{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,16]],"date-time":"2024-06-16T00:51:56Z","timestamp":1718499116871},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2015,8,1]],"date-time":"2015-08-01T00:00:00Z","timestamp":1438387200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Singapore National Research Foundation Fellowship 2012","award":["NRF-NRFF2012-06"],"award-info":[{"award-number":["NRF-NRFF2012-06"]}]},{"name":"Singapore National Research Foundation Fellowship 2012","award":["NRF-NRFF2012-06"],"award-info":[{"award-number":["NRF-NRFF2012-06"]}]},{"name":"Singapore National Research Foundation Fellowship 2012","award":["NRF-NRFF2012-06"],"award-info":[{"award-number":["NRF-NRFF2012-06"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1007\/s10623-015-0120-4","type":"journal-article","created":{"date-parts":[[2015,7,31]],"date-time":"2015-07-31T11:07:43Z","timestamp":1438340863000},"page":"587-618","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Extended meet-in-the-middle attacks on some Feistel constructions"],"prefix":"10.1007","volume":"80","author":[{"given":"Jian","family":"Guo","sequence":"first","affiliation":[]},{"given":"J\u00e9r\u00e9my","family":"Jean","sequence":"additional","affiliation":[]},{"given":"Ivica","family":"Nikoli\u0107","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Sasaki","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,1]]},"reference":[{"key":"120_CR1","doi-asserted-by":"crossref","unstructured":"Aoki K., Guo J., Matusiewicz K., Sasaki Y., Wang L.: Preimages for step-reduced SHA-2. In: Matsui M. (ed.) ASIACRYPT. LNCS, vol. 5912, pp. 578\u2013597. Springer, Berlin (2009).","DOI":"10.1007\/978-3-642-10366-7_34"},{"key":"120_CR2","unstructured":"Aoki K., Ichikawa T., Kanda M., Matsui M., Moriai S., Nakajima J., Tokita T.: Camellia: a 128-bit block cipher suitable for multiple platforms\u2014design and analysis. In: Stinson D.R., Tavares S.E. (eds.) Selected Areas in Cryptography. LNCS, vol. 2012, pp. 39\u201356. Springer, Berlin (2000)."},{"key":"120_CR3","unstructured":"Beaulieu R., Shors D., Smith J., Treatman-Clark S., Weeks B., Wingers L.: The SIMON and SPECK families of lightweight block ciphers. Cryptology ePrint Archive, Report 2013\/404 (2013)."},{"key":"120_CR4","unstructured":"Biham E., Dunkelman O.: The SHAvite-3 hash function. Submission to NIST (Round 2) (2009)."},{"key":"120_CR5","unstructured":"CAST: Cryptographic algorithms approved for Canadian government use (2012)."},{"key":"120_CR6","doi-asserted-by":"crossref","unstructured":"Coppersmith D.: The data encryption standard (DES) and its strength against attacks. IBM J. Res. Dev. 38(3), 243\u2013250 (1994).","DOI":"10.1147\/rd.383.0243"},{"key":"120_CR7","doi-asserted-by":"crossref","unstructured":"Daemen J., Knudsen L.R., Rijmen V.: The block cipher square. In: Biham, E. (ed.) FSE. LNCS, vol. 1267, pp. 149\u2013165. Springer, Heidelberg (1997).","DOI":"10.1007\/BFb0052343"},{"key":"120_CR8","doi-asserted-by":"crossref","unstructured":"Demirci H., Sel\u00e7uk A.A.: A meet-in-the-middle attack on 8-round AES. In: Nyberg K. (ed.) FSE. LNCS, vol. 5086, pp. 116\u2013126. Springer, Heidelberg (2008).","DOI":"10.1007\/978-3-540-71039-4_7"},{"key":"120_CR9","doi-asserted-by":"crossref","unstructured":"Derbez P., Fouque P.A., Jean J.: Improved key recovery attacks on reduced-round AES in the single-key setting. IACR Cryptology ePrint Archive 2012, 477 (2012).","DOI":"10.1007\/978-3-642-38348-9_23"},{"key":"120_CR10","doi-asserted-by":"crossref","unstructured":"Derbez P., Fouque P.A., Jean J.: Improved key recovery attacks on reduced-round AES in the single-key setting. In: Johansson T., Nguyen P.Q. (eds.) EUROCRYPT. LNCS, vol. 7881, pp. 371\u2013387. Springer, Heidelberg (2013).","DOI":"10.1007\/978-3-642-38348-9_23"},{"key":"120_CR11","doi-asserted-by":"crossref","unstructured":"Dinur I., Dunkelman O., Keller N., Shamir A.: Efficient dissection of composite problems, with applications to cryptanalysis, knapsacks, and combinatorial search problems. In: Safavi-Naini R., Canetti R. (eds.) CRYPTO. LNCS, vol. 7417, pp. 719\u2013740. Springer, Heidelberg (2012).","DOI":"10.1007\/978-3-642-32009-5_42"},{"key":"120_CR12","doi-asserted-by":"crossref","unstructured":"Dunkelman O., Keller N., Shamir A.: Improved single-key attacks on 8-round AES-192 and AES-256. In: Abe M. (ed.) ASIACRYPT. LNCS, vol. 6477, pp. 158\u2013176. Springer, Heidelberg (2010).","DOI":"10.1007\/978-3-642-17373-8_10"},{"key":"120_CR13","doi-asserted-by":"crossref","unstructured":"Feistel H., Notz W., Smith J.: Some cryptographic techniques for machine-to-machine data communications. Proc. IEEE. 63(11), 1545\u20131554 (1975).","DOI":"10.1109\/PROC.1975.10005"},{"key":"120_CR14","unstructured":"Gilbert H., Minier M.: A collision attack on 7 rounds of Rijndael. In: AES Candidate Conference, pp. 230\u2013241 (2000)."},{"key":"120_CR15","doi-asserted-by":"crossref","unstructured":"Guo J., Ling S., Rechberger C., Wang H.: Advanced meet-in-the-middle preimage attacks: first results on full tiger, and improved results on MD4 and SHA-2. In: Abe M. (ed.) ASIACRYPT. LNCS, vol. 6477, pp. 56\u201375 Springer, Heidelberg (2010).","DOI":"10.1007\/978-3-642-17373-8_4"},{"key":"120_CR16","unstructured":"ISO\/IEC: Information technology\u2014security techniques\u2014encryption algorithms\u2014part 3: block ciphers (2010)."},{"key":"120_CR17","doi-asserted-by":"crossref","unstructured":"Isobe T., Shibutani K.: All subkeys recovery attack on block ciphers: extending meet-in-the-middle approach. In: Knudsen LR, Wu H. (eds.) Selected Areas in Cryptography. LNCS, vol. 7707, pp. 202\u2013221. Springer, Heidelberg (2012).","DOI":"10.1007\/978-3-642-35999-6_14"},{"key":"120_CR18","doi-asserted-by":"crossref","unstructured":"Isobe T., Shibutani K.: Generic key recovery attack on feistel scheme. In: Sako K., Sarkar P. (eds.) ASIACRYPT (1). LNCS, vol. 8269, pp. 464\u2013485. Springer, Heidelberg (2013).","DOI":"10.1007\/978-3-642-42033-7_24"},{"key":"120_CR19","doi-asserted-by":"crossref","unstructured":"Knudsen L.R.: The security of feistel ciphers with six rounds or less. J. Cryptol. 15(3), 207\u2013222 (2002).","DOI":"10.1007\/s00145-002-9839-y"},{"key":"120_CR20","doi-asserted-by":"crossref","unstructured":"Luby M., Rackoff C.: How to construct pseudorandom permutations from pseudorandom functions. SIAM J. Comput. 17(2), 373\u2013386 (1988).","DOI":"10.1137\/0217022"},{"key":"120_CR21","doi-asserted-by":"crossref","unstructured":"Merkle R.C., Hellman M.E.: On the security of multiple encryption. Commun. ACM 24(7), 465\u2013467 (1981).","DOI":"10.1145\/358699.358718"},{"key":"120_CR22","doi-asserted-by":"crossref","unstructured":"Sasaki Y., Aoki K.: Finding preimages in full MD5 faster than exhaustive search. In: Joux A. (ed.) EUROCRYPT. LNCS, vol. 5479, pp. 134\u2013152. Springer, Heidelberg (2009).","DOI":"10.1007\/978-3-642-01001-9_8"},{"key":"120_CR23","doi-asserted-by":"crossref","unstructured":"Shibutani K., Bogdanov A.: Towards the optimality of Feistel ciphers with substitution-permutation functions. Des. Codes Cryptogr. 73(2), 667\u2013682 (2014).","DOI":"10.1007\/s10623-014-9970-4"},{"key":"120_CR24","doi-asserted-by":"crossref","unstructured":"Shibutani K., Isobe T., Hiwatari H., Mitsuda A., Akishita T., Shirai T.: Piccolo: an ultra-lightweight blockcipher. In: Preneel B., Takagi T. (eds.) CHES. LNCS, vol. 6917, pp. 342\u2013357. Springer, Heidelberg (2011).","DOI":"10.1007\/978-3-642-23951-9_23"},{"key":"120_CR25","doi-asserted-by":"crossref","unstructured":"Todo Y.: Upper bounds for the security of several feistel networks. In: Boyd C., Simpson L. (eds.) ACISP. LNCS, vol. 7959, pp. 302\u2013317. Springer, Heidelberg (2013).","DOI":"10.1007\/978-3-642-39059-3_21"},{"key":"120_CR26","doi-asserted-by":"crossref","unstructured":"Wu W., Zhang L.: LBlock: a lightweight block cipher. In: Lopez J., Tsudik G. (eds.) ACNS. LCNS, vol. 6715, pp. 327\u2013344. Springer, Berlin (2011).","DOI":"10.1007\/978-3-642-21554-4_19"},{"key":"120_CR27","unstructured":"Zhang L., Wu W., Wang Y., Wu S., Zhang J.: LAC: a lightweight authenticated encryption cipher. Submitted to the CAESAR competition (2014)."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-015-0120-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-015-0120-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-015-0120-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,28]],"date-time":"2019-08-28T19:26:38Z","timestamp":1567020398000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-015-0120-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8,1]]},"references-count":27,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2016,9]]}},"alternative-id":["120"],"URL":"https:\/\/doi.org\/10.1007\/s10623-015-0120-4","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,8,1]]}}}