{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:22:27Z","timestamp":1740122547264,"version":"3.37.3"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2016,1,16]],"date-time":"2016-01-16T00:00:00Z","timestamp":1452902400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100012166","name":"973 Program","doi-asserted-by":"crossref","award":["2013CB834205"],"award-info":[{"award-number":["2013CB834205"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61133013"],"award-info":[{"award-number":["61133013"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004602","name":"Program for New Century Excellent Talents in University","doi-asserted-by":"publisher","award":["NCET-13-0350"],"award-info":[{"award-number":["NCET-13-0350"]}],"id":[{"id":"10.13039\/501100004602","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1007\/s10623-016-0175-x","type":"journal-article","created":{"date-parts":[[2016,1,16]],"date-time":"2016-01-16T08:31:41Z","timestamp":1452933101000},"page":"523-540","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Improving algorithm 2 in multidimensional (zero-correlation) linear cryptanalysis using $$\\chi ^2$$ \u03c7 2 -method"],"prefix":"10.1007","volume":"81","author":[{"given":"Huaifeng","family":"Chen","sequence":"first","affiliation":[]},{"given":"Tingting","family":"Cui","sequence":"additional","affiliation":[]},{"given":"Meiqin","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,16]]},"reference":[{"key":"175_CR1","doi-asserted-by":"crossref","unstructured":"Adams C.M.: The CAST-256 Encryption Algorithm. AES Proposal (1998).","DOI":"10.17487\/rfc2612"},{"key":"175_CR2","unstructured":"Bays A., Huang J., Vaudenay S.: Improved linear cryptanalysis of reduced-round MIBS. In: IWSEC 2014. LNCS, vol. 8639, pp. 204\u2013220. Springer, Heidelberg (2014)."},{"key":"175_CR3","doi-asserted-by":"crossref","unstructured":"Biryukov A., De Canni\u00e8re C., Quisquater M.: On multiple linear approximations. In: CRYPTO 2004. LNCS, vol. 3152, pp. 1\u201322. Springer, Heidelberg (2004).","DOI":"10.1007\/978-3-540-28628-8_1"},{"key":"175_CR4","doi-asserted-by":"crossref","unstructured":"Bogdanov A., Rijmen V.: Linear hulls with correlation zero and linear cryptanalysis of block ciphers. Des. Codes Cryptogr. 70, 369\u2013383 (2014).","DOI":"10.1007\/s10623-012-9697-z"},{"key":"175_CR5","doi-asserted-by":"crossref","unstructured":"Bogdanov A., Wang M.: Zero-correlation linear cryptanalysis with reduced data complexity. In: FSE 2012. LNCS, vol. 7549, pp. 29\u201348. Springer, Heidelberg (2012).","DOI":"10.1007\/978-3-642-34047-5_3"},{"key":"175_CR6","doi-asserted-by":"crossref","unstructured":"Bogdanov A., Leander G., Nyberg K., Wang M.: Integral and multidimensional linear distinguishers with correlation zero. In: ASIACRYPT 2012. LNCS, vol. 7658, pp. 244\u2013261. Springer, Heidelberg (2012).","DOI":"10.1007\/978-3-642-34961-4_16"},{"key":"175_CR7","doi-asserted-by":"crossref","unstructured":"Bogdanov A., Geng H., Wang M., Wen L., Collard B.: Zero-correlation linear cryptanalysis with FFT and improved attacks on ISO standards Camellia and CLEFIA. In: SAC 2013. LNCS, vol. 8282, pp. 306\u2013323. Springer, Heidelberg (2014).","DOI":"10.1007\/978-3-662-43414-7_16"},{"key":"175_CR8","doi-asserted-by":"crossref","unstructured":"Collard B., Standaert F.-X., Quisquater J.-J.: Improving the time complexity of Matsui\u2019s linear cryptanalysis. In: ICISC 2007. LNCS, vol. 4817, pp. 77\u201388. Springer, Heidelberg (2007).","DOI":"10.1007\/978-3-540-76788-6_7"},{"key":"175_CR9","doi-asserted-by":"crossref","unstructured":"Guo J., Jean J., Nikolic I., Sasaki Y.: Meet-in-the-middle attacks on generic feistel constructions. In: ASIACRYPT 2014, Part I. LNCS, vol. 8873, pp. 458\u2013477. Springer, Heidelberg (2014).","DOI":"10.1007\/978-3-662-45611-8_24"},{"key":"175_CR10","doi-asserted-by":"crossref","unstructured":"Hermelin M., Nyberg K.: Dependent linear approximations: the algorithm of Biryukov and others revisited. In: CT-RSA 2010. LNCS, vol. 5985, pp. 318\u2013333. Springer, Heidelberg (2010).","DOI":"10.1007\/978-3-642-11925-5_22"},{"key":"175_CR11","doi-asserted-by":"crossref","unstructured":"Hermelin M., Cho J.Y., Nyberg K.: Multidimensional linear cryptanalysis of reduced round serpent. In: ACISP 2008. LNCS, vol. 5107, pp. 203\u2013215. Springer, Heidelberg (2008).","DOI":"10.1007\/978-3-540-70500-0_15"},{"key":"175_CR12","doi-asserted-by":"crossref","unstructured":"Hermelin M., Cho J.Y., Nyberg K.: Multidimensional extension of Matsui\u2019s algorithm 2. In: FSE 2009. LNCS, vol. 5665, pp. 209\u2013227. Springer, Heidelberg (2009).","DOI":"10.1007\/978-3-642-03317-9_13"},{"key":"175_CR13","doi-asserted-by":"crossref","unstructured":"Isobe T., Shibutani K.: All subkeys recovery attack on block ciphers: extending meet-in-the-middle approach. In: SAC 2012. LNCS, vol. 7707, pp. 202\u2013221. Springer, Heidelberg (2013).","DOI":"10.1007\/978-3-642-35999-6_14"},{"key":"175_CR14","doi-asserted-by":"crossref","unstructured":"Isobe T., Shibutani K.: Generic key recovery attack on feistel scheme. In: ASIACRYPT 2013, Part I. LNCS, vol. 8269, pp. 464\u2013485. Springer, Heidelberg (2013).","DOI":"10.1007\/978-3-642-42033-7_24"},{"key":"175_CR15","doi-asserted-by":"crossref","unstructured":"Kaliski B.S., Robshaw M.J.B.: Linear cryptanalysis using multiple approximations. In: CRYPTO 1994. LNCS, vol. 839, pp. 26\u201339. Springer, Heidelberg (1994).","DOI":"10.1007\/3-540-48658-5_4"},{"key":"175_CR16","doi-asserted-by":"crossref","unstructured":"Knudsen L.R.: The security of feistel ciphers with six rounds or less. J. Cryptol. 15, 207\u2013222 (2002).","DOI":"10.1007\/s00145-002-9839-y"},{"key":"175_CR17","doi-asserted-by":"crossref","unstructured":"Luby M., Rackoff C.: How to construct pseudorandom permutations and pseudorandom functions. SIAM J. Comput. 17, 373\u2013386 (1988).","DOI":"10.1137\/0217022"},{"key":"175_CR18","unstructured":"Matsui M.: Linear cryptanalysis method for DES cipher. In: Eurocrypt 1993. LNCS, vol. 765, pp. 386\u2013397. Springer, Heidelberg (1993)."},{"key":"175_CR19","doi-asserted-by":"crossref","unstructured":"Matsui M.: The first experimental cryptanalysis of the data encryption standard. In: CRYPTO 1994. LNCS, vol. 839, pp. 1\u201311. Springer, Heidelberg (1994).","DOI":"10.1007\/3-540-48658-5_1"},{"key":"175_CR20","doi-asserted-by":"crossref","unstructured":"Nakahara J., Rasmussen M.: Linear analysis of reduced-round CAST-128 and CAST-256. SBSEG 2007, 45\u201355 (2007).","DOI":"10.5753\/sbseg.2007.20914"},{"key":"175_CR21","unstructured":"National Soviet Bureau of Standards: Information Processing System\u2014Cryptographic Protection\u2014Cryptographic Algorithm GOST. pp. 28147\u201328189 (1989)."},{"key":"175_CR22","doi-asserted-by":"crossref","unstructured":"Nguyen P.H., Wu H., Wang H.: Improving the algorithm 2 in multidimensional linear cryptanalysis. In: ACISP 2011. LNCS, vol. 6812, pp. 61\u201374. Springer, Heidelberg (2011).","DOI":"10.1007\/978-3-642-22497-3_5"},{"key":"175_CR23","unstructured":"Schneier B., Kelsey J., Whiting D., Wagner D., Hall C.: Twofish: a 128-bit block cipher. http:\/\/www.schneier.com\/paper-twofish-paper ."},{"key":"175_CR24","unstructured":"Seki H., Kaneko T.: Differential cryptanalysis of CAST-256 reduced to nine quad-rounds. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. E84-A(4), 913\u2013918 (2001)."},{"key":"175_CR25","doi-asserted-by":"crossref","unstructured":"Todo Y.: Upper bounds for the security of several feistel networks. In: ACISP. LNCS, vol. 7959, pp. 302\u2013317. Springer, Heidelberg (2013).","DOI":"10.1007\/978-3-642-39059-3_21"},{"key":"175_CR26","doi-asserted-by":"crossref","unstructured":"Wagner D.: The boomerang attack. In: FSE 1999. LNCS, vol. 1636, pp. 156\u2013170. Springer, Heidelberg (1999).","DOI":"10.1007\/3-540-48519-8_12"},{"key":"175_CR27","doi-asserted-by":"crossref","unstructured":"Wang M., Wang X., Hu C.: New linear cryptanalytic results of reduced-round of CAST-128 and CAST-256. In: SAC 2008. LNCS, vol. 5381, pp. 429\u2013441. Springer, Heidelberg (2009).","DOI":"10.1007\/978-3-642-04159-4_28"},{"key":"175_CR28","doi-asserted-by":"crossref","unstructured":"Wen L., Wang M., Bogdanov A., Chen H.: General application of FFT in cryptanalysis and improved attack on CAST-256. In: INDOCRYPT 2014. LNCS, vol. 8885, pp. 161\u2013176. Springer, Heidelberg (2014).","DOI":"10.1007\/978-3-319-13039-2_10"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-016-0175-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-016-0175-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-016-0175-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,16]],"date-time":"2023-08-16T14:16:30Z","timestamp":1692195390000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-016-0175-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1,16]]},"references-count":28,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["175"],"URL":"https:\/\/doi.org\/10.1007\/s10623-016-0175-x","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"type":"print","value":"0925-1022"},{"type":"electronic","value":"1573-7586"}],"subject":[],"published":{"date-parts":[[2016,1,16]]}}}