{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:22:57Z","timestamp":1740122577840,"version":"3.37.3"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2018,6,9]],"date-time":"2018-06-09T00:00:00Z","timestamp":1528502400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"crossref","award":["61572293","61602276"],"award-info":[{"award-number":["61572293","61602276"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2019,5]]},"DOI":"10.1007\/s10623-018-0501-6","type":"journal-article","created":{"date-parts":[[2018,6,9]],"date-time":"2018-06-09T05:08:45Z","timestamp":1528520925000},"page":"1035-1058","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Cryptanalysis of MORUS"],"prefix":"10.1007","volume":"87","author":[{"given":"Yanbin","family":"Li","sequence":"first","affiliation":[]},{"given":"Meiqin","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,9]]},"reference":[{"key":"501_CR1","unstructured":"Bellare M., Namprempre C.: Authenticated encryption: relations among notions and analysis of the generic composition paradigm. In: Okamoto T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 531\u2013545. Springer, Heidelberg (2000)."},{"key":"501_CR2","unstructured":"Dinur I., Shamir A.: Cube attacks on tweakable black box polynomials. In: Joux A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 278\u2013299. Springer, Heidelberg (2009)."},{"key":"501_CR3","doi-asserted-by":"crossref","unstructured":"Dwivedi A.D., Morawiecki P., W\u00f2jtowicz S.: Differential and rotational cryptanalysis of round-reduced MORUS. In: SECRYPT 2017.","DOI":"10.1016\/j.ipl.2018.03.010"},{"key":"501_CR4","unstructured":"Gligor V., Donescu P.: Fast encryption and authentication: XCBC encryption and XECB authentication modes. In: Matsui M. (ed.) FSE 2001. LNCS, vol. 2355, pp. 92\u2013108. Springer, Heidelberg (2002)."},{"key":"501_CR5","unstructured":"Gurobi Optimization Inc.: Gurobi optimizer 6.5. Ocial webpage (2015). http:\/\/www.gurobi.com\/ ."},{"key":"501_CR6","unstructured":"Jutla C.: Encryption modes with almost free message integrity. In: Pfitzmann B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 529\u2013544. Springer, Heidelberg (2001)."},{"key":"501_CR7","unstructured":"Mileva A., Dimitrova V., Velichkov V.: Analysis of the Authenticated Cipher MORUS (v1). In: Pasalic E., Knudsen L.R. (eds.) BalkanCryptSec 2015. LNCS, vol. 9540, Koper, Slovenia, pp. 45\u201359 (2016)."},{"key":"501_CR8","unstructured":"Mouha N., Wang Q., Gu D., Preneel B.: Differential and linear cryptanalysis using mixed-integer linear programming. In: Wu C.-K., Yung M., Lin D. (eds.) Inscrypt 2011. LNCS, vol. 7537, pp. 57\u201376. Springer, Heidelberg (2012)."},{"key":"501_CR9","unstructured":"NIST: Advanced Encryption Standard (AES), federal Information Processing Standards Publication FIPS 197."},{"key":"501_CR10","unstructured":"Rogaway P.: Authenticated-encryption with associated-data. In: ACM Conference on Computer and Communications Security (CCS-9). ACM Press, New York, pp. 98\u2013107 (2002)."},{"key":"501_CR11","doi-asserted-by":"crossref","unstructured":"Rogaway P., Bellare M., Black J., Krovetz T.: OCB: a block-cipher mode of operation for efficient authenticated encryption. In: ACM Conference on Computer and Communications Security (CCS-8). ACM Press, New York (2001).","DOI":"10.1145\/501983.502011"},{"key":"501_CR12","doi-asserted-by":"crossref","unstructured":"Shi T.R., Guan J., Li J.Z., Zhang P.: Improved collision cryptanalysis of authenticated cipher MORUS. In: AIIE 2016. Advances in Intelligent Systems Research, vol. 133, pp. 429\u2013432.","DOI":"10.2991\/aiie-16.2016.98"},{"key":"501_CR13","unstructured":"Sun S., Hu L., Song L., Xie Y., Wang P.: Automatic security evaluation of block ciphers with S-bP structures against related-key differential attacks. In: Lin D., et al. (eds.) Inscrypt 2013. LNCS, vol. 8567, pp. 39\u201351. Springer, Heidelberg (2013)."},{"key":"501_CR14","unstructured":"Sun S., Hu L., Qiao K., Ma X., Song L.: Automatic Security evaluation and (related-key) differential characteristic search: application to SIMON, PRESENT, LBlock, DES(L) and other bit-oriented block ciphers. In: Sarkar P., Iwata T. (eds.) ASIACRYPT 2014. LNCS, vol. 8873, pp. 158\u2013178. Springer, Heidelberg (2014)."},{"key":"501_CR15","unstructured":"Sun S., Hu L., Wang M., Wang P., Qiao K., Ma X., Shi D., Song L., Fu K.: Towards finding the best characteristics of some bit-oriented block ciphers and automatic enumeration of (related-key) differential and linear characteristics with predefined properties. Cryptology ePrint Archive. Report 2014\/747 (2014). https:\/\/eprint.iacr.org\/ ."},{"key":"501_CR16","unstructured":"Sun L., Wang W., Liu R., Wang M.Q.: MILP-aided bit-based division property for ARX-based block cipher. http:\/\/eprint.iacr.org\/2016\/1101.pdf ."},{"key":"501_CR17","unstructured":"The CAESAR committee: CAESAR: Competition for authenticated encryption: Security, applicability, and robustness. http:\/\/competitions.cr.yp.to\/caesar.html ."},{"key":"501_CR18","unstructured":"Todo Y.: Structural evaluation by generalized integral property. In: Oswald E., Fischlin M. (eds.) EUROCRYPT 2015, Part I. LNCS, vol. 9056, pp. 287\u2013314. Springer, Heidelberg (2015)."},{"key":"501_CR19","unstructured":"Todo Y., Morii M.: Bit-based division property and application to SIMON family. In: Peyrin T. (ed.) FSE 2016. LNCS, vol. 9783, pp. 357\u2013377. Springer, Heidelberg (2016)."},{"key":"501_CR20","unstructured":"Todo Y., Isobe T., Hao Y.L., Meier W.: Cube attacks on non-blackbox polynomials based on division property. In: Katz J., Shacham H. (eds.) CRYPTO 2017, Part III. LNCS, vol. 10403, pp. 250\u2013279. Springer, Heidelberg (2017)."},{"key":"501_CR21","unstructured":"Winnen L.: Sage S-box Milp Toolkit. http:\/\/www.ecrypt.eu.org\/tools\/sage-s-box-milp-toolkit ."},{"key":"501_CR22","unstructured":"Wu H.J., Huang T.: The Authenticated Cipher MORUS (v2). http:\/\/competitions.cr.yp.to\/round3\/morusv2.pdf ."},{"key":"501_CR23","unstructured":"Wu S., Wang M.: Security evaluation against differential cryptanalysis for block cipher structures. Cryptology ePrint Archive. Report 2011\/551 (2011). https:\/\/eprint.iacr.org\/ ."},{"key":"501_CR24","unstructured":"Xiang Z.J., Zhang W.T., Bao Z.Z., Lin D.D.: Applying MILP method to searching integral distinguishers based on division property for 6 lightweight block ciphers. In: Cheon J.H., Takagi T. (eds.) ASIACRYPT 2016, Part I. LNCS, vol. 10031, pp. 648\u2013678. Springer, Heidelberg (2016)."},{"issue":"6","key":"501_CR25","first-page":"536","volume":"2","author":"P Zhang","year":"2015","unstructured":"Zhang P., Guan J., Li J.Z., Shi T.R.: Research on the confusion and diffusion properties of the initialization of MORUS. J. Cryptol. Res. 2(6), 536\u2013548 (2015).","journal-title":"J. Cryptol. Res."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-018-0501-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-018-0501-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-018-0501-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,25]],"date-time":"2022-08-25T10:03:11Z","timestamp":1661421791000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-018-0501-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,9]]},"references-count":25,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2019,5]]}},"alternative-id":["501"],"URL":"https:\/\/doi.org\/10.1007\/s10623-018-0501-6","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"type":"print","value":"0925-1022"},{"type":"electronic","value":"1573-7586"}],"subject":[],"published":{"date-parts":[[2018,6,9]]},"assertion":[{"value":"9 October 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 March 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 May 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 June 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}