{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T13:58:32Z","timestamp":1775829512003,"version":"3.50.1"},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T00:00:00Z","timestamp":1763424000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T00:00:00Z","timestamp":1763424000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cryptol"],"published-print":{"date-parts":[[2026,1]]},"DOI":"10.1007\/s00145-025-09564-3","type":"journal-article","created":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T19:10:39Z","timestamp":1763493039000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Differential-Linear Cryptanalysis from an Algebraic Perspective"],"prefix":"10.1007","volume":"39","author":[{"given":"Meicheng","family":"Liu","sequence":"first","affiliation":[]},{"given":"Chengan","family":"Hou","sequence":"additional","affiliation":[]},{"given":"Xiaojuan","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Shichang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Dongdai","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,18]]},"reference":[{"key":"9564_CR1","unstructured":"R. Anderson, E. Biham, L.R. Knudsen, Serpent: A Proposal for the Advanced Encryption Standard. NIST AES Proposal, (1998). Available at https:\/\/www.cl.cam.ac.uk\/$$\\sim $$rja14\/serpent.html"},{"issue":"1","key":"9564_CR2","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1504\/IJWMC.2011.044106","volume":"5","author":"M \u00c5gren","year":"2011","unstructured":"M. \u00c5gren, M. Hell, T. Johansson, W. Meier, Grain-128a: a new version of grain-128 with optional authentication. Int. J. Wirel. Mob. Comput., 51,48\u201359 (2011)","journal-title":"Int. J. Wirel. Mob. Comput."},{"key":"9564_CR3","unstructured":"S. Banik, Some insights into differential cryptanalysis of grain v1. In W. Susilo, Y. Mu, editors, Information Security and Privacy - 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings, volume 8544 of Lecture Notes in Computer Science, (Springer, 2014), pp 34\u201349"},{"issue":"1","key":"9564_CR4","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/s12095-015-0146-5","volume":"8","author":"Subhadeep Banik","year":"2016","unstructured":"S. Banik, Conditional differential cryptanalysis of 105 round Grain v1. Cryptography and Communications, 8(1),113\u2013137 (2016)","journal-title":"Cryptography and Communications"},{"key":"9564_CR5","doi-asserted-by":"crossref","unstructured":"I. Ben-Aroya, E. Biham, Differential cryptanalysis of lucifer. In D.R. Stinson, editor, Advances in Cryptology - CRYPTO \u201993, 13th Annual International Cryptology Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings, volume 773 of Lecture Notes in Computer Science, (Springer, 1993), pp 187\u2013199","DOI":"10.1007\/3-540-48329-2_17"},{"key":"9564_CR6","doi-asserted-by":"crossref","unstructured":"M. Broll, F. Canale, N. David, A. Fl\u00f3rez-Guti\u00e9rrez, G. Leander, M. Naya-Plasencia, Y. Todo, New attacks from old distinguishers improved attacks on serpent. In Steven\u00a0D. Galbraith, editor, Topics in Cryptology - CT-RSA 2022 - Cryptographers\u2019 Track at the RSA Conference 2022, Virtual Event, March 1-2, 2022, Proceedings, volume 13161 of Lecture Notes in Computer Science, (Springer, 2022), pp 484\u2013510","DOI":"10.1007\/978-3-030-95312-6_20"},{"key":"9564_CR7","doi-asserted-by":"crossref","unstructured":"E. Biham, O. Dunkelman, N. Keller, Linear cryptanalysis of reduced round serpent. In Mitsuru Matsui, editor, Fast Software Encryption, 8th International Workshop, FSE 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers, volume 2355 of Lecture Notes in Computer Science, (Springer, 2001), pp 16\u201327","DOI":"10.1007\/3-540-45473-X_2"},{"key":"9564_CR8","doi-asserted-by":"crossref","unstructured":"E. Biham, O. Dunkelman, N. Keller, Enhancing differential-linear cryptanalysis. In Yuliang Zheng, editor, Advances in Cryptology - ASIACRYPT 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings, volume 2501 of Lecture Notes in Computer Science, (Springer, 2002), pp 254\u2013266","DOI":"10.1007\/3-540-36178-2_16"},{"key":"9564_CR9","doi-asserted-by":"crossref","unstructured":"E. Biham, O. Dunkelman, N. Keller, Differential-linear cryptanalysis of Serpent. In Thomas Johansson, editor, Fast Software Encryption, 10th International Workshop, FSE 2003, Lund, Sweden, February 24-26, 2003, Revised Papers, volume 2887 of Lecture Notes in Computer Science, (Springer, 2003), pp 9\u201321","DOI":"10.1007\/978-3-540-39887-5_2"},{"key":"9564_CR10","doi-asserted-by":"crossref","unstructured":"A. Bar-On, O. Dunkelman, N. Keller, A. Weizman, DLCT: A new tool for differential-linear cryptanalysis. In Yuval Ishai and Vincent Rijmen, editors, Advances in Cryptology - EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part I, volume 11476 of Lecture Notes in Computer Science, (Springer, 2019), pp 313\u2013342","DOI":"10.1007\/978-3-030-17653-2_11"},{"issue":"3","key":"9564_CR11","doi-asserted-by":"publisher","first-page":"859","DOI":"10.1007\/s00145-016-9237-5","volume":"30","author":"C Blondeau","year":"2017","unstructured":"C. Blondeau, G. Leander, K. Nyberg, Differential-linear cryptanalysis revisited. J. Cryptology, 30(3),859\u2013888 (2017)","journal-title":"J. Cryptology"},{"key":"9564_CR12","doi-asserted-by":"crossref","unstructured":"C. Beierle, G. Leander, Y. Todo, Improved differential-linear attacks with applications to ARX ciphers. In Daniele Micciancio and Thomas Ristenpart, editors, Advances in Cryptology - CRYPTO 2020 - 40th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part III, volume 12172 of Lecture Notes in Computer Science, (Springer, 2020), pp 329\u2013358","DOI":"10.1007\/978-3-030-56877-1_12"},{"issue":"3","key":"9564_CR13","doi-asserted-by":"publisher","first-page":"215","DOI":"10.46586\/tosc.v2018.i3.215-264","volume":"2018","author":"E Biham","year":"2018","unstructured":"E. Biham, S. Perle, Conditional linear cryptanalysis - cryptanalysis of DES with less than $$2^{42}$$ complexity. IACR Trans. Symmetric Cryptol., 2018(3),215\u2013264 (2018)","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"9564_CR14","unstructured":"M. Broll, Key guessing strategies for Sbox-based ciphers. PhD thesis, Ruhr University Bochum, Germany, (2023)"},{"key":"9564_CR15","unstructured":"E. Biham, A. Shamir, Differential cryptanalysis of des-like cryptosystems. In Alfred Menezes and Scott\u00a0A. Vanstone, editors, Advances in Cryptology - CRYPTO \u201990, 10th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings, volume 537 of Lecture Notes in Computer Science, (Springer, 1990), pp 2\u201321"},{"key":"9564_CR16","unstructured":"A. Canteaut, L. K\u00f6lsch, C. Li, C. Li, K. Li, L. Qu, F. Wiemer, On the differential-linear connectivity table of vectorial boolean functions. CoRR, arXiv:1908.07445, (2019)"},{"key":"9564_CR17","first-page":"848","volume":"2019","author":"A Canteaut","year":"2019","unstructured":"A. Canteaut, L. K\u00f6lsch, F. Wiemer, Observations on the DLCT and absolute indicators. IACR Cryptology ePrint Archive, 2019,848 (2019)","journal-title":"IACR Cryptology ePrint Archive"},{"key":"9564_CR18","doi-asserted-by":"crossref","unstructured":"B. Collard, F-X. Standaert, J.-J. Quisquater, Improving the time complexity of matsui\u2019s linear cryptanalysis. In Kil-Hyun Nam and Gwangsoo Rhee, editors, Information Security and Cryptology - ICISC 2007, 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings, volume 4817 of Lecture Notes in Computer Science, (Springer, 2007), pp 77\u201388","DOI":"10.1007\/978-3-540-76788-6_7"},{"key":"9564_CR19","unstructured":"D. Chang, M.S. Turan, Recovering the key from the internal state of grain-128aead. IACR Cryptology ePrint Archive, 2021,439 (2021)"},{"key":"9564_CR20","doi-asserted-by":"crossref","unstructured":"C. Dobraunig, M. Eichlseder, F. Mendel, M. Schl\u00e4ffer, Cryptanalysis of ascon. In Kaisa Nyberg, editor, Topics in Cryptology - CT-RSA 2015, The Cryptographer\u2019s Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings, volume 9048 of Lecture Notes in Computer Science, (Springer, 2015), pp 371\u2013387","DOI":"10.1007\/978-3-319-16715-2_20"},{"key":"9564_CR21","unstructured":"C. Dobraunig, M. Eichlseder, F. Mendel, M. Schl\u00e4ffer, Ascon v1.2. Submission to the CAESAR Competition, (2016)"},{"key":"9564_CR22","unstructured":"C. Dobraunig, M. Eichlseder, F. Mendel, M. Schl\u00e4ffer, Ascon v1.2. Submission to the NIST Lightweight Cryptography competition, (2019)"},{"issue":"3","key":"9564_CR23","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/s00145-021-09398-9","volume":"34","author":"C Dobraunig","year":"2021","unstructured":"C. Dobraunig, M. Eichlseder, F. Mendel, M. Schl\u00e4ffer, Ascon v1.2: Lightweight authenticated encryption and hashing. J. Cryptol., 34(3):33 (2021)","journal-title":"J. Cryptol."},{"key":"9564_CR24","doi-asserted-by":"crossref","unstructured":"O. Dunkelman, S. Indesteege, N. Keller, A differential-linear attack on 12-round Serpent. In Dipanwita\u00a0Roy Chowdhury, Vincent Rijmen, and Abhijit Das, editors, Progress in Cryptology - INDOCRYPT 2008, 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings, volume 5365 of Lecture Notes in Computer Science, (Springer, 2008), pp 308\u2013321","DOI":"10.1007\/978-3-540-89754-5_24"},{"key":"9564_CR25","doi-asserted-by":"crossref","unstructured":"A. Fl\u00f3rez-Guti\u00e9rrez, M. Naya-Plasencia, Improving key-recovery in linear attacks: Application to 28-round PRESENT. In Anne Canteaut and Yuval Ishai, editors, Advances in Cryptology - EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part I, volume 12105 of Lecture Notes in Computer Science, (Springer, 2020), pp 221\u2013249","DOI":"10.1007\/978-3-030-45721-1_9"},{"key":"9564_CR26","doi-asserted-by":"crossref","unstructured":"A. Fl\u00f3rez-Guti\u00e9rrez, Y. Todo, Improving linear key recovery attacks using walsh spectrum puncturing. In Marc Joye and Gregor Leander, editors, Advances in Cryptology - EUROCRYPT 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part I, volume 14651 of Lecture Notes in Computer Science, (Springer, 2024), pp 187\u2013216","DOI":"10.1007\/978-3-031-58716-0_7"},{"key":"9564_CR27","doi-asserted-by":"crossref","unstructured":"J. He, K. Hu, B. Preneel, M. Wang, Stretching cube attacks: Improved methods to recover massive superpolies. In Shweta Agrawal and Dongdai Lin, editors, Advances in Cryptology - ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part IV, volume 13794 of Lecture Notes in Computer Science, (Springer, 2022), pp 537\u2013566","DOI":"10.1007\/978-3-031-22972-5_19"},{"key":"9564_CR28","doi-asserted-by":"crossref","unstructured":"M. Hell, T. Johansson, W. Meier, J. S\u00f6nnerup, H. Yoshida, An AEAD variant of the grain stream cipher. In Claude Carlet, Sylvain Guilley, Abderrahmane Nitaj, and El\u00a0Mamoun Souidi, editors, Codes, Cryptology and Information Security - Third International Conference, C2SI 2019, Rabat, Morocco, April 22-24, 2019, Proceedings - In Honor of Said El Hajji, volume 11445 of Lecture Notes in Computer Science, (Springer, 2019), pp 55\u201371","DOI":"10.1007\/978-3-030-16458-4_5"},{"key":"9564_CR29","unstructured":"M. Hell, T. Johansson, A. Maximov, W. Meier, H. Yoshida, Grain-128aead, round 3 tweak and motivation. Submission to the NIST Lightweight Cryptography competition, (2021)"},{"key":"9564_CR30","doi-asserted-by":"crossref","unstructured":"M. Hell, T. Johansson, A. Maximov, W. Meier, H. Yoshida, Grain-128aeadv2: Strengthening the initialization against key reconstruction. In Mauro Conti, Marc Stevens, and Stephan Krenn, editors, Cryptology and Network Security - 20th International Conference, CANS 2021, Vienna, Austria, December 13-15, 2021, Proceedings, volume 13099 of Lecture Notes in Computer Science, (Springer, 2021), pp 24\u201341","DOI":"10.1007\/978-3-030-92548-2_2"},{"key":"9564_CR31","doi-asserted-by":"crossref","unstructured":"M. Hell, T. Johansson, A. Maximov, W. Meier, The Grain family of stream ciphers. In Matthew J.\u00a0B. Robshaw and Olivier Billet, editors, New Stream Cipher Designs - The eSTREAM Finalists, volume 4986 of Lecture Notes in Computer Science, (Springer, 2008), pp 179\u2013190","DOI":"10.1007\/978-3-540-68351-3_14"},{"issue":"3","key":"9564_CR32","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1007\/s00145-021-09383-2","volume":"34","author":"Y Hao","year":"2021","unstructured":"Y. Hao, G. Leander, W. Meier, Y. Todo, Q. Wang, Modeling for three-subset division property without unknown subset. J. Cryptol., 34(3),22 (2021)","journal-title":"J. Cryptol."},{"key":"9564_CR33","doi-asserted-by":"crossref","unstructured":"K. Hu, T. Peyrin, Q.Q. Tan, T. Yap, Revisiting higher-order differential-linear attacks from an algebraic perspective. In Jian Guo and Ron Steinfeld, editors, Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part III, volume 14440 of Lecture Notes in Computer Science, (Springer, 2023), pp 405\u2013435","DOI":"10.1007\/978-981-99-8727-6_14"},{"key":"9564_CR34","doi-asserted-by":"crossref","unstructured":"K. Hu, S. Sun, Y. Todo, M. Wang, Q. Wang, Massive superpoly recovery with nested monomial predictions. In Mehdi Tibouchi and Huaxiong Wang, editors, Advances in Cryptology - ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part I, volume 13090 of Lecture Notes in Computer Science, (Springer, 2021), pp 392\u2013421","DOI":"10.1007\/978-3-030-92062-3_14"},{"issue":"2","key":"9564_CR35","doi-asserted-by":"publisher","first-page":"118","DOI":"10.46586\/tosc.v2024.i2.118-140","volume":"2024","author":"K Hu","year":"2024","unstructured":"K. Hu, Improved conditional cube attacks on ascon aeads in nonce-respecting settings with a break-fix strategy. IACR Trans. Symmetric Cryptol., 2024(2):118\u2013140 (2024)","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"9564_CR36","doi-asserted-by":"crossref","unstructured":"S. Knellwolf, W. Meier, M. Naya-Plasencia, Conditional differential cryptanalysis of nlfsr-based cryptosystems. In Masayuki Abe, editor, Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings, volume 6477 of Lecture Notes in Computer Science, (Springer, 2010), pp 130\u2013145","DOI":"10.1007\/978-3-642-17373-8_8"},{"issue":"1","key":"9564_CR37","doi-asserted-by":"publisher","first-page":"175","DOI":"10.46586\/tosc.v2017.i1.175-202","volume":"2017","author":"Z Li","year":"2017","unstructured":"Z. Li, X. Dong, X. Wang, Conditional cube attack on round-reduced ASCON. IACR Trans. Symmetric Cryptol., 2017(1),175\u2013202 (2017)","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"9564_CR38","doi-asserted-by":"crossref","unstructured":"G. Leurent, Improved differential-linear cryptanalysis of 7-round chaskey with partitioning. In Marc Fischlin and Jean-S\u00e9bastien Coron, editors, Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I, volume 9665 of Lecture Notes in Computer Science, (Springer, 2016), pp 344\u2013371","DOI":"10.1007\/978-3-662-49890-3_14"},{"issue":"2","key":"9564_CR39","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1049\/iet-ifs.2018.5180","volume":"13","author":"J-Z Li","year":"2019","unstructured":"J.-Z. Li, J. Guan, Advanced conditional differential attack on grain-like stream cipher and application on Grain v1. IET Information Security, 13(2),141\u2013148 (2019)","journal-title":"IET Information Security"},{"key":"9564_CR40","doi-asserted-by":"crossref","unstructured":"Z. Liu, D. Gu, J. Zhang, W. Li, Differential-multiple linear cryptanalysis. In F. Bao, M. Yung, D. Lin, J. Jing, editors, Information Security and Cryptology - 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers, volume 6151 of Lecture Notes in Computer Science, (Springer, 2009), pp 35\u201349","DOI":"10.1007\/978-3-642-16342-5_3"},{"key":"9564_CR41","doi-asserted-by":"crossref","unstructured":"S.K. Langford, M.E. Hellman, Differential-linear cryptanalysis. In Yvo Desmedt, editor, Advances in Cryptology - CRYPTO \u201994, 14th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1994, Proceedings, volume 839 of Lecture Notes in Computer Science, (Springer, 1994), pp 17\u201325","DOI":"10.1007\/3-540-48658-5_3"},{"key":"9564_CR42","doi-asserted-by":"crossref","unstructured":"M. Liu, X. Lu, D. Lin, Differential-linear cryptanalysis from an algebraic perspective. In Tal Malkin and Chris Peikert, editors, Advances in Cryptology - CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16-20, 2021, Proceedings, Part III, volume 12827 of Lecture Notes in Computer Science, (Springer, 2021), pp 247\u2013277","DOI":"10.1007\/978-3-030-84252-9_9"},{"key":"9564_CR43","unstructured":"J. Lu, A methodology for differential-linear cryptanalysis and its applications - (extended abstract). In Anne Canteaut, editor, Fast Software Encryption - 19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers, volume 7549 of Lecture Notes in Computer Science, (Springer, 2012), pp 69\u201389"},{"issue":"1","key":"9564_CR44","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/s10623-014-9985-x","volume":"77","author":"J Lu","year":"2015","unstructured":"J. Lu, A methodology for differential-linear cryptanalysis and its applications. Des. Codes Cryptogr., 77(1),11\u201348 (2015)","journal-title":"Des. Codes Cryptogr."},{"key":"9564_CR45","doi-asserted-by":"crossref","unstructured":"M. Matsui, Linear cryptanalysis method for DES cipher. In Tor Helleseth, editor, Advances in Cryptology - EUROCRYPT \u201993, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings, volume 765 of Lecture Notes in Computer Science, (Springer, 1993), pp 386\u2013397","DOI":"10.1007\/3-540-48285-7_33"},{"key":"9564_CR46","doi-asserted-by":"crossref","unstructured":"J. McLaughlin, J.A. Clark, Filtered nonlinear cryptanalysis of reduced-round serpent, and the wrong-key randomization hypothesis. In Martijn Stam, editor, Cryptography and Coding - 14th IMA International Conference, IMACC 2013, Oxford, UK, December 17-19, 2013. Proceedings, volume 8308 of Lecture Notes in Computer Science, (Springer, 2013), pp 120\u2013140","DOI":"10.1007\/978-3-642-45239-0_8"},{"issue":"3","key":"9564_CR47","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1049\/iet-ifs.2016.0060","volume":"11","author":"Z Ma","year":"2017","unstructured":"Z. Ma, T. Tian, W.-F. Qi, Conditional differential attacks on grain-128a stream cipher. IET Inf. Secur., 11(3),139\u2013145 (2017)","journal-title":"IET Inf. Secur."},{"issue":"1","key":"9564_CR48","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1049\/iet-ifs.2015.0427","volume":"11","author":"Z Ma","year":"2017","unstructured":"Z. Ma, T. Tian, W.-F. Qi, Improved conditional differential attacks on Grain v1. IET Information Security, 11(1),46\u201353 (2017)","journal-title":"IET Information Security"},{"issue":"1","key":"9564_CR49","doi-asserted-by":"publisher","first-page":"130","DOI":"10.46586\/tosc.v2021.i1.130-155","volume":"2021","author":"R Rohit","year":"2021","unstructured":"R. Rohit, K. Hu, S. Sarkar, S. Sun, Misuse-free key-recovery and distinguishing attacks on 7-round ascon. IACR Trans. Symmetric Cryptol., 2021(1),130\u2013155 (2021)","journal-title":"IACR Trans. Symmetric Cryptol."},{"issue":"1","key":"9564_CR50","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/s00145-007-9013-7","volume":"21","author":"AA Sel\u00e7uk","year":"2008","unstructured":"A.A. Sel\u00e7uk, On probability of success in linear and differential cryptanalysis. J. Cryptology, 21(1),131\u2013147 (2008)","journal-title":"J. Cryptology"},{"key":"9564_CR51","doi-asserted-by":"crossref","unstructured":"Y. Todo, T. Isobe, W. Meier, K. Aoki, B. Zhang, Fast Correlation Attack Revisited - Cryptanalysis on Full Grain-128a, Grain-128, and Grain-v1. In Hovav Shacham and Alexandra Boldyreva, editors, Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part II, volume 10992 of Lecture Notes in Computer Science, (Springer, 2018), pp 129\u2013159","DOI":"10.1007\/978-3-319-96881-0_5"}],"container-title":["Journal of Cryptology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-025-09564-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00145-025-09564-3","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-025-09564-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T20:00:15Z","timestamp":1770840015000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00145-025-09564-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,18]]},"references-count":51,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,1]]}},"alternative-id":["9564"],"URL":"https:\/\/doi.org\/10.1007\/s00145-025-09564-3","relation":{},"ISSN":["0933-2790","1432-1378"],"issn-type":[{"value":"0933-2790","type":"print"},{"value":"1432-1378","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,18]]},"assertion":[{"value":"10 November 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 October 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 October 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 November 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"7"}}