{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T20:30:19Z","timestamp":1767990619934,"version":"3.49.0"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2024,4,18]],"date-time":"2024-04-18T00:00:00Z","timestamp":1713398400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,4,18]],"date-time":"2024-04-18T00:00:00Z","timestamp":1713398400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62302285"],"award-info":[{"award-number":["62302285"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62002288"],"award-info":[{"award-number":["62002288"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2024,9]]},"DOI":"10.1007\/s10623-024-01396-9","type":"journal-article","created":{"date-parts":[[2024,4,18]],"date-time":"2024-04-18T03:44:05Z","timestamp":1713411845000},"page":"2423-2449","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Meet-in-the-middle attacks on AES with value constraints"],"prefix":"10.1007","volume":"92","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8861-1505","authenticated-orcid":false,"given":"Xiaoli","family":"Dong","sequence":"first","affiliation":[]},{"given":"Jun","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yongzhuang","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Wen","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,18]]},"reference":[{"issue":"3","key":"1396_CR1","doi-asserted-by":"publisher","first-page":"197","DOI":"10.46586\/tosc.v2020.i3.197-261","volume":"2020","author":"Z Bao","year":"2020","unstructured":"Bao Z., Guo J., List E.: Extended truncated-differential distinguishers on round-reduced AES. IACR Trans. Symmetric Cryptol. 2020(3), 197\u2013261 (2020).","journal-title":"IACR Trans. Symmetric Cryptol."},{"issue":"3","key":"1396_CR2","doi-asserted-by":"publisher","first-page":"1003","DOI":"10.1007\/s00145-019-09336-w","volume":"33","author":"A Bar-On","year":"2020","unstructured":"Bar-On A., Dunkelman O., Keller N., Ronen E., Shamir A.: Improved key recovery attacks on reduced-round AES with practical data and memory complexities. J. Cryptol. 33(3), 1003\u20131043 (2020).","journal-title":"J. Cryptol."},{"issue":"2","key":"1396_CR3","doi-asserted-by":"publisher","first-page":"43","DOI":"10.46586\/tosc.v2022.i2.43-62","volume":"2022","author":"N Bardeh","year":"2022","unstructured":"Bardeh N., Rijmen V.: New key-recovery attack on reduced-round AES. IACR Trans. Symmetric Cryptol. 2022(2), 43\u201362 (2022).","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"1396_CR4","doi-asserted-by":"crossref","unstructured":"Bardeh N., R\u00f8njom, S.: The exchange attack: how to distinguish 6 rounds of AES with $$2^{88}$$ chosen plaintexts. ASIACRYPT 2019. LNCS, vol. 11923, pp, 347-370. Springer, Heidelberg (2019)","DOI":"10.1007\/978-3-030-34618-8_12"},{"key":"1396_CR5","unstructured":"Biham E. Keller N.: Cryptanalysis of reduced variants of Rijndael. AES Conference (2000)"},{"key":"1396_CR6","doi-asserted-by":"crossref","unstructured":"Biryukov A.: The boomerang attack on 5 and 6-round reduced AES. AES 2004. LNCS, vol. 3373, pp. 11-15. Springer, Heidelberg (2005)","DOI":"10.1007\/11506447_2"},{"key":"1396_CR7","doi-asserted-by":"crossref","unstructured":"Bogdanov A., Khovratovich D., Rechberge C.: Biclique cryptanalysis of the full AES. ASIACRYPT 2011. LNCS, vol. 7073, pp. 344-371. Springer, Heidelberg (2011)","DOI":"10.1007\/978-3-642-25385-0_19"},{"issue":"11","key":"1396_CR8","doi-asserted-by":"publisher","first-page":"7002","DOI":"10.1109\/TIT.2012.2207880","volume":"58","author":"C Bouillaguet","year":"2012","unstructured":"Bouillaguet C., Derbez P., Dunkelman O., Fouque P., Keller N., Rijmen V.: Low-data complexity attacks on AES. IEEE Trans. Inf. Theory 58(11), 7002\u20137017 (2012).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"1396_CR9","doi-asserted-by":"publisher","first-page":"170","DOI":"10.46586\/tosc.v2019.i1.170-191","volume":"2019","author":"C Boura","year":"2019","unstructured":"Boura C., Canteaut A., Coggia D.: A general proof framework for recent AES distinguishers. IACR Trans. Symmetric Cryptol. 2019(1), 170\u2013191 (2019).","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"1396_CR10","doi-asserted-by":"crossref","unstructured":"Cheon J.H., Kim M., Kim K., Jung-Yeun L., Kang S.: Improved impossible differential cryptanalysis of rijndael and crypton. ICISC 2001. LNCS, vol. 2288, pp. 39-49. Springer, Heidelberg (2002)","DOI":"10.1007\/3-540-45861-1_4"},{"key":"1396_CR11","doi-asserted-by":"crossref","unstructured":"Daemen J., Knudsen L., Rijmen V.: The block cipher SQUARE. In: Biham E. (ed.) FSE 1997, vol. 1267, pp. 149\u2013165. LNCS. Springer, Berlin (1997).","DOI":"10.1007\/BFb0052343"},{"key":"1396_CR12","unstructured":"Daemen J., Rijmen V.: AES proposal: Rijndael. First Advanced Encryption Standard (AES) Conference (1998)"},{"key":"1396_CR13","doi-asserted-by":"crossref","unstructured":"Demirci H., Sel\u00e7uk A.A.: A meet-in-the-middle attack on 8-round AES. FSE 2008. LNCS, vol. 5086, pp. 116-126. Springer, Heidelberg (2008)","DOI":"10.1007\/978-3-540-71039-4_7"},{"key":"1396_CR14","doi-asserted-by":"crossref","unstructured":"Demirci H., Sel\u00e7uk A.A., T\u00fcre E.: A new meet-in-the-middle attack on the IDEA block cipher. SAC 2003, LNCS, vol. 3006, pp. 117-129. Springer, Heidelberg (2004)","DOI":"10.1007\/978-3-540-24654-1_9"},{"key":"1396_CR15","doi-asserted-by":"crossref","unstructured":"Demirci H., Ta\u015fk\u0131n I., \u00c7oban, M., Baysal, A.: Improved meet-in-the-middle attacks on AES. INDOCRYPT 2009. LNCS, vol. 5922, pp. 144-156. Springer, Heidelberg (2009)","DOI":"10.1007\/978-3-642-10628-6_10"},{"key":"1396_CR16","doi-asserted-by":"crossref","unstructured":"Derbez P., Fouque P.-A.: Exhausting Demirci-Sel\u00e7uk meet-in-the-middle attacks against reduced-round AES. FSE 2013. LNCS, vol. 8424, pp. 541-560. Springer, Heidelberg (2014)","DOI":"10.1007\/978-3-662-43933-3_28"},{"key":"1396_CR17","doi-asserted-by":"crossref","unstructured":"Derbez P., Fouque P.-A., Jean J.: Improved key recovery attacks on reduced-round AES in the single-key setting. EUROCRYPT 2013. LNCS, vol. 7881, pp. 371-387. Springer, Heidelberg (2013)","DOI":"10.1007\/978-3-642-38348-9_23"},{"key":"1396_CR18","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/C-M.1977.217750","volume":"10","author":"W Diffie","year":"1977","unstructured":"Diffie W., Hellman M.E.: Special feature exhaustive cryptanalysis of the NBS data encryption standard. Computer 10, 74\u201384 (1977).","journal-title":"Computer"},{"key":"1396_CR19","doi-asserted-by":"crossref","unstructured":"Dong X., Li L., Jia K., Wang X.: Improved attacks on reduced-round Camellia-128\/192\/256. CT-RSA 2015. LNCS, vol. 9048, pp. 59-83. Springer, Heidelberg (2015)","DOI":"10.1007\/978-3-319-16715-2_4"},{"key":"1396_CR20","doi-asserted-by":"crossref","unstructured":"Dunkelman O., Keller N., Shamir A.: Improved single-key attacks on 8-round AES-192 and AES-256. ASIACRYPT 2010. LNCS, vol. 6477, pp. 158-176. Springer, Heidelberg (2010)","DOI":"10.1007\/978-3-642-17373-8_10"},{"key":"1396_CR21","doi-asserted-by":"crossref","unstructured":"Ferguson N., Kelsey J., Lucks S., Schneier B., Stay M., Wagner D., Whiting D.: Improved cryptanalysis of Rijndael. FSE 2000. LNCS, vol. 1978, pp. 213-230 (2001)","DOI":"10.1007\/3-540-44706-7_15"},{"key":"1396_CR22","unstructured":"Gilber H., Minier M.: A collision attack on 7 rounds of Rijndael. AES Candidate Conference, pp. 230-241 (2000)"},{"issue":"2","key":"1396_CR23","doi-asserted-by":"publisher","first-page":"133","DOI":"10.46586\/tosc.v2018.i2.133-160","volume":"2018","author":"L Grassi","year":"2018","unstructured":"Grassi L.: Mixture differential cryptanalysis: a new approach to distinguishers and attacks on round-reduced AES. IACR Trans. Symmetric Cryptol. 2018(2), 133\u2013160 (2018).","journal-title":"IACR Trans. Symmetric Cryptol."},{"issue":"2","key":"1396_CR24","first-page":"192","volume":"2016","author":"L Grassi","year":"2016","unstructured":"Grassi L., Rechberger C., R\u00f8njom S.: Subspace trail cryptanalysis and its applications to AES. IACR Trans. Symmetric Cryptol. 2016(2), 192\u2013225 (2016).","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"1396_CR25","doi-asserted-by":"crossref","unstructured":"Grassi L., Rechberger C., R\u00f8njom S: A new structural-differential property of 5-round AES. EUROCRYPT 2017. LNCS, vol. 10211, pp. 289-317. Springer, Cham (2017)","DOI":"10.1007\/978-3-319-56614-6_10"},{"key":"1396_CR26","doi-asserted-by":"crossref","unstructured":"Gilbert H., Peyrin T.: Super-Sbox cryptanalysis: improved attacks for AES-like permutations. FSE 2010. LNCS, vol. 6147, pp. 365-383. Springer, Heidelberg (2010)","DOI":"10.1007\/978-3-642-13858-4_21"},{"key":"1396_CR27","doi-asserted-by":"crossref","unstructured":"Grassi L., Schofnegger M.: Mixture integral attacks on reduced-round AES with a known\/secret S-Box. INDOCRYPT 2020. LNCS, vol. 12578, pp, 312-331. Springer, Heidelberg (2020)","DOI":"10.1007\/978-3-030-65277-7_14"},{"key":"1396_CR28","doi-asserted-by":"crossref","unstructured":"Li L., Jia K., Wang X.: Improved single-key attacks on 9-round AES-192\/256. FSE 2014. LNCS, vol. 8540, pp. 127-146. Springer, Heidelberg (2015)","DOI":"10.1007\/978-3-662-46706-0_7"},{"key":"1396_CR29","unstructured":"Lu J.: Cryptanalysis of block ciphers. Doctoral Dissertation, Royal Holloway University of London, 15-104 (2015)"},{"key":"1396_CR30","doi-asserted-by":"crossref","unstructured":"Lu J., Dunkelman, O., Keller, N., Kim, J.-S.: New impossible differential attacks on AES. INDOCRYPT 2008. LNCS, vol. 5365, pp. 279-293. Springer, Heidelberg (2008)","DOI":"10.1007\/978-3-540-89754-5_22"},{"key":"1396_CR31","doi-asserted-by":"crossref","unstructured":"Mala H., Dakhilalian M., Rijmen V., Modarres-Hashemi, M.: Improved impossible differential cryptanalysis of 7-round AES-128. INDOCRYPT 2010. LNCS, vol. 6498, pp. 282-291. Springer, Heidelberg (2010)","DOI":"10.1007\/978-3-642-17401-8_20"},{"key":"1396_CR32","doi-asserted-by":"crossref","unstructured":"R\u00f8njom S., Bardeh N.G., Helleseth T. Yoyo tricks with AES. ASIACRYPT 2017. LNCS, vol. 10624, pp. 217-243. Springer, Cham (2017)","DOI":"10.1007\/978-3-319-70694-8_8"},{"key":"1396_CR33","doi-asserted-by":"crossref","unstructured":"Sun B., Liu M., Guo J., Qu L., Rijmen V.: New insights on AES-like SPN cciphers. CRYPTO 2016. LNCS, vol. 9814, pp. 605-624. Springer, Heidelberg (2016)","DOI":"10.1007\/978-3-662-53018-4_22"},{"key":"1396_CR34","doi-asserted-by":"crossref","unstructured":"Tiessen T.: Polytopic cryptanalysis. EUROCRYPT 2016. LNCS, vol. 9665, pp. 214-239. Springer, Heidelberg (2016)","DOI":"10.1007\/978-3-662-49890-3_9"},{"key":"1396_CR35","doi-asserted-by":"crossref","unstructured":"Zhang W., Wu W., Feng D.: New results on impossible differential cryptanalysis of reduced AES. ICISC 2007. LNCS, vol. 4817, pp. 239-250. Springer, Heidelberg (2007)","DOI":"10.1007\/978-3-540-76788-6_19"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-024-01396-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10623-024-01396-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-024-01396-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,9]],"date-time":"2024-08-09T16:11:14Z","timestamp":1723219874000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10623-024-01396-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,18]]},"references-count":35,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2024,9]]}},"alternative-id":["1396"],"URL":"https:\/\/doi.org\/10.1007\/s10623-024-01396-9","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4,18]]},"assertion":[{"value":"17 January 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 November 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 March 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 April 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}