{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T23:19:30Z","timestamp":1773962370067,"version":"3.50.1"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2022,1,24]],"date-time":"2022-01-24T00:00:00Z","timestamp":1642982400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,24]],"date-time":"2022-01-24T00:00:00Z","timestamp":1642982400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"tubitak","award":["121E228"],"award-info":[{"award-number":["121E228"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2022,2]]},"DOI":"10.1007\/s10623-021-00989-y","type":"journal-article","created":{"date-parts":[[2022,1,24]],"date-time":"2022-01-24T00:05:01Z","timestamp":1642982701000},"page":"443-472","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Integral characteristics by keyspace partitioning"],"prefix":"10.1007","volume":"90","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2733-7669","authenticated-orcid":false,"given":"Fatih","family":"Demirba\u015f","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9685-6625","authenticated-orcid":false,"given":"Orhun","family":"Kara","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,24]]},"reference":[{"key":"989_CR1","doi-asserted-by":"crossref","unstructured":"Ankele R., K\u00f6lbl S.: Mind the gap-a closer look at the security of block ciphers against differential cryptanalysis. In: International Conference on Selected Areas in Cryptography, pp. 163\u2013190. Springer (2018)","DOI":"10.1007\/978-3-030-10970-7_8"},{"key":"989_CR2","doi-asserted-by":"crossref","unstructured":"Banik S., Bogdanov A., Isobe T., Shibutani K., Hiwatari H., Akishita T., Regazzoni F.: Midori: A block cipher for low energy. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 411\u2013436. Springer (2015)","DOI":"10.1007\/978-3-662-48800-3_17"},{"key":"989_CR3","unstructured":"Barreto P., Rijmen V.: The Khazad legacy-level block cipher. Primitive submitted to NESSIE 97, 106 (2000)"},{"key":"989_CR4","first-page":"61","volume":"1","author":"P Barreto","year":"2007","unstructured":"Barreto P., Simplicio M.: CURUPIRA, a block cipher for constrained platforms. Anais do 25o Simpsio Brasileiro de Redes de Computadores e Sistemas Distribudos-SBRC 1, 61\u201374 (2007).","journal-title":"Anais do 25o Simpsio Brasileiro de Redes de Computadores e Sistemas Distribudos-SBRC"},{"key":"989_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s00145-020-09344-1","volume":"33","author":"T Beyne","year":"2020","unstructured":"Beyne T.: Block cipher invariants as eigenvectors of correlation matrices. J. Cryptol. 33, 1\u201328 (2020).","journal-title":"J. Cryptol."},{"issue":"1","key":"989_CR6","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E Biham","year":"1991","unstructured":"Biham E., Shamir A.: Differential cryptanalysis of DES-like cryptosystems. J. Cryptol. 4(1), 3\u201372 (1991).","journal-title":"J. Cryptol."},{"issue":"4","key":"989_CR7","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1007\/s00145-010-9062-1","volume":"23","author":"A Biryukov","year":"2010","unstructured":"Biryukov A., Shamir A.: Structural cryptanalysis of SASAS. J. Cryptol. 23(4), 505\u2013518 (2010).","journal-title":"J. Cryptol."},{"key":"989_CR8","doi-asserted-by":"crossref","unstructured":"Chen Z., Wang X.: Impossible differential cryptanalysis of Midori. In: Mechatronics and Automation Engineering: Proceedings of the International Conference on Mechatronics and Automation Engineering (ICMAE2016), pp. 221\u2013229. World Scientific (2017)","DOI":"10.1142\/9789813208537_0028"},{"key":"989_CR9","unstructured":"Daemen J., Rijmen V.: Aes proposal: Rijndael (1999)"},{"key":"989_CR10","doi-asserted-by":"crossref","unstructured":"Daemen J., Knudsen L., Rijmen V.: The block cipher SQUARE. In: International Workshop on Fast Software Encryption, pp. 149\u2013165. Springer (1997)","DOI":"10.1007\/BFb0052343"},{"issue":"4","key":"989_CR11","doi-asserted-by":"publisher","first-page":"173","DOI":"10.46586\/tosc.v2020.i4.173-194","volume":"2020","author":"P Derbez","year":"2020","unstructured":"Derbez P., Fouque P.A.: Increasing precision of division property. IACR Trans. Symmetric Cryptol. 2020(4), 173\u2013194 (2020).","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"989_CR12","doi-asserted-by":"crossref","unstructured":"Eskandari Z., Kidmose A.B., K\u00f6lbl S., Tiessen T.: Finding integral distinguishers with ease. In: International Conference on Selected Areas in Cryptography, pp. 115\u2013138. Springer (2018)","DOI":"10.1007\/978-3-030-10970-7_6"},{"key":"989_CR13","doi-asserted-by":"crossref","unstructured":"Ferguson N., Kelsey J., Lucks S., Schneier B., Stay M., Wagner D., Whiting D.: Improved cryptanalysis of Rijndael. In: International Workshop on Fast Software Encryption, pp. 213\u2013230. Springer (2000)","DOI":"10.1007\/3-540-44706-7_15"},{"key":"989_CR14","doi-asserted-by":"publisher","first-page":"33","DOI":"10.46586\/tosc.v2016.i1.33-56","volume":"2016","author":"J Guo","year":"2016","unstructured":"Guo J., Jean J., Nikolic I., Qiao K., Sasaki Y., Sim S.M.: Invariant subspace attack against Midori64 and the resistance criteria for S-box designs. IACR Trans. Symmetric Cryptol. 2016, 33\u201356 (2016).","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"989_CR15","doi-asserted-by":"crossref","unstructured":"Heys H.: Integral cryptanalysis of the BSPN block cipher. In: 2014 27th Biennial Symposium on Communications (QBSC), pp. 153\u2013158. IEEE (2014)","DOI":"10.1109\/QBSC.2014.6841204"},{"key":"989_CR16","unstructured":"Keliher L.: Differential cryptanalysis of the BSPN block cipher structure (2015)"},{"key":"989_CR17","doi-asserted-by":"crossref","unstructured":"Knudsen L., Wagner D.: Integral cryptanalysis. In: International Workshop on Fast Software Encryption, pp. 112\u2013127. Springer (2002)","DOI":"10.1007\/3-540-45661-9_9"},{"key":"989_CR18","doi-asserted-by":"publisher","unstructured":"Leander G., Abdelraheem M.A., AlKhzaimi H., Zenner E.: A cryptanalysis of PRINTcipher: The invariant subspace attack. In: P.\u00a0Rogaway (ed.) Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14\u201318, 2011. Proceedings, Lecture Notes in Computer Science, vol. 6841, pp. 206\u2013221. Springer (2011). https:\/\/doi.org\/10.1007\/978-3-642-22792-9_12","DOI":"10.1007\/978-3-642-22792-9_12"},{"key":"989_CR19","doi-asserted-by":"crossref","unstructured":"Li Y., Wang M., Ou H., Wang S.: Improved integral analysis on lightweight block cipher Midori. In: 2019 IEEE 5th International Conference on Computer and Communications (ICCC), pp. 1494\u20131498. IEEE (2019)","DOI":"10.1109\/ICCC47050.2019.9064222"},{"key":"989_CR20","doi-asserted-by":"publisher","first-page":"215","DOI":"10.46586\/tosc.v2017.i1.215-239","volume":"2017","author":"L Lin","year":"2017","unstructured":"Lin L., Wu W.: Meet-in-the-middle attacks on reduced-round Midori64. IACR Trans. Symmetric Cryptol. 2017, 215\u2013239 (2017).","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"989_CR21","doi-asserted-by":"crossref","unstructured":"Matsui M.: Linear cryptanalysis method for DES cipher. In: Workshop on the Theory and Application of of Cryptographic Techniques, pp. 386\u2013397. Springer (1993)","DOI":"10.1007\/3-540-48285-7_33"},{"issue":"12","key":"989_CR22","doi-asserted-by":"publisher","first-page":"1813","DOI":"10.1093\/comjnl\/bxaa004","volume":"63","author":"AE Moghaddam","year":"2020","unstructured":"Moghaddam A.E., Ahmadian Z.: New automatic search method for truncated-differential characteristics application to Midori. SKINNY CRAFT. Comput. J. 63(12), 1813\u20131825 (2020). https:\/\/doi.org\/10.1093\/comjnl\/bxaa004.","journal-title":"SKINNY CRAFT. Comput. J."},{"issue":"441","key":"989_CR23","first-page":"0311","volume":"197","author":"NF Pub","year":"2001","unstructured":"Pub N.F.: 197: Advanced encryption standard (AES). Federal information processing standards publication 197(441), 0311 (2001).","journal-title":"Federal information processing standards publication"},{"key":"989_CR24","doi-asserted-by":"crossref","unstructured":"Sasaki Y., Wang L.: Comprehensive study of integral analysis on 22-round LBlock. In: International Conference on Information Security and Cryptology, pp. 156\u2013169. Springer (2012)","DOI":"10.1007\/978-3-642-37682-5_12"},{"key":"989_CR25","doi-asserted-by":"crossref","unstructured":"Sasaki Y., Wang L.: Meet-in-the-middle technique for integral attacks against Feistel ciphers. In: International Conference on Selected Areas in Cryptography, pp. 234\u2013251. Springer (2012)","DOI":"10.1007\/978-3-642-35999-6_16"},{"issue":"1","key":"989_CR26","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1049\/iet-ifs.2018.5283","volume":"14","author":"L Sun","year":"2019","unstructured":"Sun L., Wang W., Wang M.Q.: MILP-aided bit-based division property for primitives with non-bit-permutation linear layers. IET Inf. Secur. 14(1), 12\u201320 (2019).","journal-title":"IET Inf. Secur."},{"key":"989_CR27","doi-asserted-by":"crossref","unstructured":"Takahashi Y., Igarashi Y., Kaneko T.: The 12th-order differential attack on the 10-round variants of Midori64 block cipher. In: 2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA), pp. 925\u2013930. IEEE (2017)","DOI":"10.1109\/AINA.2017.163"},{"key":"989_CR28","doi-asserted-by":"crossref","unstructured":"Todo Y.: Structural evaluation by generalized integral property. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 287\u2013314. Springer (2015)","DOI":"10.1007\/978-3-662-46800-5_12"},{"issue":"4","key":"989_CR29","doi-asserted-by":"publisher","first-page":"1383","DOI":"10.1007\/s00145-018-9285-0","volume":"32","author":"Y Todo","year":"2019","unstructured":"Todo Y., Leander G., Sasaki Y.: Nonlinear invariant attack: Practical attack on full SCREAM, iSCREAM, and Midori64. J. Cryptol. 32(4), 1383\u20131422 (2019).","journal-title":"J. Cryptol."},{"key":"989_CR30","unstructured":"Youssef A., Tavares S., Heys H.: A new class of substitution-permutation networks. In: Workshop on Selected Areas in Cryptography, SAC, vol.\u00a096, pp. 132\u2013147 (1996)"},{"key":"989_CR31","doi-asserted-by":"crossref","unstructured":"Z\u2019aba M.R., Raddum H., Henricksen M., Dawson E.: Bit-pattern based integral attack. In: International Workshop on Fast Software Encryption, pp. 363\u2013381. Springer (2008)","DOI":"10.1007\/978-3-540-71039-4_23"},{"issue":"2","key":"989_CR32","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1049\/iet-ifs.2018.5151","volume":"13","author":"W Zhang","year":"2018","unstructured":"Zhang W., Rijmen V.: Division cryptanalysis of block ciphers with a binary diffusion layer. IET Inf. Secur. 13(2), 87\u201395 (2018).","journal-title":"IET Inf. Secur."},{"key":"989_CR33","doi-asserted-by":"crossref","unstructured":"Zhang X., Heys H.M., Li C.: Energy efficiency of symmetric key cryptographic algorithms in wireless sensor networks. In: 2010 25th Biennial symposium on communications, pp. 168\u2013172. IEEE (2010)","DOI":"10.1109\/BSC.2010.5472979"},{"key":"989_CR34","doi-asserted-by":"crossref","unstructured":"Zhang W., Su B., Wu W., Feng D., Wu C.: Extending higher-order integral: an efficient unified algorithm of constructing integral distinguishers for block ciphers. In: International Conference on Applied Cryptography and Network Security, pp. 117\u2013134. Springer (2012)","DOI":"10.1007\/978-3-642-31284-7_8"},{"issue":"7","key":"989_CR35","doi-asserted-by":"publisher","first-page":"789","DOI":"10.1002\/sec.375","volume":"5","author":"X Zhang","year":"2012","unstructured":"Zhang X., Heys H.M., Li C.: Energy efficiency of encryption schemes applied to wireless sensor networks. Secur. Commun. Netw. 5(7), 789\u2013808 (2012).","journal-title":"Secur. Commun. Netw."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-021-00989-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10623-021-00989-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-021-00989-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,24]],"date-time":"2022-02-24T18:26:36Z","timestamp":1645727196000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10623-021-00989-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,24]]},"references-count":35,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,2]]}},"alternative-id":["989"],"URL":"https:\/\/doi.org\/10.1007\/s10623-021-00989-y","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,24]]},"assertion":[{"value":"1 January 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 July 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 November 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 January 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}