{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T12:12:06Z","timestamp":1773231126918,"version":"3.50.1"},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"1-2","license":[{"start":{"date-parts":[[2009,5,9]],"date-time":"2009-05-09T00:00:00Z","timestamp":1241827200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computing"],"published-print":{"date-parts":[[2009,6]]},"DOI":"10.1007\/s00607-009-0034-y","type":"journal-article","created":{"date-parts":[[2009,5,8]],"date-time":"2009-05-08T12:06:08Z","timestamp":1241784368000},"page":"85-104","source":"Crossref","is-referenced-by-count":24,"title":["Computational aspects of the expected differential probability of 4-round AES and AES-like ciphers"],"prefix":"10.1007","volume":"85","author":[{"given":"Joan","family":"Daemen","sequence":"first","affiliation":[]},{"given":"Mario","family":"Lamberger","sequence":"additional","affiliation":[]},{"given":"Norbert","family":"Pramstaller","sequence":"additional","affiliation":[]},{"given":"Vincent","family":"Rijmen","sequence":"additional","affiliation":[]},{"given":"Frederik","family":"Vercauteren","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,5,9]]},"reference":[{"key":"34_CR1","unstructured":"Beth T, Ding C (1993) On Almost Perfect Nonlinear Permutations. In: EUROCRYPT. Lecture Notes in Computer Science, vol 765. Springer, Heidelberg, pp 65\u201376"},{"key":"34_CR2","first-page":"67","volume-title":"CRYPTO. Lecture Notes in Computer Science, vol 537","author":"E Biham","year":"1990","unstructured":"Biham E, Shamir A (1990) Differential Cryptanalysis of DES-like Cryptosystems. In: Menezes A, Vanstone SA (eds) CRYPTO. Lecture Notes in Computer Science, vol 537. Springer, Heidelberg, pp 67\u201375"},{"key":"34_CR3","doi-asserted-by":"crossref","unstructured":"Biryukov A (2007) The design of a stream Cipher LEX. Selected areas in cryptography. Lecture Notes in Computer Science, vol 4356. Springer, Heidelberg, pp 67\u201375","DOI":"10.1007\/978-3-540-74462-7_6"},{"key":"34_CR4","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The design of Rijndael: AES\u2014the advanced encryption standard","author":"J Daemen","year":"2002","unstructured":"Daemen J, Rijmen V (2002) The design of Rijndael: AES\u2014the advanced encryption standard. Springer, Heidelberg"},{"key":"34_CR5","unstructured":"Daemen J, Rijmen V (2005) The Pelican MAC Function. Cryptology ePrint Archive, Report 2005\/088. http:\/\/eprint.iacr.org\/"},{"key":"34_CR6","first-page":"78","volume-title":"SCN. Lecture Notes in Computer Science, vol 4116","author":"J Daemen","year":"2006","unstructured":"Daemen J, Rijmen V (2006) Understanding two-round differentials in AES. In: De Prisco R, Yung M (eds) SCN. Lecture Notes in Computer Science, vol 4116. Springer, Heidelberg, pp 78\u201394"},{"issue":"6","key":"34_CR7","doi-asserted-by":"crossref","first-page":"639","DOI":"10.2307\/2314805","volume":"73","author":"SD Fisher","year":"1966","unstructured":"Fisher SD (1966) Classroom notes: matrices over a finite field. Am Math Mon 73(6): 639\u2013641","journal-title":"Am Math Mon"},{"key":"34_CR8","first-page":"273","volume-title":"FSE. Lecture Notes in Computer Science, vol 1978","author":"S Hong","year":"2000","unstructured":"Hong S, Lee S, Lim J, Sung J, Cheon DH, Cho I (2000) Provable Security against Differential and Linear Cryptanalysis for the SPN Structure. In: Schneier B (eds) FSE. Lecture Notes in Computer Science, vol 1978. Springer, Heidelberg, pp 273\u2013283"},{"key":"34_CR9","first-page":"420","volume-title":"EUROCRYPT. Lecture Notes in Computer Science, vol 2045","author":"L Keliher","year":"2001","unstructured":"Keliher L, Meijer H, Tavares SE (2001) New method for upper bounding the maximum average linear hull probability for SPNs. In: Pfitzmann B (eds) EUROCRYPT. Lecture Notes in Computer Science, vol 2045. Springer, Heidelberg, pp 420\u2013436"},{"key":"34_CR10","first-page":"42","volume-title":"AES4 Conference Lecture Notes in Computer Science, vol 3373","author":"L Keliher","year":"2004","unstructured":"Keliher L (2004) Refined analysis of bounds related to linear and differential cryptanalysis for the AES. In: Dobbertin H, Rijmen V, Sowa A (eds) AES4 Conference Lecture Notes in Computer Science, vol 3373. Springer, Heidelberg, pp 42\u201357"},{"issue":"2","key":"34_CR11","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1049\/iet-ifs:20060161","volume":"1","author":"L Keliher","year":"2007","unstructured":"Keliher L, Sui J (2007) Exact maximum expected differential and linear probability for 2-round advanced encryption standard (AES). IET Inf Secur 1(2): 53\u201357","journal-title":"IET Inf Secur"},{"key":"34_CR12","doi-asserted-by":"crossref","unstructured":"Lai X, Massey JL, Murphy S (1991) Markov ciphers and differential cryptanalysis. In: Advances in Cryptology\u2014EUROCRYPT \u201991 (Brighton, 1991). Lecture Notes in Computer Science, vol 547. Springer, Berlin, pp 17\u201338","DOI":"10.1007\/3-540-46416-6_2"},{"key":"34_CR13","volume-title":"Finite fields, Encyclopedia of mathematics and its applications","author":"R Lidl","year":"1997","unstructured":"Lidl R, Niederreiter H (1997) Finite fields, Encyclopedia of mathematics and its applications, 2nd edn. Cambridge University Press, Cambridge","edition":"2"},{"key":"34_CR14","first-page":"386","volume-title":"Lecture Notes in Computer Science, vol 765","author":"M Matsui","year":"1993","unstructured":"Matsui M (1993) Linear Cryptoanalysis Method for DES Cipher EUROCRYPT. In: Helleseth T (eds) Lecture Notes in Computer Science, vol 765. Springer, Heidelberg, pp 386\u2013397"},{"key":"34_CR15","first-page":"226","volume-title":"FSE. Lecture Notes in Computer Science, vol 4047","author":"K Minematsu","year":"2006","unstructured":"Minematsu K, Tsunoo Y (2006) Provably secure MACs from differentially-uniform permutations and AES-based implementations. In: Robshaw M (eds) FSE. Lecture Notes in Computer Science, vol 4047. Springer, Heidelberg, pp 226\u2013241"},{"key":"34_CR16","first-page":"176","volume-title":"ASIACRYPT. Lecture Notes in Computer Science, vol 2501","author":"S Park","year":"2002","unstructured":"Park S, Sung SH, Chee S, Yoon E-J, Lim J (2002) On the security of Rijndael-like structures against differential and linear cryptanalysis. In: Zheng Y (eds) ASIACRYPT. Lecture Notes in Computer Science, vol 2501. Springer, Heidelberg, pp 176\u2013191"},{"key":"34_CR17","first-page":"247","volume-title":"FSE. Lecture Notes in Computer Science, vol 2887","author":"S Park","year":"2003","unstructured":"Park S, Sung SH, Lee S, Lim J (2003) Improving the upper bound on the maximum differential and the maximum linear hull probability for SPN structures and AES. In: Johansson T (eds) FSE. Lecture Notes in Computer Science, vol 2887. Springer, Heidelberg, pp 247\u2013260"}],"container-title":["Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-009-0034-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00607-009-0034-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-009-0034-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T10:30:21Z","timestamp":1559125821000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00607-009-0034-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,5,9]]},"references-count":17,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2009,6]]}},"alternative-id":["34"],"URL":"https:\/\/doi.org\/10.1007\/s00607-009-0034-y","relation":{},"ISSN":["0010-485X","1436-5057"],"issn-type":[{"value":"0010-485X","type":"print"},{"value":"1436-5057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,5,9]]}}}