{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T11:02:47Z","timestamp":1777633367583,"version":"3.51.4"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2016,9,21]],"date-time":"2016-09-21T00:00:00Z","timestamp":1474416000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1007\/s10623-016-0277-5","type":"journal-article","created":{"date-parts":[[2016,9,21]],"date-time":"2016-09-21T14:50:44Z","timestamp":1474469444000},"page":"425-449","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Higher order differentiation over finite fields with applications to generalising the cube attack"],"prefix":"10.1007","volume":"84","author":[{"given":"Ana","family":"S\u0103l\u0103gean","sequence":"first","affiliation":[]},{"given":"R.","family":"Winter","sequence":"additional","affiliation":[]},{"given":"Matei","family":"Mandache-S\u0103l\u0103gean","sequence":"additional","affiliation":[]},{"given":"Raphael C.-W.","family":"Phan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,21]]},"reference":[{"key":"277_CR1","unstructured":"Agnesse A., Pedicini M.: Cube attack in finite fields of higher order. In: Proceedings of the Ninth Australasian Information Security Conference\u2014AISC \u201911, vol. 116, pp. 9\u201314 (2011)."},{"key":"277_CR2","doi-asserted-by":"crossref","unstructured":"Aumasson J.-P., Dinur I., Meier W., Shamir A.: Cube testers and key recovery attacks on reduced-round MD6 and Trivium. In: 16th International Workshop on Fast Software Encryption\u2014FSE, pp. 1\u201322 (2009).","DOI":"10.1007\/978-3-642-03317-9_1"},{"issue":"1","key":"277_CR3","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E Biham","year":"1991","unstructured":"Biham E., Shamir A.: Differential cryptanalysis of DES-like cryptosystems. J. Cryptol. 4(1), 3\u201372 (1991).","journal-title":"J. Cryptol."},{"key":"277_CR4","unstructured":"Daemen J., Govaerts R., Vandewalle J.: Block ciphers based on modular arithmetic. In: Wolfowicz W. (ed.) Proceedings of the 3rd Symposium on the State and Progress of Research in Cryptography, pp. 80\u201389. Fondazione Ugo Bordoni (1993)."},{"key":"277_CR5","doi-asserted-by":"crossref","unstructured":"Dinur I., Shamir A.: Cube attacks on tweakable black box polynomials. In: EUROCRYPT, pp. 278\u2013299 (2009).","DOI":"10.1007\/978-3-642-01001-9_16"},{"issue":"2","key":"277_CR6","doi-asserted-by":"crossref","first-page":"115","DOI":"10.2307\/2690762","volume":"64","author":"F Dodd","year":"1991","unstructured":"Dodd F., Peele R.: Some counting problems involving the multinomial expansion. Math. Mag. 64(2), 115\u2013122 (1991).","journal-title":"Math. Mag."},{"key":"277_CR7","doi-asserted-by":"crossref","unstructured":"Duan M., Lai X.: Higher order differential cryptanalysis framework and its applications. In: International Conference on Information Science and Technology (ICIST), pp. 291\u2013297 (2011).","DOI":"10.1109\/ICIST.2011.5765256"},{"key":"277_CR8","unstructured":"Ekdahl P., Johansson T.: SNOW\u2014a new stream cipher. In: Proceedings of the First NESSIE Workshop. Heverlee, Belgium (2000)."},{"key":"277_CR9","unstructured":"ETSI\/SAGE: Specification of the 3GPP confidentiality and integrity algorithms 128-EEA3 & 128-EIA3. Document 2: ZUC specification. Technical Report 1.6, ETSI, (2011)."},{"key":"277_CR10","doi-asserted-by":"crossref","unstructured":"Filiol E.: A new statistical testing for symmetric ciphers and hash functions. In: Deng R., Bao F., Zhou J., Qing S. (eds.) Information and Communications Security. Lecture Notes in Computer Science, vol. 2513, pp. 342\u2013353. Springer, Berlin (2002).","DOI":"10.1007\/3-540-36159-6_29"},{"key":"277_CR11","doi-asserted-by":"crossref","unstructured":"Fouque P.-A., Vannet T.: Improving key recovery to 784 and 799 rounds of Trivium using optimized cube attacks. In: 20th International Workshop on Fast Software Encryption\u2014FSE, pp. 502\u2013517 (2013).","DOI":"10.1007\/978-3-662-43933-3_26"},{"key":"277_CR12","doi-asserted-by":"crossref","DOI":"10.1201\/9781420070033","volume-title":"Algorithmic Cryptanalysis","author":"A Joux","year":"2009","unstructured":"Joux A.: Algorithmic Cryptanalysis, 1st edn. Chapman & Hall\/CRC, Boca Raton (2009).","edition":"1"},{"key":"277_CR13","doi-asserted-by":"crossref","unstructured":"Kaufman T., Ron D.: Testing polynomials over general fields. In: Proceedings of the 45th Annual IEEE Symposium on Foundations of Computer Science, pp. 413\u2013422 (2004).","DOI":"10.1109\/FOCS.2004.65"},{"issue":"3\u20134","key":"277_CR14","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1007\/s12095-012-0071-9","volume":"4","author":"S Knellwolf","year":"2012","unstructured":"Knellwolf S., Meier W.: High order differential attacks on stream ciphers. Cryptogr. Commun. 4(3\u20134), 203\u2013215 (2012).","journal-title":"Cryptogr. Commun."},{"key":"277_CR15","doi-asserted-by":"crossref","unstructured":"Kummer E.E.: \u00dcber die Erg\u00e4nzungss\u00e4tze zu den allgemeinen Reciprocit\u00e4tsgesetzen J. Reine Angew. Math. 44, 93\u2013146 (1852).","DOI":"10.1515\/crll.1852.44.93"},{"key":"277_CR16","doi-asserted-by":"crossref","unstructured":"Lai X.: Higher order derivatives and differential cryptanalysis. In: Blahut R.E., Costello D.J., Jr., Maurer U., Mittelholzer T. (eds.) Communications and Cryptography. The Springer International Series in Engineering and Computer Science, vol. 276, pp. 227\u2013233. Springer, Berlin (1994).","DOI":"10.1007\/978-1-4615-2694-0_23"},{"key":"277_CR17","doi-asserted-by":"crossref","unstructured":"Lai X., Massey J.L.: A proposal for a new block encryption standard. In: EUROCRYPT, pp. 389\u2013404 (1990).","DOI":"10.1007\/3-540-46877-3_35"},{"key":"277_CR18","doi-asserted-by":"crossref","unstructured":"Lai X., Massey J.L., Murphy S.: Markov ciphers and differential cryptanalysis. In: EUROCRYPT, pp. 17\u201338 (1991).","DOI":"10.1007\/3-540-46416-6_2"},{"key":"277_CR19","volume-title":"The Theory of Error-Correcting Codes","author":"FJ MacWilliams","year":"1977","unstructured":"MacWilliams F.J., Sloane N.J.A.: The Theory of Error-Correcting Codes. North Holland, Amsterdam (1977)."},{"key":"277_CR20","unstructured":"O\u2019Neil S.: Algebraic structure defectoscopy. Cryptology ePrint Archive, Report 2007\/378. http:\/\/eprint.iacr.org\/ (2007)."},{"key":"277_CR21","unstructured":"Vielhaber M.: Breaking ONE.FIVIUM by AIDA an algebraic IV differential attack. Cryptology ePrint Archive, Report 2007\/413. http:\/\/eprint.iacr.org\/ (2007)."},{"key":"277_CR22","unstructured":"Vielhaber M.: AIDA breaks BIVIUM (A & B) in 1 minute dual core CPU time. Cryptology ePrint Archive, Report 2009\/402. http:\/\/eprint.iacr.org\/ (2009)."},{"key":"277_CR23","doi-asserted-by":"crossref","unstructured":"Winter R., S\u0103l\u0103gean A., Phan R.C.W.: Comparison of cube attacks over different vector spaces. In: Groth, J. (ed.) 15th IMA International Conference on Cryptography and Coding, IMACC. Lecture Notes in Computer Science, vol. 9496, pp. 225\u2013238. Springer, Berlin (2015).","DOI":"10.1007\/978-3-319-27239-9_14"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-016-0277-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-016-0277-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-016-0277-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,13]],"date-time":"2019-09-13T21:09:29Z","timestamp":1568408969000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-016-0277-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,21]]},"references-count":23,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,9]]}},"alternative-id":["277"],"URL":"https:\/\/doi.org\/10.1007\/s10623-016-0277-5","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,9,21]]}}}