{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T11:28:26Z","timestamp":1762342106398,"version":"3.37.3"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2023,6,3]],"date-time":"2023-06-03T00:00:00Z","timestamp":1685750400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,6,3]],"date-time":"2023-06-03T00:00:00Z","timestamp":1685750400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61802437","61972248","61902428","62102448"],"award-info":[{"award-number":["61802437","61972248","61902428","62102448"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"China Post-doctoral Science Foundation","award":["2020M681314"],"award-info":[{"award-number":["2020M681314"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2023,10]]},"DOI":"10.1007\/s10623-023-01241-5","type":"journal-article","created":{"date-parts":[[2023,6,3]],"date-time":"2023-06-03T12:02:05Z","timestamp":1685793725000},"page":"3187-3214","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Weak rotational property and its application"],"prefix":"10.1007","volume":"91","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6550-6518","authenticated-orcid":false,"given":"Kai","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Xuejia","family":"Lai","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Guan","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Hu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,3]]},"reference":[{"key":"1241_CR1","unstructured":"Abed F., List E., Lucks S., Wenzel J.: Differential and linear cryptanalysis of reduced-round simon. Cryptology ePrint Archive, Report 2013\/526 (2013)"},{"key":"1241_CR2","doi-asserted-by":"crossref","unstructured":"Alizadeh J., AlKhzaimi H., Aref M.R., Bagheri N., Gauravaram P., Kumar A., Lauridsen M.M., Sanadhya S.K.: Cryptanalysis of SIMON variants with connections. In: Saxena N., Sadeghi, A. (eds.) Radio frequency identification: security and privacy issues\u201410th International Workshop, RFIDSec 2014, Oxford, UK, July 21\u201323, 2014, Revised Selected Papers, Lecture Notes in Computer Science, vol. 8651, pp. 90\u2013107. Springer (2014)","DOI":"10.1007\/978-3-319-13066-8_6"},{"key":"1241_CR3","first-page":"543","volume":"2013","author":"H AlKhzaimi","year":"2013","unstructured":"AlKhzaimi H., Lauridsen M.M.: Cryptanalysis of the SIMON family of block ciphers. IACR Cryptol. 2013, 543 (2013).","journal-title":"IACR Cryptol."},{"key":"1241_CR4","unstructured":"Aumasson J.P., Leurent G., Meier W., Mendel F., Mouha N., Phan R.C., Sasaki Y., Susil P.: Tuple cryptanalysis of arx with application to blake and skein. In: ECRYPT II Hash Workshop, Date: 2011\/05\/19\u20132011\/05\/20, Location: Tallinn, Estonia, pp. 1\u201313 (2011)"},{"key":"1241_CR5","first-page":"404","volume":"2013","author":"R Beaulieu","year":"2013","unstructured":"Beaulieu R., Shors D., Smith J., Treatman-Clark S., Weeks B., Wingers L.: The SIMON and SPECK families of lightweight block ciphers. IACR Cryptol. 2013, 404 (2013).","journal-title":"IACR Cryptol."},{"key":"1241_CR6","doi-asserted-by":"crossref","unstructured":"Biham E., Biryukov A., Shamir A.: Miss in the middle attacks on IDEA and khufu. In: Knudsen L.R. (ed.) Fast Software Encryption, 6th International Workshop, FSE 99, Rome, Italy, March 24\u201326, 1999, Proceedings, Lecture Notes in Computer Science, vol. 1636, pp. 124\u2013138. Springer (1999)","DOI":"10.1007\/3-540-48519-8_10"},{"key":"1241_CR7","unstructured":"Biryukov A., Cannire C.D., Quisquater M.: On multiple linear approximations. In: Franklin M.K. (ed.) Advances in Cryptology\u2014CRYPTO 2004, 24th Annual International CryptologyConference, Santa Barbara, California, USA, August 15\u201319, 2004, Proceedings, Lecture Notes in Computer Science, vol. 3152, pp. 1\u201322. Springer (2004)"},{"key":"1241_CR8","doi-asserted-by":"crossref","unstructured":"Blondeau C., Grard B.: Multiple differential cryptanalysis: Theory and practice. In: Joux A. (ed.) Fast Software Encryption\u201418th International Workshop, FSE 2011, Lyngby, Denmark, February 13\u201316, 2011, Revised Selected Papers, Lecture Notes in Computer Science, vol. 6733, pp. 35\u201354. Springer (2011)","DOI":"10.1007\/978-3-642-21702-9_3"},{"key":"1241_CR10","doi-asserted-by":"crossref","unstructured":"Bogdanov A., Wang M.: Zero correlation linear cryptanalysis with reduced data complexity. In: Canteaut A. (ed.) Fast Software Encryption\u201419th International Workshop, FSE 2012, Washington, DC, USA, March 19\u201321, 2012. Revised Selected Papers, Lecture Notes in Computer Science, vol. 7549, pp. 29\u201348. Springer (2012)","DOI":"10.1007\/978-3-642-34047-5_3"},{"key":"1241_CR9","doi-asserted-by":"crossref","unstructured":"Bogdanov A., Leander G., Nyberg K., Wang M.: Integral and multidimensional linear distinguishers with correlation zero. In: Wang X., Sako K. (eds.) Advances in Cryptology - ASIACRYPT 2012\u201418th international conference on the theory and application of cryptology and information security, Beijing, China, December 2\u20136, 2012. Proceedings, Lecture Notes in Computer Science, vol. 7658, pp. 244\u2013261. Springer (2012)","DOI":"10.1007\/978-3-642-34961-4_16"},{"key":"1241_CR11","doi-asserted-by":"crossref","unstructured":"Boura C., Naya-Plasencia M., Suder V.: Scrutinizing and improving impossible differential attacks: Applications to clefia, camellia, lblock and simon. In: Sarkar P., Iwata T. (eds.) Advances in Cryptology-ASIACRYPT 2014\u201420th International conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7\u201311, 2014. Proceedings, Part I, Lecture Notes in Computer Science, vol. 8873, pp. 179\u2013199. Springer (2014)","DOI":"10.1007\/978-3-662-45611-8_10"},{"key":"1241_CR12","first-page":"286","volume":"2015","author":"Z Chen","year":"2015","unstructured":"Chen Z., Wang N., Wang X.: Impossible differential cryptanalysis of reduced round SIMON. IACR Cryptol. 2015, 286 (2015).","journal-title":"IACR Cryptol."},{"key":"1241_CR13","unstructured":"Ferguson N., Lucks S., Schneier B., Whiting D., Bellare M., Kohno T., Callas J., Walker J.: The Skein hash function family. Submitted to SHA-3 Competition (2008)"},{"key":"1241_CR14","doi-asserted-by":"crossref","unstructured":"Isobe T., Shibutani K.: Generic key recovery attack on feistel scheme. In: Sako K., Sarkar P. (eds.) Advances in Cryptology-ASIACRYPT 2013\u201419th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1\u20135, 2013, Proceedings, Part I, Lecture Notes in Computer Science, vol. 8269, pp. 464\u2013485. Springer (2013)","DOI":"10.1007\/978-3-642-42033-7_24"},{"key":"1241_CR15","doi-asserted-by":"crossref","unstructured":"Khovratovich D., Nikolic I.: Rotational cryptanalysis of ARX. In: Hong S., Iwata T. (eds.) Fast software encryption, 17th international workshop, FSE 2010, Seoul, Korea, February 7\u201310, 2010, revised selected papers, lecture notes in computer science, vol. 6147, pp. 333\u2013346. Springer (2010)","DOI":"10.1007\/978-3-642-13858-4_19"},{"key":"1241_CR16","doi-asserted-by":"crossref","unstructured":"Kim J., Hong S., Sung J., Lee C., Lee S.: Impossible differential cryptanalysis for block cipher structures. In: Johansson T., Maitra S. (eds.) Progress in Cryptology-INDOCRYPT 2003, 4th international conference on cryptology in India, New Delhi, India, December 8\u201310, 2003, Proceedings, Lecture Notes in Computer Science, vol. 2904, pp. 82\u201396. Springer (2003)","DOI":"10.1007\/978-3-540-24582-7_6"},{"key":"1241_CR17","doi-asserted-by":"crossref","unstructured":"Lu J., Kim J., Keller N., Dunkelman O.: Improving the efficiency of impossible differential cryptanalysis of reduced Camellia and MISTY1. In CT-RSA, vol. 4964 of LNCS, pp. 370\u2013386. Springer (2008)","DOI":"10.1007\/978-3-540-79263-5_24"},{"key":"1241_CR18","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/j.ins.2013.08.051","volume":"263","author":"Y Luo","year":"2014","unstructured":"Luo Y., Lai X., Wu Z., Gong G.: A unified method for finding impossible differentials of block cipher structures. Inf. Sci. 263, 211\u2013220 (2014).","journal-title":"Inf. Sci."},{"issue":"2","key":"1241_CR19","doi-asserted-by":"publisher","first-page":"683","DOI":"10.1007\/s10623-014-9976-y","volume":"73","author":"H Soleimany","year":"2014","unstructured":"Soleimany H., Nyberg K.: Zero-correlation linear cryptanalysis of reduced-round lblock. Des. Codes Cryptogr. 73(2), 683\u2013698 (2014).","journal-title":"Des. Codes Cryptogr."},{"key":"1241_CR20","unstructured":"Sun L., Fu K., Wang M.: Improved zero-correlation cryptanalysis on SIMON. In: Lin D., Wang X., Yung M. (eds.) Information security and cryptology\u201411th international conference, Inscrypt 2015, Beijing, China, November 1\u20133, 2015, Revised Selected Papers, Lecture Notes in Computer Science, vol. 9589, pp. 125\u2013143. Springer (2015)"},{"key":"1241_CR21","doi-asserted-by":"crossref","unstructured":"Tsunoo Y., Tsujihara E., Shigeri M., Suzaki T., Kawabata T.: Cryptanalysis of clefia using multiple impossible differentials. pp. 1\u20136 (2009)","DOI":"10.1109\/ISITA.2008.4895639"},{"key":"1241_CR22","doi-asserted-by":"crossref","unstructured":"Wang Q., Liu Z., Varici K., Sasaki Y., Rijmen V., Todo Y.: Cryptanalysis of reduced-round SIMON32 and SIMON48. In: Meier W., Mukhopadhyay D. (eds.) Progress in Cryptology-INDOCRYPT 2014\u201415th international conference on cryptology in India, New Delhi, India, December 14\u201317, 2014, Proceedings, Lecture Notes in Computer Science, vol. 8885, pp. 143\u2013160. Springer (2014)","DOI":"10.1007\/978-3-319-13039-2_9"},{"issue":"2","key":"1241_CR23","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/CC.2018.8300272","volume":"15","author":"K Zhang","year":"2018","unstructured":"Zhang K., Guan J., Hu B.: Automatic search of impossible differentials and zero-correlation linear hulls for ARX ciphers. China Commun. 15(2), 54\u201366 (2018).","journal-title":"China Commun."},{"issue":"1","key":"1241_CR24","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1049\/iet-ifs.2016.0503","volume":"12","author":"K Zhang","year":"2018","unstructured":"Zhang K., Guan J., Hu B., Lin D.: Security evaluation on Simeck against zero-correlation linear cryptanalysis. IET Inf. Secur. 12(1), 87\u201393 (2018).","journal-title":"IET Inf. Secur."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-023-01241-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10623-023-01241-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-023-01241-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,28]],"date-time":"2023-09-28T18:05:12Z","timestamp":1695924312000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10623-023-01241-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,3]]},"references-count":24,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2023,10]]}},"alternative-id":["1241"],"URL":"https:\/\/doi.org\/10.1007\/s10623-023-01241-5","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"type":"print","value":"0925-1022"},{"type":"electronic","value":"1573-7586"}],"subject":[],"published":{"date-parts":[[2023,6,3]]},"assertion":[{"value":"30 May 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 January 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 April 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 June 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}