{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T14:57:06Z","timestamp":1773932226627,"version":"3.50.1"},"reference-count":75,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,11,19]],"date-time":"2021-11-19T00:00:00Z","timestamp":1637280000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,11,19]],"date-time":"2021-11-19T00:00:00Z","timestamp":1637280000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2022,1]]},"DOI":"10.1007\/s10623-021-00970-9","type":"journal-article","created":{"date-parts":[[2021,11,19]],"date-time":"2021-11-19T18:02:58Z","timestamp":1637344978000},"page":"155-198","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":33,"title":["SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations"],"prefix":"10.1007","volume":"90","author":[{"given":"Shiyao","family":"Chen","sequence":"first","affiliation":[]},{"given":"Yanhong","family":"Fan","sequence":"additional","affiliation":[]},{"given":"Ling","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Haibo","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Yongqing","family":"Li","sequence":"additional","affiliation":[]},{"given":"Meiqin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Weijia","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Chun","family":"Guo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,11,19]]},"reference":[{"key":"970_CR1","unstructured":"Andreeva E., Lallemand V., Purnal A., Reyhanitabar R., Roy A., Viz\u00e1r D.: ForkAE v.1. In: Submission to Round 2 of the NIST Lightweight Cryptography Standardization process (2020)"},{"key":"970_CR2","doi-asserted-by":"publisher","unstructured":"Ankele R., K\u00f6lbl S.: Mind the gap\u2014a closer look at the security of block ciphers against differential cryptanalysis. In: Selected Areas in Cryptography\u2014SAC 2018\u201425th International Conference, Calgary, AB, Canada, 15\u201317 August 2018, Revised Selected Papers. pp. 163\u2013190 (2018). https:\/\/doi.org\/10.1007\/978-3-030-10970-7_8.","DOI":"10.1007\/978-3-030-10970-7_8"},{"issue":"1","key":"970_CR3","doi-asserted-by":"publisher","first-page":"57","DOI":"10.13154\/tosc.v2016.i1.57-70","volume":"2016","author":"T Ashur","year":"2016","unstructured":"Ashur T., Liu Y.: Rotational cryptanalysis in the presence of constants. IACR Trans. Symmetric Cryptol. 2016(1), 57\u201370 (2016). https:\/\/doi.org\/10.13154\/tosc.v2016.i1.57-70.","journal-title":"IACR Trans. Symmetric Cryptol."},{"issue":"1","key":"970_CR4","doi-asserted-by":"publisher","first-page":"4","DOI":"10.13154\/tosc.v2017.i1.4-44","volume":"2017","author":"R Avanzi","year":"2017","unstructured":"Avanzi R.: The QARMA block cipher family. almost MDS matrices over rings with zero divisors, nearly symmetric even-Mansour constructions with non-involutory central rounds, and search heuristics for low-latency s-boxes. IACR Trans. Symmetric Cryptol. 2017(1), 4\u201344 (2017). https:\/\/doi.org\/10.13154\/tosc.v2017.i1.4-44.","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"970_CR5","doi-asserted-by":"publisher","unstructured":"Banik S., Bogdanov A., Isobe T., Shibutani K., Hiwatari H., Akishita T., Regazzoni F.: Midori: A block cipher for low energy. In: Advances in Cryptology\u2014ASIACRYPT 2015\u201421st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, 29 November\u2013December 3, 2015, Proceedings, Part II, pp. 411\u2013436 (2015). https:\/\/doi.org\/10.1007\/978-3-662-48800-3_17.","DOI":"10.1007\/978-3-662-48800-3_17"},{"key":"970_CR6","doi-asserted-by":"publisher","unstructured":"Banik S., Pandey S.K., Peyrin T., Sasaki Y., Sim S.M., Todo Y.: GIFT: a small present\u2014towards reaching the limit of lightweight encryption. In: Cryptographic Hardware and Embedded Systems\u2014CHES 2017\u201419th International Conference, Taipei, Taiwan, 25\u201328 September 2017, Proceedings. pp. 321\u2013345 (2017). https:\/\/doi.org\/10.1007\/978-3-319-66787-4_16.","DOI":"10.1007\/978-3-319-66787-4_16"},{"key":"970_CR7","doi-asserted-by":"crossref","unstructured":"Banik S., Bao Z., Isobe T., Kubo H., Liu F., Minematsu K., Sakamoto K., Shibata N., Shigeri M.: WARP: Revisiting GFN for lightweight 128-bit block cipher. In: IACR Cryptology ePrint Archives 2020, 1320 (2020). https:\/\/eprint.iacr.org\/2020\/1320\/.","DOI":"10.1007\/978-3-030-81652-0_21"},{"key":"970_CR8","unstructured":"Banik S., Bogdanov A., Peyrin T., Sasaki Y., Sim S.M., Tischhauser E., Todo Y.: SUNDAE-GIFT v1.0. In: Submission to Round 2 of the NIST Lightweight Cryptography Standardization process (2020)."},{"key":"970_CR9","unstructured":"Banik S., Chakraborti A., Iwata T., Minematsu K., Nandi M., Peyrin T., Sasaki Y., Sim S.M., Todo Y.: GIFT-COFB v1.0. In: Finalists of the NIST Lightweight Cryptography Standardization process (2021)."},{"issue":"18","key":"970_CR10","doi-asserted-by":"publisher","first-page":"5238","DOI":"10.1002\/sec.1692","volume":"9","author":"G Bansod","year":"2016","unstructured":"Bansod G., Patil A., Sutar S., Pisharoty N.: ANU: an ultra lightweight cipher design for security in IoT. Security Commun. Netw. 9(18), 5238\u20135251 (2016).","journal-title":"Security Commun. Netw."},{"key":"970_CR11","doi-asserted-by":"publisher","unstructured":"Baysal A., Sahin S.: RoadRunneR: a small and fast bitslice block cipher for low cost 8-bit processors. In: Lightweight Cryptography for Security and Privacy\u20144th International Workshop, LightSec 2015, Bochum, Germany, 10\u201311 September 2015, Revised Selected Papers, pp. 58\u201376 (2015). https:\/\/doi.org\/10.1007\/978-3-319-29078-2_4.","DOI":"10.1007\/978-3-319-29078-2_4"},{"key":"970_CR12","unstructured":"Beaulieu R., Shors D., Smith J., Treatman-Clark S., Weeks B., Wingers L.: The SIMON and SPECK families of lightweight block ciphers. IACR Cryptology ePrint Archive 2013, 404 (2013). http:\/\/eprint.iacr.org\/2013\/404."},{"key":"970_CR13","doi-asserted-by":"publisher","unstructured":"Beierle C., Jean J., K\u00f6lbl S., Leander G., Moradi A., Peyrin T., Sasaki Y., Sasdrich P., Sim S.M.: The SKINNY family of block ciphers and its low-latency variant MANTIS. In: Advances in Cryptology\u2014CRYPTO 2016\u201436th Annual International Cryptology Conference, Santa Barbara, CA, USA, 14\u201318 August 2016, Proceedings, Part II, pp. 123\u2013153 (2016). https:\/\/doi.org\/10.1007\/978-3-662-53008-5_5.","DOI":"10.1007\/978-3-662-53008-5_5"},{"issue":"1","key":"970_CR14","doi-asserted-by":"publisher","first-page":"5","DOI":"10.13154\/tosc.v2019.i1.5-45","volume":"2019","author":"C Beierle","year":"2019","unstructured":"Beierle C., Leander G., Moradi A., Rasoolzadeh S.: CRAFT: lightweight tweakable block cipher with efficient protection against DFA attacks. IACR Trans. Symmetric Cryptol. 2019(1), 5\u201345 (2019). https:\/\/doi.org\/10.13154\/tosc.v2019.i1.5-45.","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"970_CR15","doi-asserted-by":"crossref","unstructured":"Beierle C., JeanJ., K\u00f6lbl S., Leander G., Moradi A., Peyrin T., Sasaki Y., Sasdrich P., Sim S.M.: SKINNY-AEAD and SKINNY-Hash v1.1. In: Submission to Round 2 of the NIST Lightweight Cryptography Standardization process (2020).","DOI":"10.46586\/tosc.v2020.iS1.88-131"},{"key":"970_CR16","doi-asserted-by":"publisher","unstructured":"Benadjila R., Guo J., Lomn\u00e9 V., Peyrin T.: Implementing lightweight block ciphers on x86 architectures. In: Selected Areas in Cryptography\u2014SAC 2013\u201420th International Conference, Burnaby, BC, Canada, 14\u201316 August 2013, Revised Selected Papers, pp. 324\u2013351 (2013). https:\/\/doi.org\/10.1007\/978-3-662-43414-7_17.","DOI":"10.1007\/978-3-662-43414-7_17"},{"key":"970_CR17","doi-asserted-by":"publisher","unstructured":"Berger T.P., Francq J., Minier M.: CUBE cipher: a family of quasi-involutive block ciphers easy to mask. In: Codes, Cryptology, and Information Security\u2014First International Conference, C2SI 2015, Rabat, Morocco, 26\u201328 May 2015, Proceedings\u2014In Honor of Thierry Berger, pp. 89\u2013105 (2015). https:\/\/doi.org\/10.1007\/978-3-319-18681-8_8.","DOI":"10.1007\/978-3-319-18681-8_8"},{"key":"970_CR18","doi-asserted-by":"crossref","unstructured":"Bertoni G., Daemen J., Peeters M., Van\u00a0Assche G.: Keccak. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 313\u2013314. Springer, New York (2013)","DOI":"10.1007\/978-3-642-38348-9_19"},{"issue":"4","key":"970_CR19","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/BF00203965","volume":"7","author":"E Biham","year":"1994","unstructured":"Biham E.: New types of cryptanalytic attacks using related keys. J. Cryptol. 7(4), 229\u2013246 (1994). https:\/\/doi.org\/10.1007\/BF00203965.","journal-title":"J. Cryptol."},{"issue":"1","key":"970_CR20","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E Biham","year":"1991","unstructured":"Biham E., Shamir A.: Differential cryptanalysis of des-like cryptosystems. J. Cryptol. 4(1), 3\u201372 (1991). https:\/\/doi.org\/10.1007\/BF00630563.","journal-title":"J. Cryptol."},{"key":"970_CR21","doi-asserted-by":"publisher","unstructured":"Biham E., Biryukov A., Shamir A.: Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. In: Advances in Cryptology\u2014EUROCRYPT \u201999, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, 2\u20136 May 1999, Proceeding, pp. 12\u201323 (1999). https:\/\/doi.org\/10.1007\/3-540-48910-X_2.","DOI":"10.1007\/3-540-48910-X_2"},{"issue":"3","key":"970_CR22","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/s10623-012-9697-z","volume":"70","author":"A Bogdanov","year":"2014","unstructured":"Bogdanov A., Rijmen V.: Linear hulls with correlation zero and linear cryptanalysis of block ciphers. Des. Codes Cryptogr. 70(3), 369\u2013383 (2014). https:\/\/doi.org\/10.1007\/s10623-012-9697-z.","journal-title":"Des. Codes Cryptogr."},{"key":"970_CR23","doi-asserted-by":"publisher","unstructured":"Bogdanov A., Knudsen L.R., Leander G., Paar C., Poschmann A., Robshaw M.J.B., Seurin Y., Vikkelsoe C.: PRESENT: an ultra-lightweight block cipher. In: Cryptographic Hardware and Embedded Systems\u2014CHES 2007, 9th International Workshop, Vienna, Austria, 10\u201313 September 2007, Proceedings, pp. 450\u2013466 (2007). https:\/\/doi.org\/10.1007\/978-3-540-74735-2_31.","DOI":"10.1007\/978-3-540-74735-2_31"},{"key":"970_CR24","doi-asserted-by":"publisher","unstructured":"Borghoff J., Canteaut A., G\u00fcneysu T., Kavun E.B., Knezevic M., Knudsen L.R., Leander G., Nikov V., Paar C., Rechberger C., Rombouts P., Thomsen S.S., Yal\u00e7in T.: PRINCE\u2014A low-latency block cipher for pervasive computing applications - extended abstract. In: Advances in Cryptology\u2014ASIACRYPT 2012\u201418th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, 2\u20136 December 2012, Proceedings. pp. 208\u2013225 (2012). https:\/\/doi.org\/10.1007\/978-3-642-34961-4_14.","DOI":"10.1007\/978-3-642-34961-4_14"},{"key":"970_CR25","unstructured":"Chakraborti A., Datta N., Jha A., Lopez C.M., Nandi M., Sasaki Y.: LOTUS-AEAD\/LOCUS-AEAD. In: Submission to Round 2 of the NIST Lightweight Cryptography Standardization Process (2020)."},{"key":"970_CR26","unstructured":"Chakraborti A., Datta N., Jha A., Nandi M.: HYENA. In: Submission to Round 2 of the NIST Lightweight Cryptography Standardization Process (2020)."},{"key":"970_CR27","doi-asserted-by":"publisher","unstructured":"Chen H., Wang X.: Improved linear hull attack on round-reduced simon with dynamic key-guessing techniques. In: Fast Software Encryption\u201423rd International Conference, FSE 2016, Bochum, Germany, 20\u201323 March 2016, Revised Selected Papers, pp. 428\u2013449 (2016). https:\/\/doi.org\/10.1007\/978-3-662-52993-5_22.","DOI":"10.1007\/978-3-662-52993-5_22"},{"issue":"6","key":"970_CR28","first-page":"748","volume":"6","author":"S Chen","year":"2019","unstructured":"Chen S., Fan Y., Fu Y., Huang L., Wang M.: On the design of ANT family block ciphers. J. Cryptol. Res. 6(6), 748\u2013759 (2019).","journal-title":"J. Cryptol. Res."},{"key":"970_CR29","unstructured":"Cui T., Jia K., Fu K., Chen S., Wang M.: New automatic search tool for impossible differentials and zero-correlation linear approximations. IACR Cryptology ePrint Archive 2016, 689 (2016). http:\/\/eprint.iacr.org\/2016\/689."},{"key":"970_CR30","doi-asserted-by":"publisher","unstructured":"Daemen J., Rijmen V.: The Design of Rijndael: AES\u2014The Advanced Encryption Standard. Information Security and Cryptography, Springer, Berlin (2002). https:\/\/doi.org\/10.1007\/978-3-662-04722-4.","DOI":"10.1007\/978-3-662-04722-4"},{"key":"970_CR31","unstructured":"Daemen J., Peeters M., Van\u00a0Assche G., Rijmen V.: Nessie proposal: NOEKEON. In: First Open NESSIE Workshop, pp. 213\u2013230 (2000)."},{"issue":"6","key":"970_CR32","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/C-M.1977.217750","volume":"10","author":"W Diffie","year":"1977","unstructured":"Diffie W., Hellman M.E.: Special feature exhaustive cryptanalysis of the NBS data encryption standard. IEEE Comput. 10(6), 74\u201384 (1977). https:\/\/doi.org\/10.1109\/C-M.1977.217750.","journal-title":"IEEE Comput."},{"key":"970_CR33","doi-asserted-by":"publisher","unstructured":"Dinu D., Perrin L., Udovenko A., Velichkov V., Gro\u00dfsch\u00e4dl J., Biryukov A.: Design strategies for ARX with provable bounds: Sparx and LAX. In: Advances in Cryptology\u2014ASIACRYPT 2016\u201422nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, 4\u20138 December 2016, Proceedings, Part I, pp. 484\u2013513 (2016). https:\/\/doi.org\/10.1007\/978-3-662-53887-6_18.","DOI":"10.1007\/978-3-662-53887-6_18"},{"key":"970_CR34","unstructured":"Dobraunig C., Eichlseder M., Mendel F., Schl\u00e4ffer M.: Ascon. Submission to the Caesar Competition. Institute for Applied Information Processing and Communications, Graz University of Technology, Graz (2014)."},{"key":"970_CR35","doi-asserted-by":"publisher","unstructured":"ElSheikh M., Youssef A.M.: Related-key differential cryptanalysis of full round CRAFT. In: Security, Privacy, and Applied Cryptography Engineering\u20149th International Conference, SPACE 2019, Gandhinagar, India, 3\u20137 December 2019, Proceedings, pp. 50\u201366 (2019). https:\/\/doi.org\/10.1007\/978-3-030-35869-3_6.","DOI":"10.1007\/978-3-030-35869-3_6"},{"key":"970_CR36","doi-asserted-by":"publisher","unstructured":"Guo J., Peyrin T., Poschmann A., Robshaw M.J.B.: The LED block cipher. In: Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, 28 September\u20131 October 2011, Proceedings, pp. 326\u2013341 (2011). https:\/\/doi.org\/10.1007\/978-3-642-23951-9_22.","DOI":"10.1007\/978-3-642-23951-9_22"},{"issue":"3","key":"970_CR37","doi-asserted-by":"publisher","first-page":"119","DOI":"10.13154\/tosc.v2020.i3.119-151","volume":"2020","author":"H Guo","year":"2020","unstructured":"Guo H., Sun S., Shi D., Sun L., Sun Y., Hu L., Wang M.: Differential attacks on CRAFT exploiting the involutory s-boxes and tweak additions. IACR Trans. Symmetric Cryptol. 2020(3), 119\u2013151 (2020). https:\/\/doi.org\/10.13154\/tosc.v2020.i3.119-151.","journal-title":"IACR Trans. Symmetric Cryptol."},{"issue":"4","key":"970_CR38","doi-asserted-by":"publisher","first-page":"290","DOI":"10.13154\/tosc.v2019.i4.290-317","volume":"2019","author":"H Hadipour","year":"2019","unstructured":"Hadipour H., Sadeghi S., Niknam M.M., Song L., Bagheri N.: Comprehensive security analysis of CRAFT. IACR Trans. Symmetric Cryptol. 2019(4), 290\u2013317 (2019). https:\/\/doi.org\/10.13154\/tosc.v2019.i4.290-317.","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"970_CR39","unstructured":"Iwata T., Khairallah M., Minematsu K., Peyrin T.: Remus v1.0. In: Submission to Round 1 of the NIST Lightweight Cryptography Standardization Process (2019)."},{"key":"970_CR40","unstructured":"Iwata T., Khairallah M., Minematsu K., Peyrin T., Sasaki Y., Sim S.M., Sun L.: Thank Goodness Its Friday (TGIF). In: Submission to Round 1 of the NIST Lightweight Cryptography Standardization Process (2019)."},{"key":"970_CR41","unstructured":"Iwata T., Khairallah M., Minematsu K., Peyrin T.: Romulus v1.2. In: Finalists of the NIST Lightweight Cryptography Standardization Process (2021)."},{"issue":"4","key":"970_CR42","doi-asserted-by":"publisher","first-page":"130","DOI":"10.13154\/tosc.v2017.i4.130-168","volume":"2017","author":"J Jean","year":"2017","unstructured":"Jean J., Peyrin T., Sim S.M., Tourteaux J.: Optimizing implementations of lightweight building blocks. IACR Trans. Symmetric Cryptol. 2017(4), 130\u2013168 (2017). https:\/\/doi.org\/10.13154\/tosc.v2017.i4.130-168.","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"970_CR43","doi-asserted-by":"publisher","unstructured":"Khovratovich D., Nikolic I., Pieprzyk J., Sokolowski P., Steinfeld R.: Rotational cryptanalysis of ARX revisited. In: Fast Software Encryption\u201422nd International Workshop, FSE 2015, Istanbul, Turkey, 8\u201311 March 2015, Revised Selected Papers, pp. 519\u2013536 (2015). https:\/\/doi.org\/10.1007\/978-3-662-48116-5_25.","DOI":"10.1007\/978-3-662-48116-5_25"},{"key":"970_CR44","doi-asserted-by":"publisher","unstructured":"Knudsen L.R.: Cryptanalysis of LOKI. In: Advances in Cryptology\u2014ASIACRYPT \u201991, International Conference on the Theory and Applications of Cryptology, Fujiyoshida, Japan, 11\u201314 November 1991, Proceedings, pp. 22\u201335 (1991). https:\/\/doi.org\/10.1007\/3-540-57332-1_2.","DOI":"10.1007\/3-540-57332-1_2"},{"key":"970_CR45","unstructured":"Knudsen L.R.: Deal\u2014a 128-bit block cipher. In: NIST AES Proposal (1998)."},{"key":"970_CR46","doi-asserted-by":"publisher","unstructured":"Knudsen L.R., Wagner D.A.: Integral cryptanalysis. In: Fast Software Encryption, 9th International Workshop, FSE 2002, Leuven, Belgium, 4\u20136 February 2002, Revised Papers, pp. 112\u2013127 (2002). https:\/\/doi.org\/10.1007\/3-540-45661-9_9.","DOI":"10.1007\/3-540-45661-9_9"},{"key":"970_CR47","doi-asserted-by":"publisher","unstructured":"K\u00f6lbl S., Leander G., Tiessen T.: Observations on the SIMON block cipher family. In: Advances in Cryptology\u2014CRYPTO 2015\u201435th Annual Cryptology Conference, Santa Barbara, CA, USA, 16\u201320 August 2015, Proceedings, Part I, pp. 161\u2013185 (2015). https:\/\/doi.org\/10.1007\/978-3-662-47989-6_8.","DOI":"10.1007\/978-3-662-47989-6_8"},{"key":"970_CR48","unstructured":"Leurent G., Pernot C., Schrottenloher A.: Clustering effect in Simon and Simeck. Cryptology ePrint Archive, Report 2021\/1198 (2021). https:\/\/ia.cr\/2021\/1198."},{"issue":"1","key":"970_CR49","doi-asserted-by":"publisher","first-page":"358","DOI":"10.13154\/tosc.v2017.i1.358-379","volume":"2017","author":"Z Liu","year":"2017","unstructured":"Liu Z., Li Y., Wang M.: Optimal differential trails in Simon-like ciphers. IACR Trans. Symmetric Cryptol. 2017(1), 358\u2013379 (2017). https:\/\/doi.org\/10.13154\/tosc.v2017.i1.358-379.","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"970_CR50","unstructured":"Liu Z., Li Y., Wang M.: The security of simon-like ciphers against linear cryptanalysis. IACR Cryptology ePrint Archive 2017, 576 (2017). http:\/\/eprint.iacr.org\/2017\/576."},{"key":"970_CR51","unstructured":"Liu Z., Li Y., Wang M.: The security of simon-like ciphers against linear cryptanalysis. Cryptology ePrint Archive, Report 2017\/576 (2017). https:\/\/eprint.iacr.org\/2017\/576."},{"key":"970_CR52","unstructured":"Louis W.: Software for SUPERCOP benchmarking of SIMON and SPECK. https:\/\/github.com\/lrwinge\/simon_speck_supercop."},{"key":"970_CR53","doi-asserted-by":"publisher","unstructured":"Lu J., Liu Y., Ashur T., Sun B., Li C.: Rotational-XOR cryptanalysis of simon-like block ciphers. In: Information Security and Privacy\u201425th Australasian Conference, ACISP 2020, Perth, WA, Australia, 30 November\u20132 December 2020, Proceedings, pp. 105\u2013124 (2020). https:\/\/doi.org\/10.1007\/978-3-030-55304-3_6.","DOI":"10.1007\/978-3-030-55304-3_6"},{"key":"970_CR54","doi-asserted-by":"publisher","unstructured":"Matsui M.: Linear cryptanalysis method for DES cipher. In: Advances in Cryptology\u2014ROCRYPT \u201993, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, 23\u201327 May 1993, Proceedings, pp. 386\u2013397 (1993). https:\/\/doi.org\/10.1007\/3-540-48285-7_33.","DOI":"10.1007\/3-540-48285-7_33"},{"key":"970_CR55","doi-asserted-by":"publisher","unstructured":"Mouha N., Wang Q., Gu D., Preneel B.: Differential and linear cryptanalysis using mixed-integer linear programming. In: Information Security and Cryptology\u20147th International Conference, Inscrypt 2011, Beijing, China, 30 November\u20133 December 2011. Revised Selected Papers, pp. 57\u201376 (2011). https:\/\/doi.org\/10.1007\/978-3-642-34704-7_5.","DOI":"10.1007\/978-3-642-34704-7_5"},{"key":"970_CR56","doi-asserted-by":"publisher","unstructured":"Nikova S., Rechberger C., Rijmen V.: Threshold implementations against side-channel attacks and glitches. In: Ning, P., Qing, S., Li, N. (eds.) Information and Communications Security, 8th International Conference, ICICS 2006, Raleigh, NC, USA, 4\u20137 December 2006, Proceedings. Lecture Notes in Computer Science, vol. 4307, pp. 529\u2013545. Springer, Berlin (2006). https:\/\/doi.org\/10.1007\/11935308_38.","DOI":"10.1007\/11935308_38"},{"issue":"2","key":"970_CR57","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1007\/s00145-010-9085-7","volume":"24","author":"S Nikova","year":"2011","unstructured":"Nikova S., Rijmen V., Schl\u00e4ffer M.: Secure hardware implementation of nonlinear functions in the presence of glitches. J. Cryptol. 24(2), 292\u2013321 (2011). https:\/\/doi.org\/10.1007\/s00145-010-9085-7.","journal-title":"J. Cryptol."},{"key":"970_CR58","doi-asserted-by":"publisher","unstructured":"Piret G., Roche T., Carlet C.: PICARO\u2014A block cipher allowing efficient higher-order side-channel resistance. In: Applied Cryptography and Network Security\u201410th International Conference, ACNS 2012, Singapore, 26\u201329 June 2012, Proceedings, pp. 311\u2013328 (2012). https:\/\/doi.org\/10.1007\/978-3-642-31284-7_19.","DOI":"10.1007\/978-3-642-31284-7_19"},{"key":"970_CR59","doi-asserted-by":"publisher","unstructured":"Sakamoto K., Minematsu K., Shibata N., Shigeri M., Kubo H., Funabiki Y., Bogdanov A., Morioka S., Isobe T.: Tweakable TWINE: building a tweakable block cipher on generalized feistel structure. In: Advances in Information and Computer Security - 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, 28\u201330 August 2019, Proceedings, pp. 129\u2013145 (2019). https:\/\/doi.org\/10.1007\/978-3-030-26834-3_8.","DOI":"10.1007\/978-3-030-26834-3_8"},{"key":"970_CR60","doi-asserted-by":"crossref","unstructured":"Sasaki Y.: Related-key boomerang attacks on full ANU lightweight block cipher. In: International Conference on Applied Cryptography and Network Security, pp. 421\u2013439. Springer, Cham (2018).","DOI":"10.1007\/978-3-319-93387-0_22"},{"key":"970_CR61","doi-asserted-by":"publisher","unstructured":"Sasaki Y., Todo Y.: New impossible differential search tool from design and cryptanalysis aspects - revealing structural properties of several ciphers. In: Advances in Cryptology\u2014EUROCRYPT 2017\u201436th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, 30 April\u20134 May 2017, Proceedings, Part III, pp. 185\u2013215 (2017). https:\/\/doi.org\/10.1007\/978-3-319-56617-7_7.","DOI":"10.1007\/978-3-319-56617-7_7"},{"issue":"1","key":"970_CR62","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/s00145-007-9013-7","volume":"21","author":"AA Sel\u00e7uk","year":"2008","unstructured":"Sel\u00e7uk A.A.: On probability of success in linear and differential cryptanalysis. J. Cryptol. 21(1), 131\u2013147 (2008). https:\/\/doi.org\/10.1007\/s00145-007-9013-7.","journal-title":"J. Cryptol."},{"key":"970_CR63","doi-asserted-by":"publisher","unstructured":"Shibutani K., Isobe T., Hiwatari H., Mitsuda A., Akishita T., Shirai T.: Piccolo: An ultra-lightweight blockcipher. In: Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, 28 September\u20131 October 2011, Proceedings, pp. 342\u2013357 (2011). https:\/\/doi.org\/10.1007\/978-3-642-23951-9_23.","DOI":"10.1007\/978-3-642-23951-9_23"},{"key":"970_CR64","doi-asserted-by":"publisher","unstructured":"Shirai T., Shibutani K., Akishita T., Moriai S., Iwata T.: The 128-bit blockcipher CLEFIA (extended abstract). In: Fast Software Encryption, 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, 26\u201328 March 2007, Revised Selected Papers, pp. 181\u2013195 (2007). https:\/\/doi.org\/10.1007\/978-3-540-74619-5_12.","DOI":"10.1007\/978-3-540-74619-5_12"},{"key":"970_CR65","doi-asserted-by":"publisher","unstructured":"Soos M., Nohl K., Castelluccia C.: Extending SAT solvers to cryptographic problems. In: Theory and Applications of Satisfiability Testing - SAT 2009, 12th International Conference, SAT 2009, Swansea, UK, 30 June\u20133 July 2009, Proceedings, pp. 244\u2013257 (2009). https:\/\/doi.org\/10.1007\/978-3-642-02777-2_24.","DOI":"10.1007\/978-3-642-02777-2_24"},{"key":"970_CR66","unstructured":"Stefan K.: CryptoSMT: An easy to use tool for cryptanalysis of symmetric primitives. https:\/\/github.com\/kste\/cryptosmt."},{"key":"970_CR67","doi-asserted-by":"publisher","unstructured":"Sun S., Hu L., Wang P., Qiao K., Ma X., Song L.: Automatic security evaluation and (related-key) differential characteristic search: application to simon, present, lblock, DES(L) and other bit-oriented block ciphers. In: Advances in Cryptology\u2014ASIACRYPT 2014\u201420th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., 7\u201311 December 2014, Proceedings, Part I, pp. 158\u2013178 (2014). https:\/\/doi.org\/10.1007\/978-3-662-45611-8_9.","DOI":"10.1007\/978-3-662-45611-8_9"},{"key":"970_CR68","doi-asserted-by":"publisher","unstructured":"Suzaki T., Minematsu K., Morioka S., Kobayashi E.: TWINE: a lightweight block cipher for multiple platforms. In: Selected Areas in Cryptography, 19th International Conference, SAC 2012, Windsor, ON, Canada, 15\u201316 August 2012, Revised Selected Papers, pp. 339\u2013354 (2012). https:\/\/doi.org\/10.1007\/978-3-642-35999-6_22.","DOI":"10.1007\/978-3-642-35999-6_22"},{"key":"970_CR69","doi-asserted-by":"publisher","unstructured":"Todo Y.: Structural evaluation by generalized integral property. In: Advances in Cryptology\u2014EUROCRYPT 2015\u201434th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, 26\u201330 April 2015, Proceedings, Part I, pp. 287\u2013314 (2015). https:\/\/doi.org\/10.1007\/978-3-662-46800-5_12.","DOI":"10.1007\/978-3-662-46800-5_12"},{"key":"970_CR70","doi-asserted-by":"publisher","unstructured":"Todo Y., Morii M.: Bit-based division property and application to simon family. In: Fast Software Encryption - 23rd International Conference, FSE 2016, Bochum, Germany, 20\u201323 March 2016, Revised Selected Papers, pp. 357\u2013377 (2016). https:\/\/doi.org\/10.1007\/978-3-662-52993-5_18.","DOI":"10.1007\/978-3-662-52993-5_18"},{"issue":"9","key":"970_CR71","doi-asserted-by":"publisher","first-page":"098103:1","DOI":"10.1007\/s11432-017-9231-5","volume":"61","author":"N Wang","year":"2018","unstructured":"Wang N., Wang X., Jia K., Zhao J.: Differential attacks on reduced SIMON versions with dynamic key-guessing techniques. Sci. China Inf. Sci. 61(9), 098103:1-098103:3 (2018). https:\/\/doi.org\/10.1007\/s11432-017-9231-5.","journal-title":"Sci. China Inf. Sci."},{"key":"970_CR72","doi-asserted-by":"publisher","unstructured":"Wu W., Zhang L.: Lblock: A lightweight block cipher. In: Applied Cryptography and Network Security\u20149th International Conference, ACNS 2011, Nerja, Spain, 7\u201310 June 2011, Proceeding,. pp. 327\u2013344 (2011). https:\/\/doi.org\/10.1007\/978-3-642-21554-4_19.","DOI":"10.1007\/978-3-642-21554-4_19"},{"key":"970_CR73","doi-asserted-by":"publisher","unstructured":"Xiang Z., Zhang W., Bao Z., Lin D.: Applying MILP method to searching integral distinguishers based on division property for 6 lightweight block ciphers. In: Advances in Cryptology\u2014ASIACRYPT 2016\u201422nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, 4\u20138 December 2016, Proceedings, Part I, pp. 648\u2013678 (2016). https:\/\/doi.org\/10.1007\/978-3-662-53887-6_24.","DOI":"10.1007\/978-3-662-53887-6_24"},{"key":"970_CR74","doi-asserted-by":"publisher","unstructured":"Yang G., Zhu B., Suder V., Aagaard M.D., Gong G.: The simeck family of lightweight block ciphers. In: Cryptographic Hardware and Embedded Systems\u2014CHES 2015\u201417th International Workshop, Saint-Malo, France, 13\u201316 September 2015, Proceedings, pp. 307\u2013329 (2015). https:\/\/doi.org\/10.1007\/978-3-662-48324-4_16.","DOI":"10.1007\/978-3-662-48324-4_16"},{"issue":"12","key":"970_CR75","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11432-015-5459-7","volume":"58","author":"W Zhang","year":"2015","unstructured":"Zhang W., Bao Z., Lin D., Rijmen V., Yang B., Verbauwhede I.: RECTANGLE: a bit-slice lightweight block cipher suitable for multiple platforms. Sci. China Inf. Sci. 58(12), 1\u201315 (2015). https:\/\/doi.org\/10.1007\/s11432-015-5459-7.","journal-title":"Sci. China Inf. Sci."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-021-00970-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10623-021-00970-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-021-00970-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,6]],"date-time":"2022-01-06T07:20:11Z","timestamp":1641453611000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10623-021-00970-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,19]]},"references-count":75,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1]]}},"alternative-id":["970"],"URL":"https:\/\/doi.org\/10.1007\/s10623-021-00970-9","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,11,19]]},"assertion":[{"value":"30 November 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 September 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 October 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 November 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}