{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T14:47:44Z","timestamp":1766587664085,"version":"3.40.4"},"reference-count":75,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2022,7,5]],"date-time":"2022-07-05T00:00:00Z","timestamp":1656979200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,7,5]],"date-time":"2022-07-05T00:00:00Z","timestamp":1656979200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100003968","name":"Iran National Science Foundation","doi-asserted-by":"publisher","award":["96\/53979","96\/53979"],"award-info":[{"award-number":["96\/53979","96\/53979"]}],"id":[{"id":"10.13039\/501100003968","id-type":"DOI","asserted-by":"publisher"}]},{"name":"The Research Foundation - Flanders"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2022,8]]},"DOI":"10.1007\/s10623-022-01074-8","type":"journal-article","created":{"date-parts":[[2022,7,5]],"date-time":"2022-07-05T17:17:06Z","timestamp":1657041426000},"page":"1797-1855","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis"],"prefix":"10.1007","volume":"90","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6614-9738","authenticated-orcid":false,"given":"Seyyed Arash","family":"Azimi","sequence":"first","affiliation":[]},{"given":"Adri\u00e1n","family":"Ranea","sequence":"additional","affiliation":[]},{"given":"Mahmoud","family":"Salmasizadeh","sequence":"additional","affiliation":[]},{"given":"Javad","family":"Mohajeri","sequence":"additional","affiliation":[]},{"given":"Mohammad Reza","family":"Aref","sequence":"additional","affiliation":[]},{"given":"Vincent","family":"Rijmen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,5]]},"reference":[{"key":"1074_CR1","first-page":"2008","volume":"92","author":"JP Aumasson","year":"2009","unstructured":"Aumasson J.P., Henzen L., Meier W., Phan R.C.W.: Sha-3 proposal blake. NIST (round 3) 92, 2008 (2009).","journal-title":"NIST (round 3)"},{"key":"1074_CR2","doi-asserted-by":"crossref","unstructured":"Aumasson J.P., Jovanovic P., Neves S.: Analysis of NORX: investigating differential and rotational properties. In: LATINCRYPT, volume 8895 of Lecture Notes in Computer Science. Springer, Cham (2014).","DOI":"10.1007\/978-3-319-16295-9_17"},{"key":"1074_CR3","doi-asserted-by":"crossref","unstructured":"Azimi S.A., Ranea A., Salmasizadeh M., Mohajeri J., Aref M.R., Rijmen V.: A bit-vector differential model for the modular addition by a constant. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 385\u2013414. Springer, Cham (2020).","DOI":"10.1007\/978-3-030-64837-4_13"},{"key":"1074_CR4","first-page":"948","volume":"2018","author":"E Bagherzadeh","year":"2018","unstructured":"Bagherzadeh E., Ahmadian Z.: Milp-based automatic differential searches for LEA and HIGHT. IACR Cryptol. 2018, 948 (2018).","journal-title":"IACR Cryptol."},{"key":"1074_CR5","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/978-3-319-10575-8_11","volume-title":"Handbook of Model Checking","author":"C Barrett","year":"2018","unstructured":"Barrett C., Tinelli C.: Satisfiability modulo theories. In: Clarke E.M., Henzinger T.A., Veith H., Bloem R. (eds.) Handbook of Model Checking, pp. 305\u2013343. Springer, Cham (2018)."},{"key":"1074_CR6","first-page":"404","volume":"2013","author":"R Beaulieu","year":"2013","unstructured":"Beaulieu R., Shors D., Smith J., Treatman-Clark S., Weeks B., Wingers L.: The SIMON and SPECK families of lightweight block ciphers. IACR Cryptol. 2013, 404 (2013).","journal-title":"IACR Cryptol."},{"key":"1074_CR7","series-title":"New stream cipher designs","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68351-3_8","volume-title":"The salsa20 family of stream ciphers","author":"DJ Bernstein","year":"2008","unstructured":"Bernstein D.J.: The salsa20 family of stream ciphers. New stream cipher designs. Springer, New York (2008)."},{"key":"1074_CR8","doi-asserted-by":"crossref","unstructured":"Biham E., Biryukov A., Shamir A.: Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. In: EUROCRYPT, volume 1592 of Lecture Notes in Computer Science. Springer (1999).","DOI":"10.1007\/3-540-48910-X_2"},{"key":"1074_CR9","doi-asserted-by":"crossref","unstructured":"Biham E., Dunkelman O., Keller N.: The rectangle attack-rectangling the serpent. In: Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, Advances in Cryptology - EUROCRYPT 2001, Innsbruck, Austria, May 6\u201310, 2001 (2001).","DOI":"10.1007\/3-540-44987-6_21"},{"issue":"1","key":"1074_CR10","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E Biham","year":"1991","unstructured":"Biham E., Shamir A.: Differential cryptanalysis of des-like cryptosystems. J. Cryptol. 4(1), 3\u201372 (1991).","journal-title":"J. Cryptol."},{"key":"1074_CR11","doi-asserted-by":"crossref","unstructured":"Biryukov A., Velichkov V.: Automatic search for differential trails in arx ciphers. In Cryptographers\u2019 Track at the RSA Conference. Springer, Cham (2014)","DOI":"10.1007\/978-3-319-04852-9_12"},{"key":"1074_CR12","doi-asserted-by":"crossref","unstructured":"Biryukov A., Lamberger M., Mendel F., Nikoli\u0107 I.: Second-order differential collisions for reduced sha-256. In: International Conference on the Theory and Application of Cryptology and Information Security. Springer (2011)","DOI":"10.1007\/978-3-642-25385-0_15"},{"key":"1074_CR13","doi-asserted-by":"crossref","unstructured":"Biryukov A., Velichkov V., Le\u00a0Corre Y.: Automatic search for the best trails in arx: application to block cipher speck. In: International Conference on Fast Software Encryption, pp. 289\u2013310. Springer (2016).","DOI":"10.1007\/978-3-662-52993-5_15"},{"issue":"2","key":"1074_CR14","first-page":"129103","volume":"64","author":"T Cui","year":"2021","unstructured":"Cui T., Chen S., Fu K., Wang M., Jia K.: New automatic tool for finding impossible differentials and zero-correlation linear approximations. Sci. China 64(2), 129103 (2021).","journal-title":"Sci. China"},{"key":"1074_CR15","unstructured":"Darbuka A.: Related-key attacks on block ciphers. Master\u2019s thesis. Master\u2019s thesis, Middle East Technical University (2009)."},{"key":"1074_CR16","doi-asserted-by":"crossref","unstructured":"Dinu D., Perrin L., Udovenko A., Velichkov V., Gro\u00dfsch\u00e4dl J., Biryukov A.: Design strategies for ARX with provable bounds: Sparx and LAX. In: ASIACRYPT (1), volume 10031 of Lecture Notes in Computer Science (2016).","DOI":"10.1007\/978-3-662-53887-6_18"},{"issue":"3","key":"1074_CR17","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/s13389-018-0193-x","volume":"9","author":"D Dinu","year":"2019","unstructured":"Dinu D., Corre Y.L., Khovratovich D., Perrin L., Gro\u00dfsch\u00e4dl J., Biryukov A.: Triathlon of lightweight block ciphers for the internet of things. J. Cryptogr. Eng. 9(3), 283\u2013302 (2019).","journal-title":"J. Cryptogr. Eng."},{"key":"1074_CR18","unstructured":"Dunkelman O., Keller N., Kim J.: Related-key rectangle attack on the full shacal-1. In: International Workshop on Selected Areas in Cryptography. Springer (2006)."},{"key":"1074_CR19","unstructured":"FIPS. Secure hash standard. Federal Information Processing Standards Publication 180-1. (1995)."},{"key":"1074_CR20","unstructured":"FIPS. Secure hash standard. Federal Information Processing Standards Publication 180-4 (2015)."},{"key":"1074_CR21","doi-asserted-by":"crossref","unstructured":"Fu K., Wang M., Guo Y., Sun S., Hu L.: Milp-based automatic search algorithms for differential and linear trails for speck. In: Fast Software Encryption\u201423rd International Conference, FSE 2016, Bochum, Germany, March 20\u201323, 2016 Revised Selected Papers (2016).","DOI":"10.1007\/978-3-662-52993-5_14"},{"key":"1074_CR22","unstructured":"Ganesh V., Dill D.L.: A decision procedure for bit-vectors and arrays. In: CAV, volume 4590 of Lecture Notes in Computer Science. Springer (2007)."},{"key":"1074_CR23","unstructured":"Gario M., Micheli A.: Pysmt: a solver-agnostic library for fast prototyping of smt-based algorithms. In: SMT Workshop 2015 (2015)."},{"key":"1074_CR24","unstructured":"Gartner. Gartner identifies top 10 strategic IoT technologies and trends. https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2018-11-07-gartner-identifies-top-10-strategic-iot-technologies-and-trends (2018)."},{"key":"1074_CR25","unstructured":"Gartner. Gartner survey reveals 47 percent of organizations will increase investments in IoT despite the impact of covid-19. https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2020-10-29-gartner-survey-reveals-47-percent-of-organizations-will-increase-investments-in-iot-despite-the-impact-of-covid-19- (2020)."},{"key":"1074_CR26","unstructured":"Hadarean L., Hyvarinen A., Niemetz A., Reger G.: 14th international satisfiability modulo theories competition (smt-comp 2019). https:\/\/smt-comp.github.io\/2019\/ (2019)."},{"key":"1074_CR27","doi-asserted-by":"crossref","unstructured":"Handschuh H., Knudsen L.R., Robshaw M.J.: Analysis of sha-1 in encryption mode. In: Track at the RSA Conference. Springer (2001)","DOI":"10.1007\/3-540-45353-9_7"},{"key":"1074_CR28","unstructured":"Handschuh H., Naccache D.: Shacal: a family of block ciphers. Submission to the NESSIE project (2002)."},{"key":"1074_CR29","volume-title":"Hacker\u2019s delight","author":"J Henry","year":"2003","unstructured":"Henry J., Warren S.: Hacker\u2019s delight. Addison-Wesley, Boston (2003)."},{"key":"1074_CR30","doi-asserted-by":"crossref","unstructured":"Hong S., Kim J., Lee S., Preneel B.: Related-key rectangle attacks on reduced versions of shacal-1 and aes-192. Springer, In International Workshop on Fast Software Encryption (2005).","DOI":"10.1007\/11502760_25"},{"key":"1074_CR31","doi-asserted-by":"crossref","unstructured":"Hong D., Sung J., Hong S., Lim J., Lee S., Koo B.S., Lee C., Chang D., Lee J., Jeong K., Kim H.: HIGHT: A new block cipher suitable for low-resource device. In: Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop, Yokohama, Japan, October 10\u201313, 2006, Proceedings (2006).","DOI":"10.1007\/11894063_4"},{"key":"1074_CR32","doi-asserted-by":"crossref","unstructured":"Hong D., Lee J.K., Kim D.C., Kwon D., Ryu K.H., Lee D.G.: LEA: A 128-bit block cipher for fast encryption on common processors. In: WISA, volume 8267 of Lecture Notes in Computer Science. Springer (2013).","DOI":"10.1007\/978-3-319-05149-9_1"},{"key":"1074_CR33","unstructured":"ISO\/IEC 18033-3:2010. Information technology, Security techniques, Encryption algorithms, Part 3: Block ciphers. Standard, International Organization for Standardization (2010)."},{"key":"1074_CR34","doi-asserted-by":"crossref","unstructured":"Kelsey J., Schneier B., Wagner D.A.: Key-schedule cryptanalysis of idea, g-des, gost, safer, and triple-des. In: CRYPTO, volume 1109 of Lecture Notes in Computer Science. Springer (1996).","DOI":"10.1007\/3-540-68697-5_19"},{"key":"1074_CR35","doi-asserted-by":"crossref","unstructured":"Kelsey J., Schneier B., Wagner B.A.: Related-key cryptanalysis of 3-way, biham-des, cast, des-x, newdes, rc2, and TEA. In: ICICS, volume 1334 of Lecture Notes in Computer Science. Springer (1997).","DOI":"10.1007\/BFb0028479"},{"key":"1074_CR36","doi-asserted-by":"crossref","unstructured":"Kim J., Kim G., Hong S., Lee S., Hong D.: The related-key rectangle attack, application to shacal-1. In: Australasian Conference on Information Security and Privacy. Springer (2004).","DOI":"10.1007\/978-3-540-27800-9_11"},{"issue":"2","key":"1074_CR37","first-page":"216","volume":"258","author":"L Knudsen","year":"1998","unstructured":"Knudsen L.: Deal-a 128-bit block cipher. Complexity 258(2), 216 (1998).","journal-title":"Complexity"},{"key":"1074_CR38","unstructured":"K\u00f6lbl S., Hadipour H.: Cryptosmt: An easy to use tool for cryptanalysis of symmetric primitives based on smt\/sat solvers. https:\/\/github.com\/kste\/cryptosmt."},{"key":"1074_CR39","doi-asserted-by":"crossref","unstructured":"K\u00f6lbl S., Leander G., Tiessen T., Observations on the SIMON block cipher family. In Advances in Cryptology - CRYPTO 2015\u201335th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16\u201320,: Proceedings. Part I, 2015 (2015).","DOI":"10.1007\/978-3-662-47989-6_8"},{"key":"1074_CR40","unstructured":"Koo B., Hong D., Kwon D.: Related-key attack on the full HIGHT. In: Information Security and Cryptology - ICISC 2010 - 13th International Conference, Seoul, Korea, December 1\u20133, 2010, Revised Selected Papers (2010)."},{"key":"1074_CR41","unstructured":"Koo B, Roh D, Kim H, Jung Y, Lee D, Kwon, D: CHAM: A family of lightweight block ciphers for resource-constrained devices. In: Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29\u2013December 1, 2017, Revised Selected Papers (2017)."},{"issue":"2","key":"1074_CR42","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1007\/s00224-015-9653-1","volume":"59","author":"G Kov\u00e1sznai","year":"2016","unstructured":"Kov\u00e1sznai G., Fr\u00f6hlich A., Biere A.: Complexity of fixed-size bit-vector logics. Theory Comput. Syst. 59(2), 323 (2016).","journal-title":"Theory Comput. Syst."},{"key":"1074_CR43","doi-asserted-by":"crossref","unstructured":"Lai X., Massey J.L.: A proposal for a new block encryption standard. In EUROCRYPT, volume 473 of Lecture Notes in Computer Science. Springer (1990).","DOI":"10.1007\/3-540-46877-3_35"},{"key":"1074_CR44","unstructured":"Lai X., Massey J.L., Murphy S.: Markov ciphers and differential cryptanalysis. In: EUROCRYPT, volume 547 of Lecture Notes in Computer Science. Springer (1991)."},{"key":"1074_CR45","doi-asserted-by":"crossref","unstructured":"Lee E., Hong D., Chang D., Hong S., Lim J.: A weak key class of XTEA for a related-key rectangle attack. In: VIETCRYPT, volume 4341 of Lecture Notes in Computer Science. Springer (2006).","DOI":"10.1007\/11958239_19"},{"key":"1074_CR46","unstructured":"Lipmaa H.: On differential properties of pseudo-hadamard transform and related mappings. In: A.\u00a0Menezes, P.\u00a0Sarkar (eds) Progress in Cryptology - INDOCRYPT 2002, Third International Conference on Cryptology in India, Hyderabad, India, December 16\u201318, 2002, vol. 2551 of Lecture Notes in Computer Science. Springer (2002)."},{"key":"1074_CR47","unstructured":"Lipmaa H., Moriai S.: Efficient algorithms for computing differential properties of addition. In: Fast Software Encryption, 8th International Workshop, FSE 2001 Yokohama, Japan, April 2\u20134, 2001, Revised Papers (2001)."},{"key":"1074_CR48","first-page":"2017","volume":"3","author":"Y Liu","year":"2017","unstructured":"Liu Y., Witte G.D., Ranea A., Ashur T.: Rotational-xor cryptanalysis of reduced-round SPECK. IACR Trans. Symmetric Cryptol. 3, 2017 (2017).","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"1074_CR49","doi-asserted-by":"crossref","unstructured":"Lodi A.: Mixed integer programming computation. In: 50 Years of Integer Programming. Springer (2010).","DOI":"10.1007\/978-3-540-68279-0_16"},{"key":"1074_CR50","unstructured":"Lu J.: Cryptanalysis of reduced versions of the HIGHT block cipher from CHES 2006. In: Information Security and Cryptology - ICISC 2007, 10th International Conference, Seoul, Korea, November 29\u201330, 2007, Proceedings (2007)."},{"key":"1074_CR51","doi-asserted-by":"crossref","unstructured":"Lu J., Kim J., Keller N., Dunkelman O.: Related-key rectangle attack on 42-round shacal-2. In: International Conference on Information Security. Springer (2006).","DOI":"10.1007\/11836810_7"},{"issue":"1","key":"1074_CR52","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/s10207-008-0059-9","volume":"8","author":"J Lu","year":"2009","unstructured":"Lu J.: Related-key rectangle attack on 36 rounds of the XTEA block cipher. Int. J. Inf. Sec. 8(1), 15 (2009).","journal-title":"Int. J. Inf. Sec."},{"key":"1074_CR53","first-page":"52","volume":"2001","author":"AW Machado","year":"2001","unstructured":"Machado A.W.: Differential probability of modular addition with a constant operand. IACR Cryptol. 2001, 52 (2001).","journal-title":"IACR Cryptol."},{"key":"1074_CR54","unstructured":"Matsui M.: On correlation between the order of s-boxes and the strength of des. Springer, In Workshop on the Theory and Application of of Cryptographic Techniques (1994)."},{"key":"1074_CR55","first-page":"e103","volume":"3","author":"A Meurer","year":"2017","unstructured":"Meurer A., Smith C.P., Paprocki M., et al.: Sympy: symbolic computing in python. PeerJ 3, e103 (2017).","journal-title":"PeerJ"},{"key":"1074_CR56","doi-asserted-by":"publisher","first-page":"512","DOI":"10.1109\/TEC.1962.5219391","volume":"4","author":"JN Mitchell","year":"1962","unstructured":"Mitchell J.N.: Computer multiplication and division using binary logarithms. IRE Trans. Electron. Comput. 4, 512 (1962).","journal-title":"IRE Trans. Electron. Comput."},{"key":"1074_CR57","first-page":"328","volume":"2013","author":"N Mouha","year":"2013","unstructured":"Mouha N., Preneel B.: Towards finding optimal differential characteristics for ARX: application to Salsa20. IACR Cryptol. 2013, 328 (2013).","journal-title":"IACR Cryptol."},{"key":"1074_CR58","doi-asserted-by":"crossref","unstructured":"Mouha N., Mennink B., Van\u00a0Herrewege A., Watanabe D., Preneel B., Verbauwhede I.: Chaskey: an efficient mac algorithm for 32-bit microcontrollers. In International Conference on Selected Areas in Cryptography. Springer (2014).","DOI":"10.1007\/978-3-319-13051-4_19"},{"key":"1074_CR59","unstructured":"National Institute of Standards and Technology. Lightweight cryptography project. https:\/\/csrc.nist.gov\/Projects\/Lightweight-Cryptography."},{"key":"1074_CR60","unstructured":"Needham R., Wheeler D.: Tea extensions. Technical report, Computer Laboratory, University of Cambridge (1997)."},{"key":"1074_CR61","unstructured":"NESSIE. New european schemes for signatures, integrity and encryption. https:\/\/www.cosic.esat.kuleuven.be\/nessie\/index.html."},{"key":"1074_CR62","doi-asserted-by":"publisher","first-page":"53","DOI":"10.3233\/SAT190101","volume":"9","author":"A Niemetz","year":"2015","unstructured":"Niemetz A., Preiner M., Biere A.: Boolector 2.0 system description. J. Satisf. Boolean Modeling Comput. 9, 53\u201358 (2015).","journal-title":"J. Satisf. Boolean Modeling Comput."},{"key":"1074_CR63","doi-asserted-by":"crossref","unstructured":"\u00d6zen O., Var\u0131c\u0131 K., Tezcan C., Kocair C.: Lightweight block ciphers revisited: Cryptanalysis of reduced round present and height. In Australasian Conference on Information Security and Privacy. Springer (2009).","DOI":"10.1007\/978-3-642-02620-1_7"},{"issue":"3","key":"1074_CR64","first-page":"1","volume":"18","author":"A Ranea","year":"2017","unstructured":"Ranea A., Liu Y., Ashur T.: An easy-to-use tool for rotational-xor cryptanalysis of ARX block ciphers. Proc. Roman. Acad. Series A 18(3), 1\u20138 (2017).","journal-title":"Proc. Roman. Acad. Series A"},{"key":"1074_CR65","doi-asserted-by":"publisher","first-page":"63045","DOI":"10.1109\/ACCESS.2019.2917015","volume":"7","author":"J Ren","year":"2019","unstructured":"Ren J., Chen S.: Cryptanalysis of reduced-round speck. IEEE Access 7, 63045\u201363056 (2019).","journal-title":"IEEE Access"},{"key":"1074_CR66","doi-asserted-by":"crossref","unstructured":"Sasaki Y., Todo Y.: New impossible differential search tool from design and cryptanalysis aspects - revealing structural properties of several ciphers. In EUROCRYPT (3), volume 10212 of Lecture Notes in Computer Science (2017).","DOI":"10.1007\/978-3-319-56617-7_7"},{"issue":"1\u20133","key":"1074_CR67","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/s10623-012-9668-4","volume":"66","author":"E Schulte-Geers","year":"2013","unstructured":"Schulte-Geers E.: On ccz-equivalence of addition mod $2^n$. Designs Codes Cryptogr. 66(1\u20133), 111\u2013127 (2013).","journal-title":"Designs Codes Cryptogr."},{"key":"1074_CR68","unstructured":"Song L., Huang Z., Yang Q.: Automatic differential analysis of ARX block ciphers with application to SPECK and LEA. In Information Security and Privacy - 21st Australasian Conference, ACISP: Melbourne, VIC, Australia, July 4\u20136, 2016, Proceedings. Part I, 2016 (2016)."},{"key":"1074_CR69","doi-asserted-by":"crossref","unstructured":"Sun S., Hu L., Wang P., Qiao K., Ma X., Song L.: Automatic security evaluation and (related-key) differential characteristic search: Application to simon, present, lblock, DES(L) and other bit-oriented block ciphers. In Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7\u201311, 2014. Proceedings, Part I (2014).","DOI":"10.1007\/978-3-662-45611-8_9"},{"key":"1074_CR70","first-page":"2017","volume":"1","author":"S Sun","year":"2017","unstructured":"Sun S., Gerault D., Lafourcade P., Yang Q., Todo Y., Qiao K., Hu L.: Analysis of aes, skinny, and others with constraint programming. IACR Trans. Symmetric Cryptol. 1, 2017 (2017).","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"1074_CR71","unstructured":"Wagner DA. The boomerang attack. In Fast Software Encryption, 6th International Workshop, FSE \u201999, Rome, Italy, March 24\u201326, 1999, Proceedings (1999)."},{"key":"1074_CR72","doi-asserted-by":"crossref","unstructured":"Wang G., Keller N., Dunkelman O.: The delicate issues of addition with respect to xor differences. In: International Workshop on Selected Areas in Cryptography. Springer (2007).","DOI":"10.1007\/978-3-540-77360-3_14"},{"key":"1074_CR73","doi-asserted-by":"crossref","unstructured":"Wheeler D.J., Needham R.M.: Tea, a tiny encryption algorithm. In FSE, volume 1008 of Lecture Notes in Computer Science. Springer (1994).","DOI":"10.1007\/3-540-60590-8_29"},{"issue":"1","key":"1074_CR74","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/0161-118791861749","volume":"11","author":"RS Winternitz","year":"1987","unstructured":"Winternitz R.S., Hellman M.E.: Chosen-key attacks on a block cipher. Cryptologia 11(1), 1\u20137 (1987).","journal-title":"Cryptologia"},{"issue":"11A","key":"1074_CR75","first-page":"54","volume":"28","author":"SP Yang","year":"2006","unstructured":"Yang S.P., Hu Y.P., Zhong M.F.: Related-key impossible differential attacks on 31-round shacal-2. J. Commun. 28(11A), 54\u201358 (2006).","journal-title":"J. Commun."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-022-01074-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10623-022-01074-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-022-01074-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T13:08:28Z","timestamp":1744204108000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10623-022-01074-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,5]]},"references-count":75,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2022,8]]}},"alternative-id":["1074"],"URL":"https:\/\/doi.org\/10.1007\/s10623-022-01074-8","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"type":"print","value":"0925-1022"},{"type":"electronic","value":"1573-7586"}],"subject":[],"published":{"date-parts":[[2022,7,5]]},"assertion":[{"value":"4 January 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 June 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 June 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 July 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}