{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T13:01:19Z","timestamp":1772283679048,"version":"3.50.1"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2012,5,30]],"date-time":"2012-05-30T00:00:00Z","timestamp":1338336000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2014,3]]},"DOI":"10.1007\/s10623-012-9697-z","type":"journal-article","created":{"date-parts":[[2012,5,29]],"date-time":"2012-05-29T04:22:37Z","timestamp":1338265357000},"page":"369-383","source":"Crossref","is-referenced-by-count":125,"title":["Linear hulls with correlation zero and linear cryptanalysis of block ciphers"],"prefix":"10.1007","volume":"70","author":[{"given":"Andrey","family":"Bogdanov","sequence":"first","affiliation":[]},{"given":"Vincent","family":"Rijmen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,5,30]]},"reference":[{"key":"9697_CR1","unstructured":"Biham E.: On Matsui\u2019s linear cryptanalysis. In: EUROCRYPT\u201994, vol. 950, Lecture Notes in Computer Science, pp. 341\u2013355. Springer, Heidelberg (1995)."},{"key":"9697_CR2","unstructured":"Biham E., Biryukov A., Shamir A.: Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. In: EUROCRYPT\u201999, LNCS, pp. 12\u201323. Springer, Heidelberg (1999)."},{"key":"9697_CR3","unstructured":"Biham E., Keller N.: Cryptanalysis of reduced variants of rijndael. http:\/\/www.madchat.fr\/crypto\/codebreakers\/35-ebiham.pdf (1999). Accessed Oct 2011"},{"key":"9697_CR4","first-page":"2","volume-title":"CRYPTO\u201990, LNCS, vol. 537","author":"E. Biham","year":"1990","unstructured":"Biham E., Shamir A.: Differential cryptanalysis of DES-like cryptosystems. In: Alfred, M., Scott, A.V. (eds) CRYPTO\u201990, LNCS, vol. 537, pp. 2\u201321. Springer, Heidelberg (1990)"},{"key":"9697_CR5","doi-asserted-by":"crossref","unstructured":"Bogdanov A., Wang M.: Zero correlation linear cryptanalysis with reduced data complexity. In: FSE\u201912, LNCS. Springer, Heidelberg (2012).","DOI":"10.1007\/978-3-642-34047-5_3"},{"key":"9697_CR6","first-page":"1","volume-title":"EUROCRYPT\u201997, LNCS","author":"J Borst","year":"1997","unstructured":"Borst J, Knudsen L.R., Rijmen V.: Two attacks on reduced IDEA. In: Fumy, W. (ed.) EUROCRYPT\u201997, LNCS, pp. 1\u201313. Springer, Heidelberg (1997)"},{"key":"9697_CR7","first-page":"22","volume-title":"IWSEC\u201909, LNCS, vol. 5824","author":"J. Choy","year":"2009","unstructured":"Choy J., Yap H.: Impossible boomerang attack for block cipher structures. In: Tsuyoshi, T., Masahiro, M. (eds.) IWSEC\u201909, LNCS, vol. 5824, pp. 22\u201337. Springer, Heidelberg (2009)"},{"key":"9697_CR8","volume-title":"Advanced Linear Cryptanalysis of Block and Stream Ciphers, Cryptology and Information Security Series, vol. 7","author":"B. Collard","year":"2011","unstructured":"Collard B., Standaert F.-X.: Experimenting linear cryptanalysis. In: Junod, P., Canteaut, A. (eds.) Advanced Linear Cryptanalysis of Block and Stream Ciphers, Cryptology and Information Security Series, vol. 7, IOS Press, Amsterdam (2011)"},{"key":"9697_CR9","first-page":"275","volume-title":"Fast Software Encryption, LNCS, vol. 1008","author":"J. Daemen","year":"1994","unstructured":"Daemen J., Govaerts R., Vandewalle J.: Correlation matrices. In: Preneel, B. (ed.) Fast Software Encryption, LNCS, vol. 1008, pp. 275\u2013285. Springer, Heidelberg (1994)"},{"key":"9697_CR10","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The design of rijndael: AES\u2014the advanced encryption standard","author":"J. Daemen","year":"2002","unstructured":"Daemen J., Rijmen V.: The design of rijndael: AES\u2014the advanced encryption standard. Springer, Heidelberg (2002)"},{"issue":"3","key":"9697_CR11","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1515\/JMC.2007.011","volume":"1","author":"J. Daemen","year":"2007","unstructured":"Daemen J., Rijmen V.: Probability distributions of correlation and differentials in block ciphers. J. Math. Cryptol. 1(3), 221\u2013242 (2007)","journal-title":"J. Math. Cryptol."},{"key":"9697_CR12","unstructured":"Etrog J., Robshaw M.J.B.: On unbiased linear approximations. In: ACISP\u201910, LNCS, vol. 6168, pp. 74\u201386. Springer, Heidelberg (2010)."},{"key":"9697_CR13","unstructured":"FIPS: Advanced Encryption Standard. Publication 197. National Bureau of Standards, U.S. Department of Commerce, (2001)."},{"key":"9697_CR14","unstructured":"Lu J., Dunkelman O., Keller N., Kim J.: New impossible differential attacks on AES. In: INDOCRYPT\u201908, LNCS, pp. 279\u2013293. Springer, Heidelberg (2008)."},{"key":"9697_CR15","unstructured":"Matsui M.: Linear cryptoanalysis method for DES cipher. In: EUROCRYPT\u201993, LNCS, pp. 386\u2013397. Springer, Heidelberg, (1993)."},{"key":"9697_CR16","first-page":"5658","volume":"27","author":"S.M. Matyas","year":"1985","unstructured":"Matyas S.M., Meyer C.H., Oseas J.: Generating strong one-way functions with cryptographic algorithm. IBM Tech. Discl. Bull. 27, 5658\u20135659 (1985)","journal-title":"IBM Tech. Discl. Bull."},{"key":"9697_CR17","unstructured":"Nyberg K.: Linear approximation of block ciphers. In: EUROCRYPT\u201994, LNCS, pp. 439\u2013444. Springer, Heidelberg (1994)."},{"issue":"1\u20132","key":"9697_CR18","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1016\/S0166-218X(00)00351-6","volume":"111","author":"K. Nyberg","year":"2001","unstructured":"Nyberg K.: Correlation theorems in cryptanalysis. Discret. Appl. Math. 111(1\u20132), 177\u2013188 (2001)","journal-title":"Discret. Appl. Math."},{"key":"9697_CR19","doi-asserted-by":"crossref","unstructured":"O\u2019Connor L.: Properties of linear approximation tables. In: Preneel B. (ed.) FSE. LNCS, vol. 1008, pp. 131\u2013136 (1994).","DOI":"10.1007\/3-540-60590-8_10"},{"key":"9697_CR20","unstructured":"R\u00f6ck A., Nyberg K.: Exploiting linear hull in Matsui\u2019s algorithm vol. 1, (2011)."},{"key":"9697_CR21","unstructured":"Shirai T., Shibutani K., Akishita T., Moriai S., Iwata T.: The 128-Bit Blockcipher CLEFIA (Extended Abstract). In: FSE\u201907, LNCS, pp. 181\u2013195. Springer, Heidelberg (2007)."},{"key":"9697_CR22","unstructured":"Sung J., Lee S., Lim Jong I., Hong S., Park S.: Provable security for the skipjack-like structure against differential cryptanalysis and linear cryptanalysis. In: Okamoto T. (ed.) ASIACRYPT2000, LNCS, pp. 274\u2013288 (1976)."},{"key":"9697_CR23","unstructured":"Tsunoo Y., Tsujihara E., Shigeri M., Saito T., Suzaki T., Kubo H.: Impossible differential cryptanalysis of CLEFIA. In: FSE\u201908, LNCS, pp. 398\u2013411. Springer, Heidelberg (2008)."},{"issue":"4","key":"9697_CR24","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1007\/s00145-003-0220-6","volume":"16","author":"S. Vaudenay","year":"2003","unstructured":"Vaudenay S.: Decorrelation: A theory for block cipher security. J. Cryptol. 16(4), 249\u2013286 (2003)","journal-title":"J. Cryptol."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-012-9697-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-012-9697-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-012-9697-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,29]],"date-time":"2019-06-29T02:06:49Z","timestamp":1561774009000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-012-9697-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,5,30]]},"references-count":24,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2014,3]]}},"alternative-id":["9697"],"URL":"https:\/\/doi.org\/10.1007\/s10623-012-9697-z","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,5,30]]}}}