{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T12:49:00Z","timestamp":1770900540832,"version":"3.50.1"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2014,6,7]],"date-time":"2014-06-07T00:00:00Z","timestamp":1402099200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1007\/s10623-014-9985-x","type":"journal-article","created":{"date-parts":[[2014,6,6]],"date-time":"2014-06-06T11:24:03Z","timestamp":1402053843000},"page":"11-48","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["A methodology for differential-linear cryptanalysis and its applications"],"prefix":"10.1007","volume":"77","author":[{"given":"Jiqiang","family":"Lu","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,6,7]]},"reference":[{"key":"9985_CR1","unstructured":"Anderson R., Biham E., Knudsen L.R.: Serpent: a new block cipher proposal. In: FSE 1998. Lecture Notes in Computer Science, vol. 1372, pp. 222\u2013238. Springer, Heidelberg (1998)."},{"key":"9985_CR2","unstructured":"Anderson R., Biham E., Knudsen L.R.: Serpent: a proposal for the Advanced Encryption Standard, NISTY AES Proposal (1998)."},{"key":"9985_CR3","doi-asserted-by":"crossref","unstructured":"Biham E.: New types of cryptanalytic attacks using related keys. J. Cryptol. 7(4), 229\u2013246 (1994).","DOI":"10.1007\/BF00203965"},{"key":"9985_CR4","doi-asserted-by":"crossref","unstructured":"Biham E., Biryukov A.: An improvement of Davies\u2019 attack on DES. J. Cryptol. 10(3), 195\u2013206 (1997).","DOI":"10.1007\/s001459900027"},{"key":"9985_CR5","unstructured":"Biham E., Shamir A.: Differential cryptanalysis of DES-like cryptosystems. In: CRYPTO 1990. Lecture Notes in Computer Science, vol. 537, pp. 2\u201321. Springer, Heidelberg (1990)."},{"key":"9985_CR6","doi-asserted-by":"crossref","unstructured":"Biham E., Shamir A.: Differential cryptanalysis of DES-like cryptosystems. J. Cryptol. 4(1), 3\u201372 (1991).","DOI":"10.1007\/BF00630563"},{"key":"9985_CR7","doi-asserted-by":"crossref","unstructured":"Biham E., Shamir A.: Differential cryptanalysis of the full 16-round DES. In: CRYPTO 1992. Lecture Notes in Computer Science, vol. 740, pp. 487\u2013496. Springer, Heidelberg (1993).","DOI":"10.1007\/978-1-4613-9314-6"},{"key":"9985_CR8","doi-asserted-by":"crossref","unstructured":"Biham E., Dunkelman O., Keller N.: The rectangle attack\u2014rectangling the Serpent. In: EUROCRYPT 2001. Lecture Notes in Computer Science, vol. 2045, pp. 340\u2013357. Springer, Heidelberg (2001).","DOI":"10.1007\/3-540-44987-6_21"},{"key":"9985_CR9","doi-asserted-by":"crossref","unstructured":"Biham E., Dunkelman O., Keller N.: Linear cryptanalysis of reduced round Serpent. In: FSE 2001. Lecture Notes in Computer Science, vol. 2355, pp. 16\u201327. Springer, Heidelberg (2002).","DOI":"10.1007\/3-540-45473-X_2"},{"key":"9985_CR10","doi-asserted-by":"crossref","unstructured":"Biham E., Dunkelman O., Keller N.: Enhancing differential-linear cryptanalysis. In: ASIACRYPT 2002. Lecture Notes in Computer Science, vol. 2501, pp. 254\u2013266. Springer, Heidelberg (2002).","DOI":"10.1007\/3-540-36178-2_16"},{"key":"9985_CR11","doi-asserted-by":"crossref","unstructured":"Biham E., Dunkelman O., Keller N.: New results on boomerang and rectangle attacks. In: FSE 2002. Lecture Notes in Computer Science, vol. 2365, pp. 1\u201316. Springer, Heidelberg (2002).","DOI":"10.1007\/3-540-45661-9_1"},{"key":"9985_CR12","doi-asserted-by":"crossref","unstructured":"Biham E., Dunkelman O., Keller N.: Differential-linear cryptanalysis of Serpent. In: FSE 2003. Lecture Notes in Computer Science, vol. 2887, pp. 9\u201321. Springer, Heidelberg (2003).","DOI":"10.1007\/978-3-540-39887-5_2"},{"key":"9985_CR13","doi-asserted-by":"crossref","unstructured":"Biham E., Dunkelman O., Keller N.: New combined attacks on block ciphers. In: FSE 2005. Lecture Notes in Computer Science, vol. 3557, pp. 126\u2013144. Springer, Heidelberg (2005).","DOI":"10.1007\/11502760_9"},{"key":"9985_CR14","doi-asserted-by":"crossref","unstructured":"Collard B., Standaert F.-X., Quisquater J.-J.: Improved and multiple linear cryptanalysis of reduced round Serpent. In: Inscrypt 2007. Lecture Notes in Computer Science, vol. 4990, pp. 51\u201365. Springer, Heidelberg (2008).","DOI":"10.1007\/978-3-540-79499-8_6"},{"key":"9985_CR15","unstructured":"Collard B., Standaert F.-X., Quisquater J.-J.: Improved and multiple linear cryptanalysis of reduced round Serpent\u2014description of the linear approximations. http:\/\/perso.uclouvain.be\/fstandae\/PUBLIS\/47b ."},{"key":"9985_CR16","unstructured":"Courtois N.T.: CTC2 and fast algebraic attacks on block ciphers revisited. IACR ePrint report 2007\/152 (2007)."},{"key":"9985_CR17","doi-asserted-by":"crossref","unstructured":"Courtois N.T., Pieprzyk J.: Cryptanalysis of block ciphers with overdefined systems of equations. In: ASIACRYPT 2002. Lecture Notes in Computer Science, vol. 2501, pp. 267\u2013287. Springer, Heidelberg (2002).","DOI":"10.1007\/3-540-36178-2_17"},{"key":"9985_CR18","unstructured":"Daemen J., Rijmen V.: AES proposal: Rijndael. In: Proceedings of the First Advanced Encryption Standard Candidate Conference, NIST, Ventura, CA (1998)."},{"key":"9985_CR19","unstructured":"Davies, D.: Investigation of a potential weakness in the DES algorithm (1987) (unpublished manuscript)."},{"key":"9985_CR20","doi-asserted-by":"crossref","unstructured":"Davies D., Murphy S.: Pairs and triplets of DES S-boxes. J. Cryptol. 8(1), 1\u201325 (1995).","DOI":"10.1007\/BF00204799"},{"key":"9985_CR21","unstructured":"Dunkelman O.: Techniques for cryptanalysis of block ciphers. Ph.D. thesis, Technion-Israel Institute of Technology, Israel (2006)."},{"key":"9985_CR22","doi-asserted-by":"crossref","unstructured":"Dunkelman O., Keller N.: Cryptanalysis of CTC2. In: CT-RSA 2009. Lecture Notes in Computer Science, vol. 5473, pp. 226\u2013239. Springer, Heidelberg (2009).","DOI":"10.1007\/978-3-642-00862-7_15"},{"key":"9985_CR23","doi-asserted-by":"crossref","unstructured":"Dunkelman O., Indesteege S., Keller N.: A differential-linear attack on 12-round Serpent. In: INDOCRYPT 2008. Lecture Notes in Computer Science, vol. 5365, pp. 308\u2013321. Springer, Heidelberg (2008).","DOI":"10.1007\/978-3-540-89754-5_24"},{"key":"9985_CR24","unstructured":"GNU Project, http:\/\/www.gnupg.org\/oids.html ."},{"key":"9985_CR25","unstructured":"Handschuh H., Naccache D.: SHACAL. In: Proceedings of the First Open NESSIE Workshop (2000)."},{"key":"9985_CR26","doi-asserted-by":"crossref","unstructured":"Hawkes P.: Differential-linear weak key classes of IDEA. In: EUROCRYPT 1998. Lecture Notes in Computer Science, vol. 1403, pp. 112\u2013126. Springer, Heidelberg (1998).","DOI":"10.1007\/BFb0054121"},{"key":"9985_CR27","doi-asserted-by":"crossref","unstructured":"Kelsey J., Schneier B., Wagner D.: Key-schedule cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES. In: CRYPTO 1996. Lecture Notes in Computer Science, vol. 1109, pp. 237\u2013251. Springer, Heidelberg (1996).","DOI":"10.1007\/3-540-68697-5_19"},{"key":"9985_CR28","doi-asserted-by":"crossref","unstructured":"Kelsey J., Kohno T., Schneier B.: Amplified boomerang attacks against reduced-round MARS and Serpent. In: FSE 2000. Lecture Notes in Computer Science, vol. 1978, pp. 75\u201393. Springer, Heidelberg (2001).","DOI":"10.1007\/3-540-44706-7_6"},{"key":"9985_CR29","unstructured":"Kim J.: Combined differential, linear and related-key attacks on block ciphers and MAC algorithms. Ph.D. thesis, Katholieke Universiteit Leuven, Belgium (2006)."},{"key":"9985_CR30","unstructured":"Knudsen L.R.: Cryptanalysis of LOKI91. In: ASIACRYPT 1992. Lecture Notes in Computer Science, vol. 718, pp. 196\u2013208. Springer, Heidelberg (1993)."},{"key":"9985_CR31","unstructured":"Knudsen L.R.: Trucated and higher order differentials. In: FSE 1994. Lecture Notes in Computer Science, vol. 1008, pp. 196\u2013211. Springer, Heidelberg (1995)."},{"key":"9985_CR32","doi-asserted-by":"crossref","unstructured":"Knudsen L.R., Mathiassen J.E.: A chosen-plaintext linear attack on DES. In: FSE 2000. Lecture Notes in Computer Science, vol. 1978, pp. 262\u2013272. Springer, Heidelberg (2001).","DOI":"10.1007\/3-540-44706-7_18"},{"key":"9985_CR33","unstructured":"Kohno T., Kelsey J., Schneier B.: Preliminary cryptanalysis of reduced-round Serpent. In: Proceedings of the Third AES Candidate Conference (2000)."},{"key":"9985_CR34","doi-asserted-by":"crossref","unstructured":"Kunz-Jacques S., Muller F.: New improvements of Davies-Murphy cryptanalysis. In: ASIACRYPT 2005. Lecture Notes in Computer Science, vol. 3788, pp. 425\u2013442. Springer, Heidelberg (2005).","DOI":"10.1007\/11593447_23"},{"key":"9985_CR35","doi-asserted-by":"crossref","unstructured":"Lai X., Massey J.L., Murphy S.: Markov ciphers and differential cryptanalysis. In: EUROCRYPT 1991. Lecture Notes in Computer Science, vol. 547, pp. 17\u201338. Springer, Heidelberg (1991).","DOI":"10.1007\/3-540-46416-6_2"},{"key":"9985_CR36","unstructured":"Langford S.K.: Differential-linear cryptanalysis and threshold signatures. Ph.D. thesis, Stanford University, USA (1995)."},{"key":"9985_CR37","doi-asserted-by":"crossref","unstructured":"Langford S.K., Hellman M.E.: Differential-linear cryptanalysis. In: CRYPTO 1994. Lecture Notes in Computer Science, vol. 839, pp. 17\u201325. Springer, Heidelberg (1994).","DOI":"10.1007\/3-540-48658-5_3"},{"key":"9985_CR38","unstructured":"Lu J.: Cryptanalysis of block ciphers. Ph.D. thesis, University of London, UK (2008)."},{"key":"9985_CR39","doi-asserted-by":"crossref","unstructured":"Lu J.: New methodologies for differential-linear cryptanalysis and its extensions. Cryptology ePrint Archive, Report 2010\/025 (2010). http:\/\/eprint.iacr.org\/2010\/025 .","DOI":"10.1088\/1475-7516\/2010\/03\/025"},{"key":"9985_CR40","unstructured":"Lu J.: A methodology for differential-linear cryptanalysis and its applications (extended abstract). In: FSE 2012. Lecture Notes in Computer Science, vol. 7549, pp. 69\u201389. Springer, Heidelberg (2012)."},{"key":"9985_CR41","doi-asserted-by":"crossref","unstructured":"Matsui M.: Linear cryptanalysis method for DES cipher. In: EUROCRYPT 1993. Lecture Notes in Computer Science, vol. 765, pp. 386\u2013397. Springer, Heidelberg (1994).","DOI":"10.1007\/3-540-48285-7_33"},{"key":"9985_CR42","doi-asserted-by":"crossref","unstructured":"Matsui M.: The first experimental cryptanalysis of the Data Encryption Standard. In: CRYPTO 1994. Lecture Notes in Computer Science, vol. 839, pp. 1\u201311. Springer, Heidelberg (1994).","DOI":"10.1007\/3-540-48658-5_1"},{"key":"9985_CR43","doi-asserted-by":"crossref","unstructured":"Matsui M., Yamagishi A.: A new method for known plaintext attack of FEAL cipher. In: EUROCRYPT 1992. Lecture Notes in Computer Science, vol. 658, pp. 81\u201391. Springer, Heidelberg (1993).","DOI":"10.1007\/3-540-47555-9_7"},{"key":"9985_CR44","unstructured":"National Bureau of Standards (NBS), Data Encryption Standard (DES), FIPS-46 (1977)."},{"key":"9985_CR45","unstructured":"National Institute of Standards and Technology (NIST), Advanced Encryption Standard (AES), FIPS-197 (2001)."},{"key":"9985_CR46","doi-asserted-by":"crossref","unstructured":"Sel\u00e7uk A.A.: On probability of success in linear and differential cryptanalysis. J. Cryptol. 21(1), 131\u2013147 (2008).","DOI":"10.1007\/s00145-007-9013-7"},{"key":"9985_CR47","doi-asserted-by":"crossref","unstructured":"Vaudenay S.: Provable security for block ciphers by decorrelation. In: STACS 1998. Lecture Notes in Computer Science, vol. 1373, pp. 249\u2013275. Springer, Heidelberg (1998).","DOI":"10.1007\/BFb0028566"},{"key":"9985_CR48","doi-asserted-by":"crossref","unstructured":"Wagner D.: The boomerang attack. In: FSE 1999. Lecture Notes in Computer Science, vol. 1636, pp. 156\u2013170. Springer, Heidelberg (1999).","DOI":"10.1007\/3-540-48519-8_12"},{"key":"9985_CR49","unstructured":"Wang X.Y., Hui L.C.K., Chow K.P., Chong C.F., Tsang W.W., Chan H.W.: The differential cryptanalysis of an AES finalist - Serpent. Technical report TR-2000-04, Department of Computer Science and Information Systems, The University of Hong Kong, China (2000). http:\/\/www.cs.hku.hk\/research\/techreps\/document\/TR-2000-04 ."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-014-9985-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-014-9985-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-014-9985-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,6]],"date-time":"2022-04-06T09:08:01Z","timestamp":1649236081000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-014-9985-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6,7]]},"references-count":49,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,10]]}},"alternative-id":["9985"],"URL":"https:\/\/doi.org\/10.1007\/s10623-014-9985-x","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,6,7]]}}}