{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:56:34Z","timestamp":1771700194572,"version":"3.50.1"},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2017,7,28]],"date-time":"2017-07-28T00:00:00Z","timestamp":1501200000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100012166","name":"973 Program","doi-asserted-by":"crossref","award":["2013CB834205"],"award-info":[{"award-number":["2013CB834205"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61672019"],"award-info":[{"award-number":["61672019"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1007\/s10623-017-0396-7","type":"journal-article","created":{"date-parts":[[2017,7,28]],"date-time":"2017-07-28T15:04:45Z","timestamp":1501254285000},"page":"1295-1310","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Conditional cube attack on round-reduced River Keyak"],"prefix":"10.1007","volume":"86","author":[{"given":"Wenquan","family":"Bi","sequence":"first","affiliation":[]},{"given":"Zheng","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6723-6013","authenticated-orcid":false,"given":"Xiaoyang","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Lu","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xiaoyun","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,28]]},"reference":[{"key":"396_CR1","doi-asserted-by":"crossref","unstructured":"Aumasson, J.P., Dinur I., Meier W., Shamir A. : Cube testers and key recovery attacks on reduced-round MD6 and trivium. In: FSE 2009, LNCS, vol. 5665, pp. 1\u201322. Springer, Heidelberg (2009).","DOI":"10.1007\/978-3-642-03317-9_1"},{"key":"396_CR2","unstructured":"Bertoni G., Daemen J., Peeters M., Van Assche G.: Keccak sponge function family. \n                        http:\/\/keccak.noekeon.org\/\n                        \n                    ."},{"key":"396_CR3","unstructured":"CAESAR: Competition for Authenticated Encryption: Security, Applicability, and Robustness. \n                        http:\/\/competitions.cr.yp.to\/caesar.html\n                        \n                    ."},{"key":"396_CR4","doi-asserted-by":"publisher","unstructured":"Chaigneau C., Fuhr T., Gilbert H., Jean J., Reinhard J.R.: Cryptanalysis of NORX v2. 0. IACR Trans. Symmetric Cryptol. doi:\n                        10.13154\/tosc.v2017.i1.156-174\n                        \n                     (2017).","DOI":"10.13154\/tosc.v2017.i1.156-174"},{"key":"396_CR5","doi-asserted-by":"crossref","unstructured":"Das S., Meier W.: Differential biases in reduced-round Keccak. In: AFRICACRYPT 2014, LNCS, vol. 8469, pp. 69\u201387. Springer, Heidelberg (2014).","DOI":"10.1007\/978-3-319-06734-6_5"},{"key":"396_CR6","doi-asserted-by":"crossref","unstructured":"Daemen J., Van Assche G. :Differential propagation analysis of Keccak. In: FSE 2012, pp. 422\u2013441. Springer, Heidelberg (2012).","DOI":"10.1007\/978-3-642-34047-5_24"},{"key":"396_CR7","doi-asserted-by":"crossref","unstructured":"Dinur I., Shamir A.: Cube attacks on tweakable black box polynomials. In: EUROCRYPT 2009, LNCS, vol. 5479, pp. 278\u2013299. Springer, Heidelberg (2009).","DOI":"10.1007\/978-3-642-01001-9_16"},{"key":"396_CR8","doi-asserted-by":"crossref","unstructured":"Dinur I., Shamir A. : Breaking Grain-128 with dynamic cube attacks. In: FSE 2011, LNCS, vol. 6733, pp. 167\u2013187. Springer, Heidelberg (2011).","DOI":"10.1007\/978-3-642-21702-9_10"},{"key":"396_CR9","doi-asserted-by":"crossref","unstructured":"Dinur I., Morawiecki P., Pieprzyk J., Srebrny M., Straus M.: Cube attacks and cube-attack-like cryptanalysis on the round-reduced Keccak sponge function. In: EUROCRYPT 2015, Part I, LNCS, vol. 9056, pp. 733\u2013761. Springer, Heidelberg (2015)","DOI":"10.1007\/978-3-662-46800-5_28"},{"key":"396_CR10","doi-asserted-by":"publisher","unstructured":"Dong X., Li Z., Wang X., Qin L.: Cube-like attack on round-reduced initialization of Ketje Sr. IACR Trans. Symmetric Cryptol. doi:\n                        10.13154\/tosc.v2017.i1\n                        \n                     (2017).","DOI":"10.13154\/tosc.v2017.i1"},{"key":"396_CR11","doi-asserted-by":"crossref","unstructured":"Fouque P.A., Vannet T.: Improving key recovery to 784 and 799 rounds of trivium using optimized cube attacks. In: FSE 2013, LNCS, vol. 8424, pp. 502\u2013517. Springer, Heidelberg (2014).","DOI":"10.1007\/978-3-662-43933-3_26"},{"key":"396_CR12","unstructured":"Guido B., Joan D., Micha\u00ebl P., Assche G.V.: Keyak. \n                        http:\/\/keyak.noekeon.org\n                        \n                    ."},{"key":"396_CR13","unstructured":"Guido B., Joan D., Micha\u00ebl P., Assche G.V.: The Keccak SHA-3 Submission. Submission to NIST (Round 3) (2011)."},{"key":"396_CR14","doi-asserted-by":"crossref","unstructured":"Guo J., Liu M., Song L.: Linear structures: applications to cryptanalysis of round-reduced Keccak. In: ASIACRYPT 2016, Part I, LNCS, vol. 10031, pp. 249\u2013274. Springer, Heidelberg (2016).","DOI":"10.1007\/978-3-662-53887-6_9"},{"key":"396_CR15","doi-asserted-by":"crossref","unstructured":"Huang S., Wang X., Xu G., Wang M., Zhao J.: Conditional cube attack on reduced-round Keccak sponge function. In: EUROCRYPT 2017, Part II, LNCS, vol. 10211, pp. 259\u2013288. Springer, Heidelberg (2017).","DOI":"10.1007\/978-3-319-56614-6_9"},{"key":"396_CR16","doi-asserted-by":"publisher","unstructured":"Li Z., Dong X., Wang X.: Conditional cube attack on round-reduced ASCON. IACR Trans. Symmetric Cryptol. doi:\n                        10.13154\/tosc.v2017.i1\n                        \n                     (2017).","DOI":"10.13154\/tosc.v2017.i1"},{"key":"396_CR17","unstructured":"NIST FIPS.197: Advanced Encryption Standard (AES). \n                        http:\/\/csrc.nist.gov\/publications\/fips\/fips197\/fips-197.pdf\n                        \n                     (2001)."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-017-0396-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-017-0396-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-017-0396-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,18]],"date-time":"2020-05-18T03:35:26Z","timestamp":1589772926000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-017-0396-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,28]]},"references-count":17,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2018,6]]}},"alternative-id":["396"],"URL":"https:\/\/doi.org\/10.1007\/s10623-017-0396-7","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,7,28]]}}}