{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T04:27:29Z","timestamp":1744086449359,"version":"3.40.3"},"reference-count":12,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100006407","name":"Natural Science Foundation of Henan","doi-asserted-by":"crossref","award":["Grant No: 222300420100"],"award-info":[{"award-number":["Grant No: 222300420100"]}],"id":[{"id":"10.13039\/501100006407","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Theory Comput Syst"],"published-print":{"date-parts":[[2025,3]]},"DOI":"10.1007\/s00224-025-10216-z","type":"journal-article","created":{"date-parts":[[2025,3,5]],"date-time":"2025-03-05T09:08:35Z","timestamp":1741165715000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Improved Methods to Solve Nonlinear Invariants with Low Algebraic Degree for Linear Transformation"],"prefix":"10.1007","volume":"69","author":[{"given":"Zebin","family":"Wang","sequence":"first","affiliation":[]},{"given":"Chenhui","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Jiyan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Ting","family":"Cui","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,5]]},"reference":[{"key":"10216_CR1","doi-asserted-by":"crossref","unstructured":"Biham, E., Shamir, A.: Differential Cryptanalysis of DES-like Cryptosystems. J. Cryptol. 4, pp. 3\u201372. (1991)","DOI":"10.1007\/BF00630563"},{"key":"10216_CR2","doi-asserted-by":"crossref","unstructured":"Matsui, M.: Linear Cryptanalysis Method for DES Cipher. EUROCRYPT 1993, LNCS 765, pp. 386\u2013397. (1993)","DOI":"10.1007\/3-540-48285-7_33"},{"key":"10216_CR3","doi-asserted-by":"crossref","unstructured":"Todo, Y., Leander, G., Sasaki, Y.: Nonlinear invariant attacks: practical attack on full SCREAM, iSCREAM, and Midori64. ASIACRYPT 2016, Part II, LNCS 10032, pp. 3\u201333. (2016)","DOI":"10.1007\/978-3-662-53890-6_1"},{"key":"10216_CR4","unstructured":"Grosso, V., Leurent, G., Standaert, F.-X., Varici, K., et al.: SCREAM v3. Submission to CAESAR competition. (2015)"},{"key":"10216_CR5","unstructured":"Grosso, V., Leurent, G., Standaert, F.-X., Varici, K., et al.: SCREAM v1. Submission to CAESAR competition. (2014)"},{"key":"10216_CR6","doi-asserted-by":"crossref","unstructured":"Banik, S., Bogdanov, A., Isobe, T., et al.: Midori: a block cipher for low energy. ASIACRYPT 2015. LNCS 9453, vol. 9453, pp. 411\u2013436. (2015)","DOI":"10.1007\/978-3-662-48800-3_17"},{"key":"10216_CR7","doi-asserted-by":"crossref","unstructured":"Grosso, V., Leurent, G., et al.: LS-Designs: bitslice encryption for efficient masked software implementations. FSE. LNCS 8540, pp. 18\u201337. (2014)","DOI":"10.1007\/978-3-662-46706-0_2"},{"key":"10216_CR8","doi-asserted-by":"crossref","unstructured":"Beierle, C., Canteaut, A., Leander, G., et al.: Proving resistance against invariant attacks: How to choose the round constants. CRYPTO 2017, Part II, LNCS 10402, pp. 647\u2013678. (2017)","DOI":"10.1007\/978-3-319-63715-0_22"},{"key":"10216_CR9","unstructured":"Wei, Y., Ye, T., Wu, W., et al.: Cycle structure of generalized and closed loop invariants. Cryptology ePrint Archive, Report 2020\/1095. http:\/\/eprint.iacr.org\/2020\/1095. (2020)"},{"key":"10216_CR10","doi-asserted-by":"crossref","unstructured":"Wei, Y., Ye, T., Wu, W., et al.: Generalized nonlinear invariant attack and a new Design criterion for round constants. IACR Trans. Symmetric Cryptol. 4, pp. 62\u201379. (2018)","DOI":"10.46586\/tosc.v2018.i4.62-79"},{"key":"10216_CR11","doi-asserted-by":"crossref","unstructured":"Tong, H., Shen, X., Li, C., et al.: Improved nonlinear invariant attack. SCIENCE CHINA Information Sciences, 65, 139103. (2022)","DOI":"10.1007\/s11432-019-2632-1"},{"key":"10216_CR12","unstructured":"Claude, C.: Boolean functions for cryptography and error correcting codes. Cambridge University Press, pp. 9\u201321. (2010)"}],"container-title":["Theory of Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00224-025-10216-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00224-025-10216-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00224-025-10216-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T01:42:59Z","timestamp":1744076579000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00224-025-10216-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3]]},"references-count":12,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,3]]}},"alternative-id":["10216"],"URL":"https:\/\/doi.org\/10.1007\/s00224-025-10216-z","relation":{},"ISSN":["1432-4350","1433-0490"],"issn-type":[{"type":"print","value":"1432-4350"},{"type":"electronic","value":"1433-0490"}],"subject":[],"published":{"date-parts":[[2025,3]]},"assertion":[{"value":"17 February 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 March 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"15"}}