{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T14:49:12Z","timestamp":1648565352746},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2008,8,30]],"date-time":"2008-08-30T00:00:00Z","timestamp":1220054400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2009,3]]},"DOI":"10.1007\/s10623-008-9234-2","type":"journal-article","created":{"date-parts":[[2008,8,29]],"date-time":"2008-08-29T16:18:22Z","timestamp":1220026702000},"page":"325-338","source":"Crossref","is-referenced-by-count":0,"title":["Provable security of block ciphers against linear cryptanalysis: a mission impossible?"],"prefix":"10.1007","volume":"50","author":[{"given":"Gilles","family":"Piret","sequence":"first","affiliation":[]},{"given":"Fran\u00e7ois-Xavier","family":"Standaert","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2008,8,30]]},"reference":[{"key":"9234_CR1","unstructured":"Biryukov A., De Canni\u00e8re C., Quisquater M.: On multiple linear approximations. In: Franklin M.K. (ed.) Proceedings of the 24th Annual International Cryptology Conference: Advances in Cryptology\u2014 CRYPTO 2004, Santa Barbara, California, USA, 15\u201319 August 2004. Lecture Notes in Computer Science, vol. 3152, pp. 1\u201322. Springer, Berlin (2004)."},{"key":"9234_CR2","doi-asserted-by":"crossref","unstructured":"Borst J., Preneel B., Vandewalle J.: Linear cryptanalysis of RC5 and RC6. In: Knudsen L.R. (ed.) Proceedings of the 6th International Workshop on Fast Software Encryption (FSE \u201999), Rome, Italy, 24\u201326 March 1999. Lecture Notes in Computer Science, vol. 1636, pp. 16\u201330. Springer-Verlag, Berlin (1999).","DOI":"10.1007\/3-540-48519-8_2"},{"issue":"346","key":"9234_CR3","doi-asserted-by":"crossref","first-page":"364","DOI":"10.1080\/01621459.1974.10482955","volume":"69","author":"B. Brown","year":"1974","unstructured":"Brown B., Forsythe A.B.: Robust tests for the equality of variances. J. Am. Stat. Assoc. 69(346), 364\u2013367 (1974)","journal-title":"J. Am. Stat. Assoc."},{"key":"9234_CR4","unstructured":"Daemen J., Rijmen V.: The wide trail design strategy. In: Honary B. (ed.) Proceedings of the 8th IMA International Conference on Cryptography and Coding, Cirencester, UK, 17\u201319 December 2001. Lecture Notes in Computer Science, vol. 2260, pp. 222\u2013238. Springer, Berlin (2001)."},{"key":"9234_CR5","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The Design of Rijndael: AES\u2014The Advanced Encryption Standard","author":"J. Daemen","year":"2002","unstructured":"Daemen J., Rijmen V.: The Design of Rijndael: AES\u2014The Advanced Encryption Standard. Springer, Berlin (2002)"},{"key":"9234_CR6","unstructured":"Daemen J., Rijmen V.: Probability distributions of correlation and differentials in block ciphers. Cryptology ePrint Archive, Report 2005\/212 (2005). http:\/\/eprint.iacr.org\/ . Accessed 20 Aug 2008."},{"key":"9234_CR7","doi-asserted-by":"crossref","unstructured":"Harpes C., Kramer G.G., Massey J.L.: A generalization of linear cryptanalysis and the applicability of Matsui\u2019s piling-up lemma. In: Guillou L.C., Quisquater J.-J. (eds.) Proceedings: Advances in Cryptology\u2014EUROCRYPT \u201995, Saint-Malo, France, 21\u201325 May, pp. 24\u201338 (1995).","DOI":"10.1007\/3-540-49264-X_3"},{"key":"9234_CR8","doi-asserted-by":"crossref","unstructured":"Junod P.: On the optimality of linear, differential, and sequential distinguishers. In: Biham E. (ed.) Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology\u2014EUROCRYPT 2003, Warsaw, Poland, 4\u20138 May 2003. Lecture Notes in Computer Science, vol. 2656, pp. 17\u201332. Springer, Berlin (2003).","DOI":"10.1007\/3-540-39200-9_2"},{"key":"9234_CR9","doi-asserted-by":"crossref","unstructured":"Keliher L., Meijer H., Tavares S.E.: New method for upper bounding the maximum average linear hull probability for SPNs. In: Pfitzmann B. (ed.) Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology\u2014EUROCRYPT 2001, Innsbruck, Austria, 6\u201310 May 2001. Lecture Notes in Computer Science, vol. 2045, pp. 420\u2013436. Springer, Berlin (2001).","DOI":"10.1007\/3-540-44987-6_26"},{"key":"9234_CR10","doi-asserted-by":"crossref","unstructured":"Knudsen L.R.: Practically secure Feistel ciphers. In: Anderson R.J. (ed.) Proceedings of the Cambridge Security Workshop on Fast Software Encryption, Cambridge, UK, 9\u201311 December 1993. Lecture Notes in Computer Science, vol. 809, pp. 211\u2013221. Springer, Berlin (1994).","DOI":"10.1007\/3-540-58108-1_26"},{"key":"9234_CR11","doi-asserted-by":"crossref","unstructured":"Knudsen L.R., Mathiassen J.E.: On the role of key schedules in attacks on iterated ciphers. In: Samarati P., Ryan P.Y.A., Gollmann D., Molva R. (eds.) Proceedings of the 9th European Symposium on Research Computer Security: Computer Security\u2014ESORICS 2004, Sophia Antipolis, France, 13\u201315 September 2004. Lecture Notes in Computer Science, vol. 3193, pp. 322\u2013334. Springer, Berlin (2004).","DOI":"10.1007\/978-3-540-30108-0_20"},{"key":"9234_CR12","unstructured":"Knudsen L.R., Rijmen V.: On the decorrelated fast cipher (DFC) and its theory. In: Knudsen L.R. (ed.) Proceedings of the 6th International Workshop on Fast Software Encryption (FSE \u201999), Rome, Italy, 24\u201326 March 1999. Lecture Notes in Computer Science, vol. 1636, pp. 81\u201394. Springer-Verlag, Berlin (1999)."},{"key":"9234_CR13","unstructured":"Lai X., Massey J.L.: Markov ciphers and differential cryptoanalysis. In: Davies D.W. (ed.) Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques: Advances in Cryptology\u2014EUROCRYPT \u201991, Brighton, UK, 8\u201311 April 1991. Lecture Notes in Computer Science, vol. 547, pp. 17\u201338. Springer, Berlin (1991)."},{"key":"9234_CR14","doi-asserted-by":"crossref","unstructured":"Matsui M.: The first experimental cryptanalysis of the data encryption standard. In: Desmedt Y. (ed.) Proceedings of the 14th Annual International Cryptology Conference: Advances in Cryptology\u2014CRYPTO~\u201994, Santa Barbara, CA, USA, 21\u201325 August 1994. Lecture Notes in Computer Science, vol. 839, pp. 1\u201311. Springer, Berlin (1994).","DOI":"10.1007\/3-540-48658-5_1"},{"key":"9234_CR15","doi-asserted-by":"crossref","unstructured":"Matsui M.: New structure of block ciphers with provable security against differential and linear cryptanalysis. In: Gollmann D. (ed.) Proceedings of the 3rd International Workshop on Fast Software Encryption, Cambridge, UK, 21\u201323 February 1996. Lecture Notes in Computer Science, vol. 1039, pp. 205\u2013218. Springer, Berlin (1996).","DOI":"10.1007\/3-540-60865-6_54"},{"key":"9234_CR16","doi-asserted-by":"crossref","unstructured":"Nyberg K.: Linear approximation of block ciphers. In: De Santis A. (ed.) Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques: Advances in Cryptology\u2014EUROCRYPT\u201994, Perugia, Italy, 9\u201312 May 1994. Lecture Notes in Computer Science, vol. 950, pp. 439\u2013444. Springer, Berlin (1995).","DOI":"10.1007\/BFb0053460"},{"key":"9234_CR17","unstructured":"Rijmen V.: Cryptanalysis and design of iterated block ciphers. Ph.D. thesis, KULeuven (1997)."},{"key":"9234_CR18","unstructured":"Sel\u00e7uk A.A.: New results in linear cryptanalysis of RC5. In: Vaudenay S. (ed.) Proceedings of the 5th International Workshop on Fast Software Encryption (FSE \u201998), Paris, France, 23\u201325 March 1998. Lecture Notes in Computer Science, vol. 1372, pp. 1\u201316. Springer-Verlag, Berlin (1998)."},{"key":"9234_CR19","unstructured":"Sel\u00e7uk A.A.: On bias estimation in linear cryptanalysis. In: Roy B.K., Okamoto E. (eds.) Proceedings of the 1st International Conference in Cryptology in India: Progress in Cryptology\u2014INDOCRYPT 2000, Calcutta, India, 10\u201313 December 2000. Lecture Notes in Computer Science, vol. 1977, pp. 52\u201366. Springer-Verlag, Berlin (2000)."},{"key":"9234_CR20","doi-asserted-by":"crossref","unstructured":"Vaudenay S.: On the security of CS-cipher. In: Knudsen L.R. (ed.) Proceedings of the 6th International Workshop on Fast Software Encryption (FSE \u201999), Rome, Italy, 24\u201326 March 1999. Lecture Notes in Computer Science, vol. 1636, pp. 260\u2013274. Springer, Berlin (1999).","DOI":"10.1007\/3-540-48519-8_19"},{"issue":"4","key":"9234_CR21","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1007\/s00145-003-0220-6","volume":"16","author":"S. Vaudenay","year":"2003","unstructured":"Vaudenay S.: Decorrelation: A theory for block cipher security. J. Cryptol. 16(4), 249\u2013286 (2003)","journal-title":"J. Cryptol."},{"key":"9234_CR22","doi-asserted-by":"crossref","unstructured":"Wagner D.: The boomerang attack. In: Knudsen L.R. (ed.) Proceedings of the 6th International Workshop on Fast Software Encryption (FSE \u201999), Rome, Italy, 24\u201326 March 1999. Lecture Notes in Computer Science, vol. 1636, pp. 156\u2013170. Springer-Verlag, Berlin (1999).","DOI":"10.1007\/3-540-48519-8_12"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-008-9234-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-008-9234-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-008-9234-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T19:50:10Z","timestamp":1559245810000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-008-9234-2"}},"subtitle":["An experimental review of the practical security approach and the key equivalence hypothesis in linear cryptanalysis"],"short-title":[],"issued":{"date-parts":[[2008,8,30]]},"references-count":22,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2009,3]]}},"alternative-id":["9234"],"URL":"https:\/\/doi.org\/10.1007\/s10623-008-9234-2","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,8,30]]}}}