{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T16:33:22Z","timestamp":1774370002225,"version":"3.50.1"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2018,6,27]],"date-time":"2018-06-27T00:00:00Z","timestamp":1530057600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61672517"],"award-info":[{"award-number":["61672517"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Cryptography Development Fund","award":["MMJJ201 70108"],"award-info":[{"award-number":["MMJJ201 70108"]}]},{"name":"Fundamental theory and cutting edge technology Research Program of Institute of Information Engineering, CAS","award":["Y7Z0301103"],"award-info":[{"award-number":["Y7Z0301103"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2019,5]]},"DOI":"10.1007\/s10623-018-0510-5","type":"journal-article","created":{"date-parts":[[2018,6,27]],"date-time":"2018-06-27T09:38:07Z","timestamp":1530092287000},"page":"1161-1182","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":44,"title":["Using Bernstein\u2013Vazirani algorithm to attack block ciphers"],"prefix":"10.1007","volume":"87","author":[{"given":"Huiqin","family":"Xie","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2091-0506","authenticated-orcid":false,"given":"Li","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,27]]},"reference":[{"key":"510_CR1","unstructured":"Bennett C.H., Brassard G.: Quantum cryptography: public key distribution and coin tossing. In: International Conference on Computers, Systems and Signal Processing, pp. 175\u2013179 (1984)."},{"key":"510_CR2","doi-asserted-by":"publisher","first-page":"1411","DOI":"10.1137\/S0097539796300921","volume":"26","author":"E Bernstein","year":"1997","unstructured":"Bernstein E., Vazirani U.: Quantum complexity theory. SIAM J. Comput. 26, 1411\u20131473 (1997).","journal-title":"SIAM J. Comput."},{"key":"510_CR3","unstructured":"Boneh D., Zhandry M.: Secure signatures and chosen ciphertext security in a quantum computing world. In: CRYPTO 2013, Part II, pp. 361\u2013379 (2013)."},{"key":"510_CR4","doi-asserted-by":"crossref","unstructured":"Borst J., Knudsen L.R., Rijmen V.: Two attacks on reduced IDEA. In: EUROCRYPT, pp. 1\u201313 (1997).","DOI":"10.1007\/3-540-69053-0_1"},{"key":"510_CR5","unstructured":"Damg\u00e5rd I., Funder J., Nielsen J.B., et al.: Superposition attacks on cryptographic protocols. In: International Conference on Information Theoretic Security, 8317, pp. 142\u2013161 (2013)."},{"issue":"1","key":"510_CR6","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1023\/A:1008399109102","volume":"22","author":"S Dubuc","year":"2001","unstructured":"Dubuc S.: Characterization of linear structures. Des. Codes Cryptogr. 22(1), 33\u201345 (2001).","journal-title":"Des. Codes Cryptogr."},{"issue":"3","key":"510_CR7","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/s001459900025","volume":"10","author":"S Even","year":"1997","unstructured":"Even S., Mansour Y.: A construction of a cipher from a single pseudorandom permutation. J. Cryptol. 10(3), 151\u2013162 (1997).","journal-title":"J. Cryptol."},{"key":"510_CR8","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1017\/S0960129512000151","volume":"23","author":"D Floess","year":"2013","unstructured":"Floess D., Andersson E., Hillery M.: Quantum algorithms for testing and learning Boolean functions. Math. Struct. Comput. Sci. 23, 386\u2013398 (2013).","journal-title":"Math. Struct. Comput. Sci."},{"key":"510_CR9","unstructured":"Gagliardoni T., Hlsing A., Schaffner C.: Semantic security and indistinguishability in the quantum world. In: CRYPTO 2016, Part III, pp. 60\u201389 (2016)."},{"key":"510_CR10","doi-asserted-by":"publisher","first-page":"062329","DOI":"10.1103\/PhysRevA.84.062329","volume":"84","author":"M Hillery","year":"2011","unstructured":"Hillery M., Anderson E.: Quantum tests for the linearity and permutation invariance of Boolean functions. Phys. Rev. A 84, 062329 (2011).","journal-title":"Phys. Rev. A"},{"key":"510_CR11","unstructured":"Kaplan M,. Leurent G,. Leverrier A., et al.: Quantum differential and linear cryptanalysis (2015). \n                    arXiv:1510.05836\n                    \n                  ."},{"key":"510_CR12","unstructured":"Kaplan M., Leurent G., Leverrier A., et al.: Breaking symmetric cryptosystems using quantum period finding. In: CRYPTO 2016, Part II, pp. 207\u2013237 (2016)."},{"key":"510_CR13","first-page":"81","volume":"1999","author":"LR Knudsen","year":"1999","unstructured":"Knudsen L.R., Rijmen V.: On the decorrelated fast cipher (DFC) and its theory. FSE 1999, 81\u201394 (1999).","journal-title":"FSE"},{"key":"510_CR14","doi-asserted-by":"crossref","unstructured":"Kuwakado H., Morii M.: Quantum distinguisher between the 3-round Feistel cipher and the random permutation. In: ISIT, pp. 2682\u20132685 (2010).","DOI":"10.1109\/ISIT.2010.5513654"},{"key":"510_CR15","unstructured":"Kuwakado H., Morii M.: Security on the quantum-type Even\u2013Mansour cipher. In: ISITA 2012, pp. 312\u2013316 (2012)."},{"key":"510_CR16","doi-asserted-by":"crossref","unstructured":"Li H., Yang L.: Quantum differential cryptanalysis to the block ciphers. In: International Conference on Applications and Techniques in Information Security, pp. 44\u201351 (2015).","DOI":"10.1007\/978-3-662-48683-2_5"},{"key":"510_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1017\/S0960129516000013","volume":"28","author":"H Li","year":"2018","unstructured":"Li H., Yang L.: A quantum algorithm to approximate the linear structures of Boolean functions. Math. Struct. Comput. Sci. 28, 1\u201313 (2018).","journal-title":"Math. Struct. Comput. Sci."},{"issue":"2","key":"510_CR18","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1137\/0217022","volume":"17","author":"M Lub","year":"1988","unstructured":"Lub M., Rackoff C.: How to construct pseudorandom permutations from pseudorandom functions. SIAM J. Comput. 17(2), 373\u2013386 (1988).","journal-title":"SIAM J. Comput."},{"key":"510_CR19","doi-asserted-by":"crossref","unstructured":"Nyberg K.: Constructions of bent functions and difference sets. In: EUROCRYPT, pp. 151\u2013160 (1990).","DOI":"10.1007\/3-540-46877-3_13"},{"key":"510_CR20","doi-asserted-by":"crossref","unstructured":"Nyberg K.: Differentially uniform mappings for cryptography. In: EUROCRYPT, pp. 55\u201364 (1993).","DOI":"10.1007\/3-540-48285-7_6"},{"key":"510_CR21","first-page":"65","volume":"17","author":"T Santoli","year":"2017","unstructured":"Santoli T., Schaffner C.: Using simons algorithm to attack symmetric-key cryptographic primitives. Quantum Inf. Comput. 17, 65\u201378 (2017).","journal-title":"Quantum Inf. Comput."},{"key":"510_CR22","unstructured":"Shor P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: FOCS 1994, pp. 124\u2013134. IEEE, Los Alamitos (1994)."},{"key":"510_CR23","doi-asserted-by":"publisher","first-page":"1474","DOI":"10.1137\/S0097539796298637","volume":"26","author":"DR Simon","year":"1997","unstructured":"Simon D.R.: On the power of quantum computation. SIAM J. Comput. 26, 1474\u20131483 (1997).","journal-title":"SIAM J. Comput."},{"issue":"6","key":"510_CR24","doi-asserted-by":"publisher","first-page":"2101","DOI":"10.1007\/s11128-015-0983-3","volume":"14","author":"Q Zhou","year":"2015","unstructured":"Zhou Q., Lu S.F., Zhang Z.G., et al.: Quantum differential cryptanalysis. Quantum Inf. Process. 14(6), 2101\u20132109 (2015).","journal-title":"Quantum Inf. Process."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-018-0510-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-018-0510-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-018-0510-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,21]],"date-time":"2019-09-21T18:44:17Z","timestamp":1569091457000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-018-0510-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,27]]},"references-count":24,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2019,5]]}},"alternative-id":["510"],"URL":"https:\/\/doi.org\/10.1007\/s10623-018-0510-5","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,6,27]]},"assertion":[{"value":"11 November 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 June 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 June 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 June 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}