{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T13:01:19Z","timestamp":1772283679619,"version":"3.50.1"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T00:00:00Z","timestamp":1509062400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100012166","name":"973 Program","doi-asserted-by":"crossref","award":["No. 2013CB834205"],"award-info":[{"award-number":["No. 2013CB834205"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"name":"NSFC Projects","award":["No. 61133"],"award-info":[{"award-number":["No. 61133"]}]},{"name":"NSFC Projects","award":["No. 61572293"],"award-info":[{"award-number":["No. 61572293"]}]},{"name":"Program for New Century Excellent Talents in University of China","award":["NCET-13-0350"],"award-info":[{"award-number":["NCET-13-0350"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1007\/s10623-017-0430-9","type":"journal-article","created":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T07:43:00Z","timestamp":1509090180000},"page":"1923-1945","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Zero-correlation attacks: statistical models independent of the number of approximations"],"prefix":"10.1007","volume":"86","author":[{"given":"Ling","family":"Sun","sequence":"first","affiliation":[]},{"given":"Huaifeng","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Meiqin","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,27]]},"reference":[{"key":"430_CR1","doi-asserted-by":"crossref","unstructured":"Biham E., Biryukov A., Shamir A.: Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. In: Stem J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 12\u201323. Springer, Berlin (1999).","DOI":"10.1007\/3-540-48910-X_2"},{"issue":"1","key":"430_CR2","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E Biham","year":"1991","unstructured":"Biham E., Shamir A.: Differential cryptanalysis of DES-like cryptosystems. J. Cryptol. 4(1), 3\u201372 (1991).","journal-title":"J. Cryptol."},{"key":"430_CR3","unstructured":"Blondeau C., Nyberg K.: On distinct known plaintext attacks. \n                        http:\/\/users.ics.aalto.fi\/~blondeau\/PDF\/WCC_2015.pdf\n                        \n                    ."},{"issue":"1","key":"430_CR4","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1007\/s10623-016-0268-6","volume":"82","author":"C Blondeau","year":"2017","unstructured":"Blondeau C., Nyberg K.: Joint data and key distribution of simple, multiple, and multidimensional linear cryptanalysis test statistic and its impact to data complexity. Des. Codes Cryptogr. 82(1), 319\u2013349 (2017).","journal-title":"Des. Codes Cryptogr."},{"key":"430_CR5","doi-asserted-by":"crossref","unstructured":"Bogdanov A., Geng H., Wang M., Wen L., Collard B.: Zero-correlation linear cryptanalysis with FFT and improved attacks on ISO standards Camellia and CLEFIA. In: Lange T., Lauter K., Lison\u011bk P. (eds.) SAC 2013. LNCS, vol. 8282, pp. 306\u2013323. Springer, Heidelberg (2014).","DOI":"10.1007\/978-3-662-43414-7_16"},{"key":"430_CR6","doi-asserted-by":"crossref","unstructured":"Bogdanov A., Leander G., Nyberg K., Wang M.: Integral and multidimensional linear distinguishers with correlation zero. In: Wang X., Sako K. (eds.) ASIACRYPT 2012. LNCS, vol. 7658, pp. 244\u2013261. Springer, Heidelberg (2012).","DOI":"10.1007\/978-3-642-34961-4_16"},{"issue":"3","key":"430_CR7","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1007\/s10623-012-9697-z","volume":"70","author":"A Bogdanov","year":"2014","unstructured":"Bogdanov A., Rijmen V.: Linear hulls with correlation zero and linear cryptanalysis of block ciphers. Des. Codes Cryptogr. 70(3), 369\u2013383 (2014).","journal-title":"Des. Codes Cryptogr."},{"key":"430_CR8","doi-asserted-by":"crossref","unstructured":"Bogdanov A., Wang M.: Zero correlation linear cryptanalysis with reduced data complexity. In: Canteaut A. (ed.) FSE 2012. LNCS, vol. 7549, pp. 29\u201348. Springer, Heidelberg (2012).","DOI":"10.1007\/978-3-642-34047-5_3"},{"key":"430_CR9","doi-asserted-by":"crossref","unstructured":"Bogdanov A., Boura C., Rijmen V., Wang M., Wen L., Zhao J.: Key difference invariant bias in block ciphers. In: Salo K., Sarkar P. (eds.) ASIACRYPT 2013. LNCS, vol. 8269, pp. 357\u2013376. Springer, Heidelberg (2013).","DOI":"10.1007\/978-3-642-42033-7_19"},{"key":"430_CR10","doi-asserted-by":"crossref","unstructured":"Chen J., Wang M., Preneel B.: Impossible differential cryptanalysis of the lightweight block ciphers TEA, XTEA and HIGHT. In: Progress in Cryptology\u2014AFRICACRYPT 2012, pp. 117\u2013137. Springer, Heidelberg (2012).","DOI":"10.1007\/978-3-642-31410-0_8"},{"key":"430_CR11","doi-asserted-by":"crossref","unstructured":"Hong S., Hong D., Ko Y., Chang D., Lee W., Lee S.: Differential cryptanalysis of TEA and XTEA. In: Lim J., Lee D. (eds.) ICISC 2003. LNCS, vol. 2971, pp. 402\u2013417. Springer, Berlin (2004).","DOI":"10.1007\/978-3-540-24691-6_30"},{"key":"430_CR12","doi-asserted-by":"crossref","unstructured":"Huang J., Vaudenay S., Lai X., Nyberg K.: Capacity and data complexity in multidimensional linear attack. In: Advances in Cryptology\u2014CRYPTO 2015, pp. 141\u2013160. Springer, Berlin (2015).","DOI":"10.1007\/978-3-662-47989-6_7"},{"key":"430_CR13","doi-asserted-by":"crossref","unstructured":"Isobe T., Shibutani K.: Security analysis of the lightweight block ciphers XTEA, LED and Piccolo. In: Susilo W., Mu Y., Seberry J. (eds.) IACISP 2012. LNCS, vol. 7372, pp. 71\u201386. Springer, Heidelberg (2012).","DOI":"10.1007\/978-3-642-31448-3_6"},{"key":"430_CR14","doi-asserted-by":"crossref","unstructured":"Kelsey J., Schneier B., Wagner D.: Key-schedule cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES. In: Kobitz N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 237\u2013251. Springer, Heidelberg (1996).","DOI":"10.1007\/3-540-68697-5_19"},{"key":"430_CR15","unstructured":"Knudsen L.: DEAL\u2014A 128-Bit Block Cipher. NIST AES Proposal (1998)."},{"key":"430_CR16","doi-asserted-by":"crossref","unstructured":"Matsui M.: Linear cryptanalysis method for DES cipher. In: Helleseth T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 386\u2013397. Springer, Berlin (1994).","DOI":"10.1007\/3-540-48285-7_33"},{"key":"430_CR17","doi-asserted-by":"crossref","unstructured":"Moon D., Hwang K., Lee W., Lee S., Lim J.: Impossible differential cryptanalysis of reduced round XTEA and TEA. In: Daemon J., Rijmen V. (eds.) FSE 2002. LNCS, vol. 2365, pp. 49\u201360. Springer, Berlin (2002).","DOI":"10.1007\/3-540-45661-9_4"},{"key":"430_CR18","unstructured":"Needham R.M., Wheeler D.J.: TEA, a tiny encryption algorithm. In: Preneel B. (ed.) FSE 1994. LNCS, vol. 1008, pp. 363\u2013366 (1995)."},{"key":"430_CR19","volume-title":"TEA Extensions. Report","author":"RM Needham","year":"1997","unstructured":"Needham R.M., Wheeler D.J.: TEA Extensions. Report. Cambridge University, Cambridge (1997)."},{"issue":"4","key":"430_CR20","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1080\/0161-110291890948","volume":"26","author":"RCW Phan","year":"2002","unstructured":"Phan R.C.W.: Mini advanced encryption standard (Mini-AES): a testbed for cryptanalysis students. Cryptologia 26(4), 283\u2013306 (2002).","journal-title":"Cryptologia"},{"key":"430_CR21","doi-asserted-by":"crossref","unstructured":"Sasaki Y., Wang L., Sakai Y., Sakiyama K., Ohta K.: Three-subset meet-in-the-middle attack on reduced XTEA. In: Mitrokotsa A., Vaudenay S. (eds.) AFRICACRYPT 2012. LNCS, vol. 7374, pp. 138\u2013154. Springer, Heidelberg (2012).","DOI":"10.1007\/978-3-642-31410-0_9"},{"key":"430_CR22","doi-asserted-by":"crossref","unstructured":"Sekar G., Mouha N., Velichkov V., Preneel B.: Meet-in-the-middle attacks on reduced-round XTEA. In: Kiayias A. (ed.) CT-RSA 2011. LNCS, vol. 6558, pp. 250\u2013267. Springer, Heidelberg (2011).","DOI":"10.1007\/978-3-642-19074-2_17"},{"issue":"2","key":"430_CR23","doi-asserted-by":"crossref","first-page":"683","DOI":"10.1007\/s10623-014-9976-y","volume":"73","author":"H Soleimany","year":"2014","unstructured":"Soleimany H., Nyberg K.: Zero-correlation linear cryptanalysis of reduced-round LBlock. Des. Codes Cryptogr. 73(2), 683\u2013698 (2014).","journal-title":"Des. Codes Cryptogr."},{"key":"430_CR24","doi-asserted-by":"crossref","unstructured":"Wang Y., Wu W.: Improved multidimensional zero-correlation linear cryptanalysis and applications to LBlock and TWINE. In: Susilo W., Mu Y. (eds.) ACISP 2014. LNCS, vol. 8544, pp. 1\u201316. Springer, Cham (2014).","DOI":"10.1007\/978-3-319-08344-5_1"},{"key":"430_CR25","doi-asserted-by":"crossref","unstructured":"Wen L., Wang M., Bogdanov A.: Multidimensional zero-correlation linear cryptanalysis of E2. In: Pointcheval D., Vergnaud D. (eds.) AFRICACRYPT 2014. LNCS, vol. 8649, pp. 147\u2013164. Springer, Cham (2014).","DOI":"10.1007\/978-3-319-06734-6_10"},{"key":"430_CR26","doi-asserted-by":"crossref","unstructured":"Wen L., Wang M., Bogdanov A., Chen H.: General application of FFT in cryptanalysis and improved attack on CAST-256. In: Meier W., Mukhopadhyay D. (eds.) INDOCRYPT 2014. LNCS, vol. 8885, pp. 161\u2013176. Springer, Cham (2014).","DOI":"10.1007\/978-3-319-13039-2_10"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-017-0430-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-017-0430-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-017-0430-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,18]],"date-time":"2020-05-18T11:50:04Z","timestamp":1589802604000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-017-0430-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,27]]},"references-count":26,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2018,9]]}},"alternative-id":["430"],"URL":"https:\/\/doi.org\/10.1007\/s10623-017-0430-9","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,10,27]]}}}