{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T04:41:30Z","timestamp":1768020090184,"version":"3.49.0"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2015,7,18]],"date-time":"2015-07-18T00:00:00Z","timestamp":1437177600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61272488"],"award-info":[{"award-number":["61272488"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61402523"],"award-info":[{"award-number":["61402523"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1007\/s10623-015-0113-3","type":"journal-article","created":{"date-parts":[[2015,7,17]],"date-time":"2015-07-17T08:56:28Z","timestamp":1437123388000},"page":"459-471","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":28,"title":["Meet-in-the-middle attacks on 10-round AES-256"],"prefix":"10.1007","volume":"80","author":[{"given":"Rongjia","family":"Li","sequence":"first","affiliation":[]},{"given":"Chenhui","family":"Jin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,18]]},"reference":[{"key":"113_CR1","doi-asserted-by":"crossref","unstructured":"Biryukov A., Khovratovich D.: Related-key cryptanalysis of the full AES-192 and AES-256. In: Advances in Cryptology\u2014ASIACRYPT 2009, pp. 1\u201318. Springer, Heidelberg (2009).","DOI":"10.1007\/978-3-642-10366-7_1"},{"key":"113_CR2","doi-asserted-by":"crossref","unstructured":"Biryukov A., Khovratovich D., Nikoli\u0107 I.: Distinguisher and related-key attack on the full AES-256. In: Advances in Cryptology\u2014CRYPTO 2009, pp. 231\u2013249. Springer, Heidelberg (2009).","DOI":"10.1007\/978-3-642-03356-8_14"},{"key":"113_CR3","doi-asserted-by":"crossref","unstructured":"Biryukov A., Dunkelman O., Keller N., Khovratovich D., Shamir A.: Key recovery attacks of practical complexity on AES-256 variants with up to 10 rounds. In: Advances in Cryptology\u2014EUROCRYPT 2010, pp. 299\u2013319. Springer, Heidelberg (2010).","DOI":"10.1007\/978-3-642-13190-5_15"},{"key":"113_CR4","doi-asserted-by":"crossref","unstructured":"Bogdanov A., Khovratovich D., Rechberger C.: Biclique cryptanalysis of the full AES. In: Advances in Cryptology\u2014ASIACRYPT 2011, pp. 344\u2013371. Springer, Heidelberg (2011).","DOI":"10.1007\/978-3-642-25385-0_19"},{"key":"113_CR5","unstructured":"Daemen J., Rijmen V.: AES proposal: Rijndael. In: First Advanced Encryption Standard (AES) Conference (1998)."},{"key":"113_CR6","doi-asserted-by":"crossref","unstructured":"Daemen J., Rijmen V.: Understanding two-round differentials in AES. In: Security and Cryptography for Networks, pp. 78\u201394. Springer, Heidelberg (2006).","DOI":"10.1007\/11832072_6"},{"key":"113_CR7","doi-asserted-by":"crossref","unstructured":"Daemen J., Knudsen L., Rijmen V.: The block cipher square. In: Fast Software Encryption, pp. 149\u2013165. Springer, Heidelberg (1997).","DOI":"10.1007\/BFb0052343"},{"key":"113_CR8","doi-asserted-by":"crossref","unstructured":"Demirci, H., Sel\u00e7uk, A.A.: A meet-in-the-middle attack on 8-round AES. In: Fast Software Encryption, pp. 116\u2013126. Springer, Heidelberg (2008).","DOI":"10.1007\/978-3-540-71039-4_7"},{"key":"113_CR9","doi-asserted-by":"crossref","unstructured":"Demirci H., Ta\u015fk\u0131n \u0130., \u00c7oban M., Baysal A.: Improved meet-in-the-middle attacks on AES. In: Progress in Cryptology\u2014INDOCRYPT 2009, pp. 144\u2013156. Springer, Heidelberg (2009).","DOI":"10.1007\/978-3-642-10628-6_10"},{"key":"113_CR10","doi-asserted-by":"crossref","unstructured":"Derbez P., Fouque P.A., Jean J., et\u00a0al.: Improved key recovery attacks on reduced-round AES in the single-key setting. In: EUROCRYPT, vol. 7881, pp. 371\u2013387. Springer, Heidelberg (2013).","DOI":"10.1007\/978-3-642-38348-9_23"},{"key":"113_CR11","doi-asserted-by":"crossref","unstructured":"Derbez P., Fouque P.A., Jean J.: Exhausting demirci-sel\u00e7uk meet-in-the-middle attacks against reduced-round AES. In: FSE (2013).","DOI":"10.1007\/978-3-662-43933-3_28"},{"key":"113_CR12","doi-asserted-by":"crossref","unstructured":"Dunkelman O., Keller N.: A new attack on the LEX stream cipher. In: Advances in Cryptology\u2014ASIACRYPT 2008, pp. 539\u2013556. Springer, Heidelberg (2008).","DOI":"10.1007\/978-3-540-89255-7_33"},{"key":"113_CR13","doi-asserted-by":"crossref","unstructured":"Dunkelman O., Keller N., Shamir A.: Improved single-key attacks on 8-round AES-192 and AES-256. In: Advances in Cryptology\u2014ASIACRYPT 2010, pp. 158\u2013176. Springer, Heidelberg (2010).","DOI":"10.1007\/978-3-642-17373-8_10"},{"key":"113_CR14","doi-asserted-by":"crossref","unstructured":"Ferguson N., Kelsey J., Lucks S., Schneier B., Stay M., Wagner D., Whiting D.: Improved cryptanalysis of Rijndael. In: Fast Software Encryption, pp. 213\u2013230. Springer, Heidelberg (2001).","DOI":"10.1007\/3-540-44706-7_15"},{"key":"113_CR15","doi-asserted-by":"crossref","unstructured":"Fouque P.A., Jean J., Peyrin T.: Structural evaluation of AES and chosen-key distinguisher of 9-round AES-128. In: Advances in Cryptology\u2014CRYPTO 2013, pp. 183\u2013203. Springer, Heidelberg (2013).","DOI":"10.1007\/978-3-642-40041-4_11"},{"key":"113_CR16","doi-asserted-by":"crossref","unstructured":"Gilbert H.: A simplified representation of AES. In: Advances in Cryptology\u2014ASIACRYPT 2014, pp. 200\u2013222. Springer, Heidelberg (2014).","DOI":"10.1007\/978-3-662-45611-8_11"},{"key":"113_CR17","unstructured":"Gilbert H., Minier M.: A collisions attack on the 7-rounds Rijndael. In: AES Candidate Conference (2000)."},{"key":"113_CR18","doi-asserted-by":"crossref","unstructured":"Li L., Jia K., Wang X.: Improved single-key attacks on 9-round AES-192\/256. In: FSE (2014).","DOI":"10.1007\/978-3-662-46706-0_7"},{"key":"113_CR19","doi-asserted-by":"crossref","unstructured":"Lu J., Dunkelman O., Keller N., Kim J.: New impossible differential attacks on AES. In: Progress in Cryptology\u2014INDOCRYPT 2008, pp. 279\u2013293. Springer, Heidelberg (2008).","DOI":"10.1007\/978-3-540-89754-5_22"},{"key":"113_CR20","unstructured":"Lucks S., et\u00a0al.: Attacking seven rounds of Rijndael under 192-bit and 256-bit keys. In: AES Candidate Conference, vol. 2000 (2000)."},{"key":"113_CR21","doi-asserted-by":"crossref","unstructured":"Mala H., Dakhilalian M., Rijmen V., Modarres-Hashemi M.: Improved impossible differential cryptanalysis of 7-round AES-128. In: Progress in Cryptology\u2014INDOCRYPT 2010, pp. 282\u2013291. Springer, Heidelberg (2010).","DOI":"10.1007\/978-3-642-17401-8_20"},{"key":"113_CR22","doi-asserted-by":"crossref","unstructured":"Wei Y., Lu J., Hu Y.: Meet-in-the-middle attack on 8 rounds of the AES block cipher under 192 key bits. In: Information Security Practice and Experience, pp. 222\u2013232. Springer, Berlin (2011).","DOI":"10.1007\/978-3-642-21031-0_17"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-015-0113-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-015-0113-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-015-0113-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,28]],"date-time":"2019-08-28T06:11:23Z","timestamp":1566972683000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-015-0113-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7,18]]},"references-count":22,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2016,9]]}},"alternative-id":["113"],"URL":"https:\/\/doi.org\/10.1007\/s10623-015-0113-3","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,7,18]]}}}