{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:17:51Z","timestamp":1775913471315,"version":"3.50.1"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2020,3,4]],"date-time":"2020-03-04T00:00:00Z","timestamp":1583280000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,3,4]],"date-time":"2020-03-04T00:00:00Z","timestamp":1583280000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cryptol"],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1007\/s00145-020-09345-0","type":"journal-article","created":{"date-parts":[[2020,3,4]],"date-time":"2020-03-04T19:02:46Z","timestamp":1583348566000},"page":"1184-1215","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE"],"prefix":"10.1007","volume":"33","author":[{"given":"Patrick","family":"Derbez","sequence":"first","affiliation":[]},{"given":"L\u00e9o","family":"Perrin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,4]]},"reference":[{"issue":"1","key":"9345_CR1","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E Biham","year":"1991","unstructured":"E. Biham, A. Shamir, Differential cryptanalysis of DES-like cryptosystems. J. CRYPTOLOGY4(1), 3\u201372(1991).","journal-title":"J. CRYPTOLOGY"},{"key":"9345_CR2","doi-asserted-by":"crossref","unstructured":"M. Matsui, Linear cryptoanalysis method for DES cipher. in Advances in Cryptology\u2014EUROCRYPT 93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23\u201327, 1993, (Proceedings, 1993), pp. 386\u2013397","DOI":"10.1007\/3-540-48285-7_33"},{"key":"9345_CR3","doi-asserted-by":"crossref","unstructured":"H. Demirci, A.A. Sel\u00e7uk, A meet-in-the-middle attack on 8-round AES. in Fast Software Encryption, (Springer, 2008), pp. 116\u2013126","DOI":"10.1007\/978-3-540-71039-4_7"},{"key":"9345_CR4","unstructured":"N. Semiconductors, The PRINCE challenge (2014). https:\/\/www.emsec.rub.de\/research\/research_startseite\/prince-challenge\/"},{"key":"9345_CR5","doi-asserted-by":"crossref","unstructured":"J. Borghoff, A. Canteaut, T. G\u00fcneysu, E.B. Kavun, M. Knezevic, L.R. Knudsen, G. Leander, V. Nikov, C. Paar, C. Rechberger, et\u00a0al, PRINCE\u2014a low-latency block cipher for pervasive computing applications. in Advances in Cryptology\u2013ASIACRYPT 2012. (Springer, 2012), pp. 208\u2013225","DOI":"10.1007\/978-3-642-34961-4_14"},{"key":"9345_CR6","unstructured":"A. Biryukov, L. Perrin, State of the art in lightweight cryptography. http:\/\/cryptolux.org\/index.php\/Lightweight_Cryptography"},{"key":"9345_CR7","doi-asserted-by":"publisher","unstructured":"H. Soleimany, C. Blondeau, X. Yu, W. Wu, K. Nyberg, H. Zhang, L. Zhang, Y. Wang, Reflection cryptanalysis of PRINCE-like ciphers. in S. Moriai, ed., Fast Software Encryption - 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013. Revised Selected Papers. Vol. 8424 of Lecture Notes in Computer Science (Springer, 2013), pp. 71\u201391. https:\/\/doi.org\/10.1007\/978-3-662-43933-3_5","DOI":"10.1007\/978-3-662-43933-3_5"},{"key":"9345_CR8","doi-asserted-by":"crossref","unstructured":"J. Jean, I. Nikoli\u0107, T. Peyrin, L. Wang, S. Wu, Security analysis of prince. in Fast Software Encryption: 20th International Workshop, FSE 2013, Singapore, March 11\u201313, 2013. Revised Selected Papers. Vol. 8424., (Springer, 2014), 92","DOI":"10.1007\/978-3-662-43933-3_6"},{"key":"9345_CR9","unstructured":"L. Li, K. Jia, X. Wang, Improved meet-in-the-middle attacks on aes-192 and prince. Cryptology ePrint Archive, Report 2013\/573 (2013). http:\/\/eprint.iacr.org\/"},{"key":"9345_CR10","unstructured":"A. Canteaut, T. Fuhr, H. Gilbert, M. Naya-Plasencia, J.R. Reinhard, Multiple differential cryptanalysis of round-reduced PRINCE (full version). Cryptology ePrint Archive, Report 2014\/089 (2014). http:\/\/eprint.iacr.org\/"},{"issue":"3","key":"9345_CR11","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1049\/iet-ifs.2015.0432","volume":"11","author":"P Morawiecki","year":"2017","unstructured":"P. Morawiecki, Practical attacks on the round-reduced PRINCE. IET Inf. Secur.11(3), 146\u2013151 (2017).","journal-title":"IET Inf. Secur."},{"key":"9345_CR12","unstructured":"C. Rechberger, Update on the 10000 euro PRINCE cipher-breaking challenge: Results of round-1 (2014). http:\/\/crypto.2014.rump.cr.yp.to\/d037206eda8f9278cef1ea26cd62e51f.pdf"},{"key":"9345_CR13","doi-asserted-by":"crossref","unstructured":"O. Dunkelman, N. Keller, A. Shamir, Improved single-key attacks on 8-round AES-192 and AES-256. in Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5\u20139, 2010. Proceedings. pp. 158\u2013176 (2010)","DOI":"10.1007\/978-3-642-17373-8_10"},{"key":"9345_CR14","doi-asserted-by":"crossref","unstructured":"P. Derbez, P. Fouque, Exhausting Demirci-Sel\u00e7uk meet-in-the-middle attacks against reduced-round AES. in Fast Software Encryption - 20th International Workshop, FSE 2013, Singapore, March 11\u201313, 2013. Revised Selected Papers. pp. 541\u2013560 (2013)","DOI":"10.1007\/978-3-662-43933-3_28"},{"key":"9345_CR15","doi-asserted-by":"crossref","unstructured":"P. Derbez, P.A. Fouque, J. Jean, Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting. in T. Johansson, P.Q. Nguyen, eds., EUROCRYPT. Vol. 7881 of Lecture Notes in Computer Science., (Springer, 2013), pp. 371\u2013387","DOI":"10.1007\/978-3-642-38348-9_23"},{"key":"9345_CR16","unstructured":"F. Abed, E. List, S. Lucks, On the security of the core of prince against biclique and differential cryptanalysis. Cryptology ePrint Archive, Report 2012\/712 (2012). http:\/\/eprint.iacr.org\/"},{"key":"9345_CR17","doi-asserted-by":"crossref","unstructured":"A. Biryukov, A. Shamir, Structural cryptanalysis of SASAS, in B. Pfitzmann, ed., Advances in Cryptology\u2014EUROCRYPT 2001. Vol. 2045 of Lecture Notes in Computer Science. (Springer, Berlin, Heidelberg, 2001), pp. 395\u2013405","DOI":"10.1007\/3-540-44987-6_24"},{"key":"9345_CR18","doi-asserted-by":"crossref","unstructured":"I. Mironov, L. Zhang, Applications of sat solvers to cryptanalysis of hash functions. In Biere, A., Gomes, C., eds.: Theory and Applications of Satisfiability Testing\u2014SAT 2006. Volume 4121 of Lecture Notes in Computer Science. (Springer, Berlin, Heidelberg, 2006), pp. 102\u2013115","DOI":"10.1007\/11814948_13"},{"key":"9345_CR19","doi-asserted-by":"crossref","unstructured":"N. E\u00e9n, N. S\u00f6rensson, An extensible SAT-solver. in Theory and applications of satisfiability testing, (Springer, 2004), pp. 502\u2013518","DOI":"10.1007\/978-3-540-24605-3_37"},{"key":"9345_CR20","doi-asserted-by":"crossref","unstructured":"A. Biryukov, Analysis of involutional ciphers: Khazad and Anubis. in Fast Software Encryption, (Springer, 2003), pp. 45\u201353","DOI":"10.1007\/978-3-540-39887-5_5"},{"key":"9345_CR21","doi-asserted-by":"crossref","unstructured":"J.H. Moore, G.J. Simmons, Cycle structure of the DES with weak and semi-weak keys. in Advances in Cryptology\u2013CRYPTO\u201986, (Springer, 1987), pp. 9\u201332","DOI":"10.1007\/3-540-47721-7_2"},{"key":"9345_CR22","doi-asserted-by":"crossref","unstructured":"O. Dunkelman, N. Keller, A. Shamir, Minimalism in cryptography: The Even-Mansour scheme revisited. in Advances in Cryptology\u2014EUROCRYPT 2012. (Springer, 2012), pp. 336\u2013354","DOI":"10.1007\/978-3-642-29011-4_21"}],"container-title":["Journal of Cryptology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-020-09345-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00145-020-09345-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-020-09345-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,17]],"date-time":"2022-10-17T15:02:48Z","timestamp":1666018968000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00145-020-09345-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,4]]},"references-count":22,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,7]]}},"alternative-id":["9345"],"URL":"https:\/\/doi.org\/10.1007\/s00145-020-09345-0","relation":{},"ISSN":["0933-2790","1432-1378"],"issn-type":[{"value":"0933-2790","type":"print"},{"value":"1432-1378","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,3,4]]},"assertion":[{"value":"31 March 2016","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 February 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 March 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}