{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T04:13:20Z","timestamp":1754108000148},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2008,7,2]],"date-time":"2008-07-02T00:00:00Z","timestamp":1214956800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2009,2]]},"DOI":"10.1007\/s10207-008-0059-9","type":"journal-article","created":{"date-parts":[[2008,7,1]],"date-time":"2008-07-01T13:05:39Z","timestamp":1214917539000},"page":"1-11","source":"Crossref","is-referenced-by-count":37,"title":["Related-key rectangle attack on 36 rounds of the XTEA block cipher"],"prefix":"10.1007","volume":"8","author":[{"given":"Jiqiang","family":"Lu","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2008,7,2]]},"reference":[{"key":"59_CR1","doi-asserted-by":"crossref","unstructured":"Biham, E.: New types of cryptanalytic attacks using related keys. In: Helleseth, T. (ed.) Advances in Cryptology\u2014Proceedings of EUROCRYPT \u201993, Workshop on the Theory and Application of of Cryptographic Techniques, Norway, 23\u201327 May 1993. Lecture Notes in Computer Science, vol. 765, pp. 398\u2013409. Springer, Heidelberg (1993)","DOI":"10.1007\/3-540-48285-7_34"},{"key":"59_CR2","doi-asserted-by":"crossref","unstructured":"Biham, E., Biryukov, A., Shamir, A.: Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials. In: Stern, J. (ed.) Advances in Cryptology\u2014Proceedings of EUROCRYPT \u201999, International Conference on the Theory and Application of Cryptographic Techniques, Czech Republic, 2\u20136 May 1999. Lecture Notes in Computer Science, vol. 1592, pp. 12\u201323. Springer, Heidelberg (1999)","DOI":"10.1007\/3-540-48910-X_2"},{"key":"59_CR3","doi-asserted-by":"crossref","unstructured":"Biham, E., Dunkelman, O., Keller, N.: The rectangle attack\u2014rectangling the Serpent. In: Pfitzmann, B. (ed.) Advances in Cryptology\u2014Proceedings of EUROCRYPT \u201901, International Conference on the Theory and Application of Cryptographic Techniques, Austria, 6\u201310 May 2001. Lecture Notes in Computer Science, vol. 2045, pp. 340\u2013357. Springer, Heidelberg (2001)","DOI":"10.1007\/3-540-44987-6_21"},{"key":"59_CR4","doi-asserted-by":"crossref","unstructured":"Biham, E., Dunkelman, O., Keller, N.: Related-key boomerang and rectangle attacks. In: Cramer, R. (ed.) Advances in Cryptology\u2014Proceedings of EUROCRYPT \u201905, the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Denmark, 22\u201326 May 2005. Lecture Notes in Computer Science, vol. 3494, pp. 507\u2013525. Springer, Heidelberg (2005)","DOI":"10.1007\/11426639_30"},{"key":"59_CR5","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4613-9314-6","volume-title":"Differential cryptanalysis of the Data Encryption Standard","author":"E. Biham","year":"1993","unstructured":"Biham E., Shamir A. (1993) Differential cryptanalysis of the Data Encryption Standard. Springer, Heidelberg"},{"key":"59_CR6","doi-asserted-by":"crossref","unstructured":"Hong, S., Hong, D., Ko, Y., Chang, D., Lee, W., Lee, S.: Differential cryptanalysis of TEA and XTEA. In: Lim, J., Lee, D. (eds.) Proceedings of ICISC \u201903, the 6th International Conference on Information Security and Cryptology, Korea, 27\u201328 November 2003. Lecture Notes in Computer Science, vol. 2971, pp. 402\u2013417. Springer, Heidelberg (2004)","DOI":"10.1007\/978-3-540-24691-6_30"},{"key":"59_CR7","doi-asserted-by":"crossref","unstructured":"Hong, S., Kim, J., Lee, S., Preneel, B.: Related-key rectangle attacks on reduced versions of SHACAL-1 and AES-192. In: Gilbert, H., Handschuh, H. (eds.) Proceedings of FSE \u201905, the 12th Fast Software Encryption Workshop, France, 21\u201323 February 2005. Lecture Notes in Computer Science, vol. 3557, pp. 368\u2013383. Springer, Heidelberg (2005)","DOI":"10.1007\/11502760_25"},{"key":"59_CR8","doi-asserted-by":"crossref","unstructured":"Kelsey, J., Schneier, B., Wagner, D.: Key-schedule cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES. In: Koblitz, N. (ed.) Advances in Cryptology\u2014Proceedings of CRYPTO \u201996, the 16th Annual International Cryptology Conference, USA, 18\u201322 August 1996. Lecture Notes in Computer Science, vol. 1109, pp. 237\u2013251. Springer, Heidelberg (1996)","DOI":"10.1007\/3-540-68697-5_19"},{"key":"59_CR9","doi-asserted-by":"crossref","unstructured":"Kelsey, J., Schneier, B., Wagner, D.: Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA. In: Han, Y., Okamoto, T., Qing, S. (eds.) Proceedings of ICICS \u201997, the First International Conference on Information and Communication Security, China, 11\u201314 November 1997. Lecture Notes in Computer Science, vol. 1334, pp. 233\u2013246. Springer, Heidelberg (1997)","DOI":"10.1007\/BFb0028479"},{"key":"59_CR10","doi-asserted-by":"crossref","unstructured":"Kelsey, J., Kohno, T., Schneier, B.: Amplified boomerang attacks against reduced-round MARS and Serpent. In: Schneier, B. (ed.) Proceedings of FSE \u201900, the 7th Fast Software Encryption Workshop, USA, 10\u201312 April 2000. Lecture Notes in Computer Science, vol. 1978, pp. 75\u201393. Springer, Heidelberg (2001)","DOI":"10.1007\/3-540-44706-7_6"},{"key":"59_CR11","doi-asserted-by":"crossref","unstructured":"Kim, J., Kim, G., Hong, S., Lee, S., Hong, Dowon.: The related-key rectangle attack\u2014application to SHACAL-1. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) Proceedings of ACISP \u201904, the 9th Australasian Conference on Information Security and Privacy, Australia, 13\u201315 July 2004. Lecture Notes in Computer Science, vol. 3108, pp. 123\u2013136. Springer, Heidelberg (2004)","DOI":"10.1007\/978-3-540-27800-9_11"},{"key":"59_CR12","doi-asserted-by":"crossref","unstructured":"Knudsen, L.R.: Cryptanalysis of LOKI91. In: Seberry, J., Zheng, Y. (eds.) Advances in Cryptology\u2014Proceedings of ASIACRYPT \u201992, Workshop on the Theory and Application of Cryptographic Techniques, Australia, 13\u201316 December 1992. Lecture Notes in Computer Science, vol. 718, pp. 196\u2013208. Springer, Heidelberg (1993)","DOI":"10.1007\/3-540-57220-1_62"},{"key":"59_CR13","doi-asserted-by":"crossref","unstructured":"Knudsen, L.R.: Trucated and higher order differentials. In: Gollmann, D. (ed.) Proceedings of FSE \u201996, the Third Fast Software Encryption Workshop, UK, 21\u201323 February 1996. Lecture Notes in Computer Science, vol. 1039, pp. 196\u2013211. Springer, Heidelberg (1996)","DOI":"10.1007\/3-540-60590-8_16"},{"key":"59_CR14","unstructured":"Knudsen, L.R.: DEAL\u2014a 128-bit block cipher. Technical report, Department of Informatics, University of Bergen, Norway (1998)"},{"key":"59_CR15","doi-asserted-by":"crossref","unstructured":"Ko, Y., Hong, S., Lee, W., Lee, S., Kang, J.S.: Related key differential attacks on 27 rounds of XTEA and full-round GOST. In: Roy, B., Meier, W. (eds.) Proceedings of FSE \u201904, the 11th Fast Software Encryption Workshop, India, 5\u20137 February 2004. Lecture Notes in Computer Science, vol. 3017, pp. 299\u2013316. Springer, Heidelberg (2004)","DOI":"10.1007\/978-3-540-25937-4_19"},{"key":"59_CR16","doi-asserted-by":"crossref","unstructured":"Lee, E., Hong, D., Chang, D., Hong, S., Lim, J.: A weak key class of XTEA for a related-key rectangle attack. In: Nguyen, P.Q. (Ed.) Progressin Cryptology\u2014Proceedings of VIETCRYPT \u201906, the First International Conferenceon Cryptology in Vietnam, Vietnam, 25\u201328 September 2006. Lecture Notes in Computer Science, vol. 4341, pp. 286\u2013297. Springer, Heidelberg (2006)","DOI":"10.1007\/11958239_19"},{"key":"59_CR17","doi-asserted-by":"crossref","unstructured":"Lipmaa, H., Moriai, S.: Eficient algorithms for computing differential properties of addition. In: Matsui, M. (ed.) Proceedings of FSE \u201901, the 8th Fast Software Encryption Workshop, Japan, 2\u20134 April 2001. Lecture Notes in Computer Science, vol. 2355, pp. 336\u2013350. Springer, Heidelberg (2002)","DOI":"10.1007\/3-540-45473-X_28"},{"key":"59_CR18","doi-asserted-by":"crossref","unstructured":"Lu, J., Kim, J., Keller, N., Dunkelman, O.: Related-key rectangle attack on 42-round SHACAL-2. In: Katsikas, S.K., Lopez, J., Backes, M., Gritzalis, S., Preneel, B. (eds.) Proceedings of ISC \u201906, the 9th Information Security Conference, Greece, 30 August\u20132 September 2006. Lecture Notes in Computer Science, vol. 4176, pp. 85\u2013100. Springer, Heidelberg (2006)","DOI":"10.1007\/11836810_7"},{"key":"59_CR19","doi-asserted-by":"crossref","unstructured":"Moon, D., Hwang, K., Lee, W., Lee, S., Lim, J.: Impossible differential cryptanalysis of reduced round XTEA and TEA. In: Daemen, J., Rijmen, V. (eds.) Proceedings of FSE \u201902, the 9th Fast Software Encryption Workshop, Belgium, 4\u20136 February 2002. Lecture Notes in Computer Science, vol. 2365, pp. 49\u201360. Springer, Heidelberg (2002)","DOI":"10.1007\/3-540-45661-9_4"},{"key":"59_CR20","unstructured":"Needham, R.M., Wheeler, D.J.: TEA extensions. Technical report, the Computer Laboratory, University of Cambridge (1997) Archive available at: http:\/\/www.cl.cam.ac.uk\/ftp\/users\/djw3\/xtea.ps"},{"key":"59_CR21","doi-asserted-by":"crossref","unstructured":"Wagner, D.: The boomerang attack. In: Knudsen, L.R. (ed.) Proceedings of FSE \u201999, the 6th Fast Software Encryption Workshop, Italy, 24\u201326 March 1999. Lecture Notes in Computer Science, vol. 1636, pp. 156\u2013170. Springer, Heidelberg (1999)","DOI":"10.1007\/3-540-48519-8_12"},{"key":"59_CR22","doi-asserted-by":"crossref","unstructured":"Wheeler, D.J., Needham, R.M.: TEA, a tiny encryption algorithm. In: Preneel, B. (ed.) Proceedings of FSE \u201994, the Second Fast Software Encryption Workshop, Belgium, 14\u201316 December 1994. Lecture Notes in Computer Science, vol. 1008, pp. 363\u2013366. Springer, Heidelberg (1995)","DOI":"10.1007\/3-540-60590-8_29"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-008-0059-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-008-0059-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-008-0059-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T07:01:23Z","timestamp":1559113283000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-008-0059-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,7,2]]},"references-count":22,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2009,2]]}},"alternative-id":["59"],"URL":"https:\/\/doi.org\/10.1007\/s10207-008-0059-9","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,7,2]]}}}