{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T13:33:07Z","timestamp":1758893587364},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2013,3,15]],"date-time":"2013-03-15T00:00:00Z","timestamp":1363305600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1007\/s10623-013-9804-9","type":"journal-article","created":{"date-parts":[[2013,3,14]],"date-time":"2013-03-14T16:45:41Z","timestamp":1363279541000},"page":"85-103","source":"Crossref","is-referenced-by-count":8,"title":["Revisiting key schedule\u2019s diffusion in relation with round function\u2019s diffusion"],"prefix":"10.1007","volume":"73","author":[{"given":"Jialin","family":"Huang","sequence":"first","affiliation":[]},{"given":"Xuejia","family":"Lai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,3,15]]},"reference":[{"key":"9804_CR1","unstructured":"Kelsey, J., Schneiery, B., Wagner, D.: Key Schedule Weaknesses in SAFER+. Second AES Candidate Conference (1999)"},{"key":"9804_CR2","doi-asserted-by":"crossref","unstructured":"Knudsen, Lars R.: Practically secure Feistel ciphers. FSE\u201993, LNCS, Vol. 809, pp. 211\u2013221. Springer (1994)","DOI":"10.1007\/3-540-58108-1_26"},{"key":"9804_CR3","doi-asserted-by":"crossref","unstructured":"Kelsey, J., Schneier, B., Wagner, D.: Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES. Advances in Cryptology-CRYPTO\u201996, pp. 237\u2013251. Springer (1996)","DOI":"10.1007\/3-540-68697-5_19"},{"key":"9804_CR4","doi-asserted-by":"crossref","unstructured":"Kelsey, J., Schneier, B., Wagner, D.: Related-Key Cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA. INFORMATION AND COMMUNICATIONS SECURITY 1997, LNCS, 1334, 233\u2013246","DOI":"10.1007\/BFb0028479"},{"key":"9804_CR5","unstructured":"Kohno, T., Kelsey, J., Schneier, B.: Preliminary Cryptanalysis of Reduced-Round Serpent. Third AES Candidate Conference, pp. 195\u2013211. (2000)"},{"key":"9804_CR6","unstructured":"Biham, E., Dunkelman, O., Keller, N., Shamir, A.: New Data-Efficient Attacks on Reduced-Round IDEA. http:\/\/eprint.iacr.org\/2011\/417"},{"key":"9804_CR7","unstructured":"Jia, K., Yu, H., Wang, X.: A Meet-in-the-Middle Attack on the Full KASUMI. http:\/\/eprint.iacr.org\/2011\/466"},{"key":"9804_CR8","doi-asserted-by":"crossref","unstructured":"Sun, X., Lai, X.: Improved Integral Attacks on MISTY1. In: Jacobson Jr., M.J. Rijmen, V., Safavi-Naini, R. (Eds.): SAC 2009, LNCS, vol. 5867, pp. 266C280. Springer, Heidelberg (2009)","DOI":"10.1007\/978-3-642-05445-7_17"},{"key":"9804_CR9","doi-asserted-by":"crossref","unstructured":"Sekar, G., Mouha, N., Velichkov, V., Preneel, B.: Meet-in-the-Middle Attacks on Reduced-Round XTEA. Topics in Cryptology - CT-RSA 2011, LNCS, Vol. 6558, pp. 250\u2013267. Springer (2011)","DOI":"10.1007\/978-3-642-19074-2_17"},{"key":"9804_CR10","doi-asserted-by":"crossref","unstructured":"Kelsey, J., Schneier, B.: Key-Schedule Cryptanalysis of DEAL. SAC \u201999 Proceedings of the 6th Annual International Workshop on Selected Areas in Cryptography pp. 118\u2013134","DOI":"10.1007\/3-540-46513-8_9"},{"key":"9804_CR11","doi-asserted-by":"crossref","unstructured":"Daemen, J.: Rijmen. The Design of Rijndael AES - The Advanced Encryption Standard (2002)","DOI":"10.1007\/978-3-662-04722-4"},{"key":"9804_CR12","doi-asserted-by":"crossref","unstructured":"May, L., Henricksen, M., Millan, W.L., Carter, G., Dawson, E.: Strengthening the Key Schedule of the AES. In: Batten, L., Seberry, J. (eds.) ACISP 2002. LNCS, vol. 2384, pp. 226C240. Springer, Heidelberg (2002)","DOI":"10.1007\/3-540-45450-0_19"},{"key":"9804_CR13","unstructured":"Blumenthal, U., Bellovin, S.M.:A better key schedule for DES-like ciphers. Proceedings of PRAGOCRYPT\u201996, CTU Publishing House, 42\u201354 (1996)"},{"key":"9804_CR14","doi-asserted-by":"crossref","unstructured":"Carter, G., Dawson, E., Nielsen, L.: Key Schedules of Iterated Block Ciphers. In: Boyd, C., Dawson, E. (eds.) ACISP 1998. LNCS, vol. 1438, pp. 80C89. Springer, Heidelberg (1998)","DOI":"10.1007\/BFb0053723"},{"key":"9804_CR15","unstructured":"Brown L., Scberry J.: Key scheduling in DES\u2014type cryptosystems. In: Advances in Cryptology, Proceedinos of AUSCRYPT \u201990, LNCS, vol. 453, pp. 221\u2013228. Springer-Vedag, Berlin (1990)."},{"key":"9804_CR16","doi-asserted-by":"crossref","unstructured":"Choy, J., Zhang, A., Khoo, K., Henricksen, M., Poschmann, A.: AES Variants Secure Against Related-Key Differential and Boomerang Attacks. WISTP 2011, LNCS, Vol. 6633, pp. 191\u2013207, Springer (2011)","DOI":"10.1007\/978-3-642-21040-2_13"},{"key":"9804_CR17","doi-asserted-by":"crossref","unstructured":"J. Lu, Y. Wei, J. Kim, P.A. Fouque, Cryptanalysis of Reduced Versions of the Camellia Block Cipher, SAC (2011)","DOI":"10.1049\/iet-ifs.2011.0342"},{"key":"9804_CR18","doi-asserted-by":"crossref","unstructured":"Shin, Y., Kim, J., Kim, G., Hong, S., Lee, S.: Differential-linear type attacks on reduced rounds of SHACAL-2. Proceedings of ACISP04, H. Wang, J. Pieprzyk, and V. Varadharajan (eds.), LNCS, Vol. 3108, pp. 110C122. Springer-Verlag (2004)","DOI":"10.1007\/978-3-540-27800-9_10"},{"key":"9804_CR19","unstructured":"Wei, Y., Hu, Y., Chen, J.: Differential-nonlinear attack on 33-round SHACAL-2. Journal of Xidian University (2010)"},{"key":"9804_CR20","unstructured":"Handschuh, H., Naccache, D.: SHACAL : A Family of Block Ciphers. Submission to the NESSIE project, 2002, http:\/\/www.cryptonessie.org"},{"key":"9804_CR21","doi-asserted-by":"crossref","unstructured":"Bogdanov, A., Wang, M.: Zero Correlation Linear Cryptanalysis with Reduced Data Complexity. FSE, In (2012)","DOI":"10.1007\/978-3-642-34047-5_3"},{"key":"9804_CR22","doi-asserted-by":"crossref","unstructured":"Demirci, H., Sel\u00e7uk, A.A.: A Meet-in-the-Middle Attack on 8-Round AES. In: Proceedings of Fast Software Encryption 15. LNCS, vol. 5806, pp. 116\u201326. Springer, Heidelberg (2008)","DOI":"10.1007\/978-3-540-71039-4_7"},{"key":"9804_CR23","unstructured":"Ferguson, N., Kelsey, J., Lucks, S., Schneier, B., Stay, M., Wagner D., Whiting, D.: Improved cryptanalysis of Rijndael. In B. Schneier, editor, Proceedings of FSE 2000, LNCS, pp. 213C230, Springer-Verlag, (2000)"},{"key":"9804_CR24","unstructured":"Piret, G. and Quisquater J.J.: Integral Cryptanalysis on reduced-round Safer++. IACR Cryptology ePrint Archive 33\u201333 (2003)"},{"key":"9804_CR25","doi-asserted-by":"crossref","unstructured":"Lai, X., Massey, J.L., Murphy, S.: Markov Ciphers and Differential Cryptanalysis. Advances in Cryptology, proceedings of EUROCRYPT 1991, LNCS 547, pages 17C38, Springer (1992)","DOI":"10.1007\/3-540-46416-6_2"},{"key":"9804_CR26","unstructured":"3rd Generation Partnership Project, Technical Specification Group Services and System Aspects, 3G Security, Specification of the 3GPP Confidentiality and Integrity Algorithms; Document2: KASUMI Specification, V3.1.1 (2001)"},{"key":"9804_CR27","unstructured":"Matsui, M.: New block encryption algorithm MISTY. In: FSE97, LNCS 1267, p. 54C68 (1997)."},{"key":"9804_CR28","unstructured":"Aoki K., Ichikawa T., Kanda M., Matsui M., Moriai S., Nakajima J., Tokita T.: Camellia: a 128-bit block cipher suitable for multiple platformsdesign and analysis. In: Stinson D.R., Tavares S.E. (eds.) SAC 2000. LNCS, vol. 2012, pp. 39\u201356. Springer, Heidelberg (2001)."},{"key":"9804_CR29","unstructured":"Needham R.M., Wheeler D.J.: Tea Extensions, Technical Report.: Computer Laboratory, University of Cambridge. http:\/\/www.cix.co.uk\/klockstonextea.pdf (1997)."},{"key":"9804_CR30","unstructured":"Meyer C.H., Matyas S.M.: Cryptography: A New Dimension in Data Security. Wiley, New York (1982)."},{"key":"9804_CR31","unstructured":"Anderson R., Biham E., Knudsen L.R.: Serpent: A Proposal for the Advanced Encryption Standard. NIST AES Proposal (1998)."},{"key":"9804_CR32","unstructured":"Massey J.L., Khachatrian G.H., Kuregian M.K.: Nomination of SAFER++ as Candidate Algorithm for NESSIE. http:\/\/www.cryptonessie.org (2000)."},{"key":"9804_CR33","doi-asserted-by":"crossref","unstructured":"Knudsen L.R.: A detailed analysis of SAFER K. J. Cryptol. 13(4), 417C436 (2000)","DOI":"10.1007\/s001450010004"},{"key":"9804_CR34","unstructured":"Bogdanov A., Khovratovich D., Rechberger C.: Biclique cryptanalysis of the full AES. In: Lee D.H., Wang X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 344C371. Springer, Heidelberg (2011)."},{"key":"9804_CR35","unstructured":"Wheeler D.J., Needham R.M.: TEA, a tiny encryption algorithm. In: FSE 1994, vol. 1008, pp. 363\u2013366, Springer, Heidelberg (1994)."},{"key":"9804_CR36","unstructured":"Sasaki Y., Wang L., Sakai Y., Sakiyama K., Ohta K.: Three-subset meet-in-the-middle attack on reduced XTEA. Prog. Cryptol. 7374, 138\u2013154 (2012)."},{"key":"9804_CR37","unstructured":"Isobe T., Shibutani K.: Security analysis of the lightweight block ciphers XTEA, LED and Piccolo. In: Susilo W., Mu Y., Seberry J. (eds.) ACISP. LNCS, vol. 7372, pp. 71\u201386. Springer, Heidelberg (2012)."},{"key":"9804_CR38","unstructured":"John B.K., George I.D.: Structured design of substitution\u2013permutation encryption networks. IEEE Trans. Comput. C 28(10), 747\u2013753 (1979)."},{"key":"9804_CR39","doi-asserted-by":"crossref","unstructured":"Dunkelman O., Keller N., Shamir A.: Improved single-key attacks on 8-round AES-192 and AES-256. In: Advances in Cryptology-ASIACRYPT 2010. pp. 158\u2013176. Springer, Heidelberg (2010).","DOI":"10.1007\/978-3-642-17373-8_10"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-013-9804-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-013-9804-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-013-9804-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,23]],"date-time":"2020-07-23T22:33:31Z","timestamp":1595543611000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-013-9804-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,3,15]]},"references-count":39,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,10]]}},"alternative-id":["9804"],"URL":"https:\/\/doi.org\/10.1007\/s10623-013-9804-9","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,3,15]]}}}