-title":"IACR Trans. Symm. Cryptol"},{"key":"9344_CR22","doi-asserted-by":"crossref","unstructured":"A. Luykx, B. Mennink, K.G. Paterson, Analyzing multi-key security degradation, in T. Takagi, T. Peyrin, editors, ASIACRYPT\u00a02017, Part\u00a0II, Dec\u00a03\u20137, 2017. LNCS, vol. 10625 (Springer, Heidelberg, Germany, Hong Kong, China), pp. 575\u2013605","DOI":"10.1007\/978-3-319-70697-9_20"},{"key":"9344_CR23","doi-asserted-by":"crossref","unstructured":"M. Matsui, Linear cryptanalysis method for DES cipher, in T. Helleseth, editor, EUROCRYPT\u201993, May\u00a023\u201327, 1994. LNCS, vol.\u00a0765 (Springer, Heidelberg, Germany, Lofthus, Norway), pp. 386\u2013397","DOI":"10.1007\/3-540-48285-7_33"},{"key":"9344_CR24","doi-asserted-by":"crossref","unstructured":"K. Nyberg, Linear approximation of block ciphers (rump session), in A.D. Santis, editor, EUROCRYPT\u201994, May\u00a09\u201312, 1995. LNCS, vol.\u00a0950 (Springer, Heidelberg, Germany, Perugia, Italy), pp. 439\u2013444","DOI":"10.1007\/BFb0053460"},{"key":"9344_CR25","doi-asserted-by":"publisher","unstructured":"Y. Todo, G. Leander, Y. Sasaki, Nonlinear invariant attack-practical attack on full SCREAM, iSCREAM, and Midori64, in J.H. Cheon, T. Takagi, editors, ASIACRYPT\u00a02016, Part\u00a0II, Dec\u00a04\u20138, 2016. LNCS, vol. 10032 (Springer, Heidelberg, Germany, Hanoi, Vietnam), pp. 3\u201333. https:\/\/doi.org\/10.1007\/978-3-662-53890-6_1","DOI":"10.1007\/978-3-662-53890-6_1"},{"key":"9344_CR26","unstructured":"C. Zhan, W. Xiaoyun, Impossible differential cryptanalysis of Midori. Cryptology ePrint Archive, Report 2016\/535 (2016). http:\/\/eprint.iacr.org\/2016\/535"}],"container-title":["Journal of Cryptology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-020-09344-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00145-020-09344-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-020-09344-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,15]],"date-time":"2022-10-15T17:03:27Z","timestamp":1665853407000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00145-020-09344-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2,14]]},"references-count":26,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,7]]}},"alternative-id":["9344"],"URL":"https:\/\/doi.org\/10.1007\/s00145-020-09344-1","relation":{},"ISSN":["0933-2790","1432-1378"],"issn-type":[{"value":"0933-2790","type":"print"},{"value":"1432-1378","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,2,14]]},"assertion":[{"value":"24 September 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 January 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 February 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}