{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T03:20:34Z","timestamp":1740108034353,"version":"3.37.3"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"25","license":[{"start":{"date-parts":[[2023,6,3]],"date-time":"2023-06-03T00:00:00Z","timestamp":1685750400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,6,3]],"date-time":"2023-06-03T00:00:00Z","timestamp":1685750400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2023,9]]},"DOI":"10.1007\/s00521-023-08654-2","type":"journal-article","created":{"date-parts":[[2023,6,3]],"date-time":"2023-06-03T15:01:23Z","timestamp":1685804483000},"page":"18343-18355","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Detection of non-trivial preservable quotient spaces in S-Box(es)"],"prefix":"10.1007","volume":"35","author":[{"given":"Shah","family":"Fahd","sequence":"first","affiliation":[]},{"given":"Mehreen","family":"Afzal","sequence":"additional","affiliation":[]},{"given":"Dawood","family":"Shah","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3616-2621","authenticated-orcid":false,"given":"Waseem","family":"Iqbal","sequence":"additional","affiliation":[]},{"given":"Yawar","family":"Abbas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,3]]},"reference":[{"key":"8654_CR1","doi-asserted-by":"crossref","unstructured":"Aoki K, Ichikawa T, Kanda M, Matsui M, Moriai S, Nakajima J, Tokita T (2000) Camellia: A 128-bit block cipher suitable for multiple platforms-design andanalysis. In: International workshop on selected areas in cryptography, pp 39\u201356. Springer","DOI":"10.1007\/3-540-44983-3_4"},{"key":"8654_CR2","unstructured":"Banik S, Chakraborti A, Inoue A, Iwata T, Minematsu K, Nandi M, Peyrin T, Sasaki Y, Sim SM, Todo Y (2020) Gift-cofb. Cryptology ePrint Archive"},{"key":"8654_CR3","unstructured":"Bannier A (2017) Combinatorial analysis of block ciphers with trapdoors. Ph.D. thesis, \u00c9cole Nationale Sup\u00e9rieure d\u2019Arts et M\u00e9tiers"},{"key":"8654_CR4","doi-asserted-by":"crossref","unstructured":"Bannier A, Filiol E (2017) Mathematical backdoors in symmetric encryption systems-proposal for a backdoored aes-like block cipher. arXiv preprint arXiv:1702.06475","DOI":"10.5220\/0006244406220631"},{"key":"8654_CR5","unstructured":"Bao Z, Chakraborti A, Datta N, Guo J, Nandi M, Peyrin T, Yasuda K (2019) Photon-beetle authenticated encryption and hash family. NIST Lightweight Compet. Round 1, 115"},{"key":"8654_CR6","doi-asserted-by":"crossref","unstructured":"Behera PK, Gangopadhyay S (2021) Evolving bijective s-boxes using hybrid adaptive genetic algorithm with optimal cryptographic properties. J Ambient Intell Human Comput, pp 1\u201318","DOI":"10.1007\/s12652-021-03392-6"},{"key":"8654_CR7","doi-asserted-by":"crossref","unstructured":"Bernstein DJ, Lange T, Niederhagen R (2016) Dual ec: A standardized back door. In: The new codebreakers, pp 256\u2013281. Springer","DOI":"10.1007\/978-3-662-49301-4_17"},{"issue":"11","key":"8654_CR8","doi-asserted-by":"publisher","first-page":"5139","DOI":"10.1007\/s12652-020-01829-y","volume":"11","author":"A Boluf\u00e9-R\u00f6hler","year":"2020","unstructured":"Boluf\u00e9-R\u00f6hler A, Tamayo-Vera D (2020) Machine learning based metaheuristic hybrids for s-box optimization. J Ambient Intell Human Comput 11(11):5139\u20135152","journal-title":"J Ambient Intell Human Comput"},{"key":"8654_CR9","unstructured":"Budaghyan L, Carlet C (2009) Ccz-equivalence and boolean functions. Cryptol ePrint Arch"},{"key":"8654_CR10","unstructured":"Canteaut A (2016) Lecture notes on cryptographic boolean functions. Inria, Paris, France 3"},{"key":"8654_CR11","doi-asserted-by":"crossref","unstructured":"Carlet C (2010) Boolean models and methods in mathematics, computer science, and engineering. Vector Boolean Functions Cryptogr","DOI":"10.1017\/CBO9780511780448.012"},{"key":"8654_CR12","unstructured":"Diffie W, Ledin G (2008) Sms4 encryption algorithm for wireless networks. Cryptol ePrint Arch"},{"key":"8654_CR13","unstructured":"Dobraunig C, Eichlseder M, Mendel F, Schl\u00e4ffer M (2016) Ascon v1. 2. Submission to the CAESAR Competition 5(6):7"},{"key":"8654_CR14","unstructured":"Dobraunig C, Mennink B (2019) Elephant v1. Submission to NIST lightweight cryptography project"},{"key":"8654_CR15","first-page":"10","volume":"50","author":"V Dolmatov","year":"2016","unstructured":"Dolmatov V (2016) Gost r 34.12-2015: Block cipher \u201ckuznyechik\u2019\u2019. Transformation 50:10","journal-title":"Transformation"},{"key":"8654_CR16","doi-asserted-by":"publisher","first-page":"709","DOI":"10.2307\/3312529","volume":"143","author":"AM Froomkin","year":"1994","unstructured":"Froomkin AM (1994) Metaphor is the key: cryptography, the clipper chip, and the constitution. U Pa L Rev 143:709","journal-title":"U Pa L Rev"},{"key":"8654_CR17","unstructured":"Harpes C (1996) Cryptanalysis of iterated block ciphers. Ph.D. thesis, ETH Zurich"},{"key":"8654_CR18","doi-asserted-by":"crossref","unstructured":"Harpes C, Massey JL (1997) Partitioning cryptanalysis. In: International workshop on fast software encryption, pp 13\u201327. Springer","DOI":"10.1007\/BFb0052331"},{"issue":"1","key":"8654_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/0012-365X(75)90091-6","volume":"12","author":"W Hsieh","year":"1975","unstructured":"Hsieh W (1975) Intersection theorems for systems of finite vector spaces. Discrete Math 12(1):1\u201316","journal-title":"Discrete Math"},{"issue":"1","key":"8654_CR20","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00206323","volume":"1","author":"BS Kaliski","year":"1988","unstructured":"Kaliski BS, Rivest RL, Sherman AT (1988) Is the data encryption standard a group? (results of cycling experiments on des). J Cryptol 1(1):3\u201336","journal-title":"J Cryptol"},{"key":"8654_CR21","doi-asserted-by":"crossref","unstructured":"Khairallah M (2022) Romulus: Lighweight aead from tweakable block ciphers. In: Hardware oriented authenticated encryption based on tweakable block ciphers, pp 115\u2013134. Springer","DOI":"10.1007\/978-981-16-6344-4_6"},{"key":"8654_CR22","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1109\/PGEC.1964.263724","volume":"5","author":"CS Lorens","year":"1964","unstructured":"Lorens CS (1964) Invertible boolean functions. IEEE Trans Electronic Comput 5:529\u2013541","journal-title":"IEEE Trans Electronic Comput"},{"key":"8654_CR23","doi-asserted-by":"crossref","unstructured":"Makarim RH, Tezcan C (2014) Relating undisturbed bits to other properties of substitution boxes. In: International workshop on lightweight cryptography for security and privacy, pp 109\u2013125. Springer","DOI":"10.1007\/978-3-319-16363-5_7"},{"key":"8654_CR24","doi-asserted-by":"crossref","unstructured":"Matsui M (1994) On correlation between the order of s-boxes and the strength of des. In: Workshop on the theory and application of of cryptographic techniques, pp 366\u2013375. Springer","DOI":"10.1007\/BFb0053451"},{"key":"8654_CR25","unstructured":"Miller G (2020) The intelligence coup of the century. https:\/\/www.washingtonpost.com\/graphics\/2020\/world\/national-security\/cia-crypto-encryption-machines-espionage\/. [Online; accessed 11-Feb-2020]"},{"key":"8654_CR26","doi-asserted-by":"crossref","unstructured":"Ohkuma K, Muratani H, Sano F, Kawamura S (2000) The block cipher hierocrypt. In: International workshop on selected areas in cryptography, pp 72\u201388. Springer","DOI":"10.1007\/3-540-44983-3_6"},{"key":"8654_CR27","doi-asserted-by":"crossref","unstructured":"Paterson KG (1999) Imprimitive permutation groups and trapdoors in iterated block ciphers. In: International workshop on fast software encryption, pp 201\u2013214. Springer","DOI":"10.1007\/3-540-48519-8_15"},{"key":"8654_CR28","doi-asserted-by":"crossref","unstructured":"Perrin L (2019) Partitions in the s-box of streebog and kuznyechik. IACR Trans Symmetric Cryptol, pp 302\u2013329","DOI":"10.46586\/tosc.v2019.i1.302-329"},{"key":"8654_CR29","unstructured":"Perrin L (2019) Streebog and kuznyechik: inconsistencies in the claims of their designers. In: IETF 105"},{"key":"8654_CR30","doi-asserted-by":"crossref","unstructured":"Peyrin T, Wang H (2020) The malicious framework: embedding backdoors into tweakable block ciphers. In: Annual international cryptology conference, pp 249\u2013278. Springer","DOI":"10.1007\/978-3-030-56877-1_9"},{"key":"8654_CR31","first-page":"442","volume":"2021","author":"R Posteuca","year":"2021","unstructured":"Posteuca R, Ashur T (2021) How to backdoor a cipher. IACR Cryptol ePrint Arch 2021:442","journal-title":"IACR Cryptol ePrint Arch"},{"key":"8654_CR32","doi-asserted-by":"crossref","unstructured":"Ragab AAM, Madani A, Wahdan A, Selim GM (2021) Design, analysis, and implementation of a new lightweight block cipher for protecting iot smart devices. J Ambient Intell Human Comput, pp 1\u201318","DOI":"10.1007\/s12652-020-02782-6"},{"key":"8654_CR33","unstructured":"Rijmen V, Daemen J (2001) Advanced encryption standard. In: Proceedings of federal information processing standards publications. National Institute of Standards and Technology 19:22"},{"key":"8654_CR34","doi-asserted-by":"crossref","unstructured":"Rijmen V, Preneel B (1997) A family of trapdoor ciphers. In: International workshop on fast software encryption, pp 139\u2013148. Springer","DOI":"10.1007\/BFb0052342"},{"issue":"2","key":"8654_CR35","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1080\/0025570X.2001.11953045","volume":"74","author":"RL Roth","year":"2001","unstructured":"Roth RL (2001) A history of Lagrange\u2019s theorem on groups. Math Mag 74(2):99\u2013108","journal-title":"Math Mag"},{"key":"8654_CR36","unstructured":"Schuster F (2014) Reverse engineering of chiasmus from gstool. In: Presentation at the HGI-Kolloquium, January 2014"},{"key":"8654_CR37","doi-asserted-by":"crossref","unstructured":"Sevin A, Mohammed AAO (2021) A survey on software implementation of lightweight block ciphers for iot devices. J Ambient Intell Human Comput, pp 1\u201315","DOI":"10.1007\/s12652-021-03395-3"},{"key":"8654_CR38","doi-asserted-by":"crossref","unstructured":"Shirai T, Shibutani K, Akishita T, Moriai S, Iwata T (2007) The 128-bit blockcipher clefia. In: International workshop on fast software encryption, pp 181\u2013195. Springer","DOI":"10.1007\/978-3-540-74619-5_12"},{"key":"8654_CR39","unstructured":"Standard DE et\u00a0al. (1999) Data encryption standard. Federal Inf Process Stand Publ, 112"},{"key":"8654_CR40","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1016\/j.cam.2013.06.023","volume":"259","author":"C Tezcan","year":"2014","unstructured":"Tezcan C (2014) Improbable differential attacks on present using undisturbed bits. J Comput Appl Math 259:503\u2013511","journal-title":"J Comput Appl Math"},{"key":"8654_CR41","first-page":"1142","volume":"25","author":"CE Torkelson","year":"1994","unstructured":"Torkelson CE (1994) The clipper chip: How key escrow threatens to undermine the fourth amendment. Seton Hall L Rev 25:1142","journal-title":"Seton Hall L Rev"},{"key":"8654_CR42","doi-asserted-by":"crossref","unstructured":"Turan MS, McKay KA, \u00c7alik \u00c7, Chang D, Bassham L et\u00a0al. (2019) Status report on the first round of the nist lightweight cryptography standardization process. National Institute of Standards and Technology, Gaithersburg, MD, NIST Interagency\/Internal Rep.(NISTIR)","DOI":"10.6028\/NIST.IR.8268"},{"issue":"1","key":"8654_CR43","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1023\/A:1008359713877","volume":"19","author":"XM Zhang","year":"2000","unstructured":"Zhang XM, Zheng Y, Imai H (2000) Relating differential distribution tables to other properties of of substitution boxes. Des Codes Cryptogr 19(1):45\u201363","journal-title":"Des Codes Cryptogr"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-023-08654-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00521-023-08654-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-023-08654-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,22]],"date-time":"2023-08-22T08:15:06Z","timestamp":1692692106000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00521-023-08654-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,3]]},"references-count":43,"journal-issue":{"issue":"25","published-print":{"date-parts":[[2023,9]]}},"alternative-id":["8654"],"URL":"https:\/\/doi.org\/10.1007\/s00521-023-08654-2","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"type":"print","value":"0941-0643"},{"type":"electronic","value":"1433-3058"}],"subject":[],"published":{"date-parts":[[2023,6,3]]},"assertion":[{"value":"6 August 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 May 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 June 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"There is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}