{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,12]],"date-time":"2026-04-12T06:44:47Z","timestamp":1775976287894,"version":"3.50.1"},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"2-3","license":[{"start":{"date-parts":[[2018,7,12]],"date-time":"2018-07-12T00:00:00Z","timestamp":1531353600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100003407","name":"Ministero dell\u2019Istruzione, dell\u2019Universit\u00e0 e della Ricerca","doi-asserted-by":"publisher","award":["PRIN 2015TW9LSR"],"award-info":[{"award-number":["PRIN 2015TW9LSR"]}],"id":[{"id":"10.13039\/501100003407","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2019,3]]},"DOI":"10.1007\/s10623-018-0516-z","type":"journal-article","created":{"date-parts":[[2018,7,12]],"date-time":"2018-07-12T13:29:43Z","timestamp":1531402183000},"page":"225-247","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["Differential attacks: using alternative operations"],"prefix":"10.1007","volume":"87","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3672-8485","authenticated-orcid":false,"given":"Roberto","family":"Civino","sequence":"first","affiliation":[]},{"given":"C\u00e9line","family":"Blondeau","sequence":"additional","affiliation":[]},{"given":"Massimiliano","family":"Sala","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,12]]},"reference":[{"key":"516_CR1","unstructured":"Abazari F., Sadeghian B.: Cryptanalysis with ternary difference: applied to block cipher PRESENT. Cryptology ePrint Archive, Report 2011\/022, (2011)."},{"key":"516_CR2","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1007\/3-540-69710-1_15","volume-title":"Serpent: A New Block Cipher Proposal. In Fast Software Encryption","author":"E Biham","year":"1998","unstructured":"Biham E., Anderson R., Knudsen L.: Serpent: A New Block Cipher Proposal. In Fast Software Encryption, pp. 222\u2013238. Springer, New York (1998)."},{"key":"516_CR3","unstructured":"Biham E., Biryukov A., Shamir A.: Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 12\u201323. Springer, New York (1999)."},{"key":"516_CR4","unstructured":"Borghoff J., Canteaut A., G\u00fcneysu T., Kavun E.B., Knezevic M., Knudsen L.R., Leander G., Nikov V., Paar C., Rechberger C., et al.: PRINCE\u2014a low-latency block cipher for pervasive computing applications. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 208\u2013225. Springer, New York (2012)."},{"key":"516_CR5","unstructured":"Brunetta C., Calderini M., Sala M.: Algorithms and bounds for hidden sums in cryptographic trapdoors. arXiv:1702.08384 (2017)."},{"key":"516_CR6","unstructured":"Berson T.A.: Differential cryptanalysis mod $$2^{\\wedge }$$ 2 \u2227 32 with applications to MD5. In: Eurocrypt, vol. 658, pp. 71\u201380. Springer, New York (1992)."},{"key":"516_CR7","first-page":"261","volume":"2010","author":"C Blondeau","year":"2010","unstructured":"Blondeau C., G\u00e9rard B.: Links between theoretical and effective differential probabilities: experiments on PRESENT. IACR Cryptol. ePrint Arch. 2010, 261 (2010).","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"516_CR8","unstructured":"Bogdanov A., Knudsen L.R., Leander G., Paar C., Poschmann A., Robshaw M.J.B., Seurin Y., Vikkelsoe C.: PRESENT: an ultra-lightweight block cipher. In: CHES \u201907, pp. 450\u2013466. Springer, New York (2007)."},{"issue":"1","key":"516_CR9","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E Biham","year":"1991","unstructured":"Biham E., Shamir A.: Differential cryptanalysis of DES-like cryptosystems. J. Cryptol. 4(1), 3\u201372 (1991).","journal-title":"J. Cryptol."},{"issue":"3","key":"516_CR10","doi-asserted-by":"crossref","first-page":"297","DOI":"10.5486\/PMD.2006.3594","volume":"69","author":"A Caranti","year":"2006","unstructured":"Caranti A., Dalla Volta F., Sala M.: Abelian regular subgroups of the affine group and radical rings. Publ. Math. Debrecen 69(3), 297\u2013308 (2006).","journal-title":"Publ. Math. Debrecen"},{"key":"516_CR11","unstructured":"Calderini M., Sala M.: Elementary abelian regular subgroups as hidden sums for cryptographic trapdoors. arXiv:1702.00581 (2017)."},{"issue":"3","key":"516_CR12","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1515\/JMC.2007.011","volume":"1","author":"J Daemen","year":"2007","unstructured":"Daemen J., Rijmen V.: Probability distributions of correlation and differentials in block ciphers. J. Math. Cryptol. 1(3), 221\u2013242 (2007).","journal-title":"J. Math. Cryptol."},{"key":"516_CR13","volume-title":"The Design of Rijndael: AES-the Advanced Encryption Standard","author":"J Daemen","year":"2013","unstructured":"Daemen J., Rijmen V.: The Design of Rijndael: AES-the Advanced Encryption Standard. Springer, New York (2013)."},{"key":"516_CR14","unstructured":"Knudsen L.R., Leander G., Poschmann A., Robshaw M.J.B.: PRINTcipher: a block cipher for IC-printing. In: CHES, vol. 6225, pp. 16\u201332. Springer, New York (2010)."},{"key":"516_CR15","unstructured":"Knudsen L.R.: Truncated and higher order differentials. In: International Workshop on Fast Software Encryption, pp. 196\u2013211. Springer, New York (1994)."},{"key":"516_CR16","unstructured":"Knudsen L.: DEAL\u2014a 128-bit block cipher. In: NIST AES Proposal (1998)."},{"key":"516_CR17","unstructured":"Nyberg K.: Differentially uniform mappings for cryptography. In: Workshop on the Theory and Application of of Cryptographic Techniques, pp. 55\u201364. Springer, New York (1993)."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-018-0516-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-018-0516-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-018-0516-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,3]],"date-time":"2023-09-03T18:00:26Z","timestamp":1693764026000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-018-0516-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,12]]},"references-count":17,"journal-issue":{"issue":"2-3","published-print":{"date-parts":[[2019,3]]}},"alternative-id":["516"],"URL":"https:\/\/doi.org\/10.1007\/s10623-018-0516-z","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,7,12]]},"assertion":[{"value":"19 December 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 June 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 July 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}