{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:10:03Z","timestamp":1750277403395,"version":"3.41.0"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T00:00:00Z","timestamp":1738713600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T00:00:00Z","timestamp":1738713600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072445","62072445","62072445","62072445"],"award-info":[{"award-number":["62072445","62072445","62072445","62072445"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"CAS Project for Young Scientists in Basic Research","award":["YSBR-035"],"award-info":[{"award-number":["YSBR-035"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1007\/s10623-025-01571-6","type":"journal-article","created":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T14:22:31Z","timestamp":1738765351000},"page":"2013-2054","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A new automatic framework for searching rotational-XOR differential characteristics in ARX ciphers"],"prefix":"10.1007","volume":"93","author":[{"given":"Yuhan","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Lei","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yafei","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Wenling","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,5]]},"reference":[{"key":"1571_CR1","doi-asserted-by":"crossref","unstructured":"Abdelkhalek A., Tolba M., Youssef A.M.: Impossible differential attack on reduced round SPARX-64\/128. In: Marc J., Abderrahmane N. (eds.) Progress in Cryptology\u2014AFRICACRYPT 2017\u20149th International Conference on Cryptology in Africa, Dakar, Senegal, May 24\u201326, 2017, Proceedings, pp. 135\u2013146. (2017).","DOI":"10.1007\/978-3-319-57339-7_8"},{"key":"1571_CR2","unstructured":"Abed F., List E., Lucks S., Wenzel J.: Cryptanalysis of the speck family of block ciphers. Cryptology ePrint Archive, Report 2013\/568. (2013). https:\/\/eprint.iacr.org\/2013\/568. Accessed Nov 2023."},{"key":"1571_CR3","doi-asserted-by":"crossref","unstructured":"Ankele R., List E.: Differential cryptanalysis of round-reduced sparx-64\/128. In: Bart P., Frederik V. (eds.) Applied Cryptography and Network Security\u201416th International Conference, ACNS 2018, Leuven, Belgium, July 2\u20134, 2018, Proceedings, pp. 459\u2013475. (2018).","DOI":"10.1007\/978-3-319-93387-0_24"},{"key":"1571_CR4","doi-asserted-by":"crossref","unstructured":"Aoki K., Kobayashi K., Moriai S.: Best differential characteristic search of FEAL. In: Fast Software Encryption\u20144th International Workshop, FSE \u201997, Haifa, Israel, January 20\u201322, 1997, Proceedings, pp. 41\u201353. (1997).","DOI":"10.1007\/BFb0052333"},{"issue":"1","key":"1571_CR5","doi-asserted-by":"publisher","first-page":"57","DOI":"10.46586\/tosc.v2016.i1.57-70","volume":"2016","author":"T Ashur","year":"2016","unstructured":"Ashur T., Liu Y.: Rotational cryptanalysis in the presence of constants. IACR Trans. Symmetric Cryptol. 2016(1), 57\u201370 (2016).","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"1571_CR6","unstructured":"Aumasson J.-P., Henzen L., Meier W., Phan R.C.-W.: 2014SHA-3 proposal BLAKE. Submission to NIST 92. (2008)."},{"key":"1571_CR7","unstructured":"Beaulieu R., Shors D., Smith J., Treatman-Clark S., Weeks B., Wingers L.: The SIMON and SPECK families of lightweight block ciphers. Cryptology ePrint Archive, Report 2013\/404. (2013). https:\/\/eprint.iacr.org\/2013\/404. Accessed Oct 2023."},{"issue":"S1","key":"1571_CR8","doi-asserted-by":"publisher","first-page":"208","DOI":"10.46586\/tosc.v2020.iS1.208-261","volume":"2020","author":"C Beierle","year":"2020","unstructured":"Beierle C., Biryukov A., dos Santos L.C., Gro\u00dfsch\u00e4dl J., Perrin L., Udovenko A., Velichkov V., Wang Q.: Lightweight AEAD and hashing using the sparkle permutation family. IACR Trans. Symmetric Cryptol. 2020(S1), 208\u2013261 (2020).","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"1571_CR9","first-page":"268","volume":"2023","author":"E Bellini","year":"2023","unstructured":"Bellini E., De Piccoli A., Formenti M., Gerault D., Huynh P., Pelizzola S., Polese S., Visconti A.: Differential cryptanalysis with SAT, SMT, MILP, and CP: a detailed comparison for bit-oriented primitives. CANS 2023, 268\u2013292 (2023).","journal-title":"CANS"},{"key":"1571_CR10","unstructured":"Bernstein D.J.: Chacha, a variant of salsa20. workshop record of SASC, 8:3-5. (2008). https:\/\/cr.yp.to\/chacha\/chacha-20080128.pdf. Accessed Oct 2023."},{"key":"1571_CR11","doi-asserted-by":"crossref","unstructured":"Bernstein D.J.: The salsa20 family of stream ciphers. In: Robshaw M.J.B., Billet O. (eds.) New Stream Cipher Designs\u2014The eSTREAM Finalists, pp. 84\u201397. (2008).","DOI":"10.1007\/978-3-540-68351-3_8"},{"key":"1571_CR12","unstructured":"Chen Y., Bao Z., Yu H.: Differential-linear approximation semi-unconstrained searching and partition tree: Application to lea and speck. Cryptology ePrint Archive, Report 2023\/1414. (2023). https:\/\/eprint.iacr.org\/2023\/1414. Accessed Jan 2024."},{"issue":"6","key":"1571_CR13","first-page":"704","volume":"6","author":"T Cui","year":"2019","unstructured":"Cui T., Wang M., Fan Y., Kai H., Yong F., Huang L.: Ballet: a software-friendly block cipher. J. Cryptol. Res. 6(6), 704\u2013712 (2019).","journal-title":"J. Cryptol. Res."},{"key":"1571_CR14","doi-asserted-by":"crossref","unstructured":"Dinu D., Perrin L., Udovenko A., Velichkov V., Gro\u00dfsch\u00e4dl J., Biryukov A.: Design strategies for ARX with provable bounds: Sparx and LAX. In: Advances in Cryptology\u2014ASIACRYPT 2016\u201422nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4\u20138, 2016, Proceedings, Part I, pp. 484\u2013513. (2016).","DOI":"10.1007\/978-3-662-53887-6_18"},{"key":"1571_CR15","unstructured":"Ferguson N., Lucks S., Schneier B., Whiting D., Bellare M., Kohno T., Callas J., Walker J.: The skein hash function family. Submission to NIST (round 3), 7(7.5):3. (2010)."},{"key":"1571_CR16","doi-asserted-by":"crossref","unstructured":"Fu K., Wang M., Guo Y., Sun S., Hu L.: Milp-based automatic search algorithms for differential and linear trails for speck. In: Fast Software Encryption\u201423rd International Conference, FSE 2016, Bochum, Germany, March 20\u201323, 2016, Revised Selected Papers, pp. 268\u2013288. (2016).","DOI":"10.1007\/978-3-662-52993-5_14"},{"key":"1571_CR17","doi-asserted-by":"crossref","unstructured":"Hong D., Lee J.-K., Kim D.-C., Kwon D., Ryu K.H., Lee D.: LEA: A 128-bit block cipher for fast encryption on common processors. In: Information Security Applications\u201414th International Workshop, WISA 2013, Jeju Island, Korea, August 19\u201321, 2013, Revised Selected Papers, pp. 3\u201327. (2013).","DOI":"10.1007\/978-3-319-05149-9_1"},{"key":"1571_CR18","doi-asserted-by":"crossref","unstructured":"Hong D., Sung J., Hong S., Lim J., Lee S., Koo B., Lee C., Chang D., Lee J., Jeong K., Kim H., Kim J., Chee S.: HIGHT: a new block cipher suitable for low-resource device. In: Cryptographic Hardware and Embedded Systems\u2014CHES 2006, 8th International Workshop, Yokohama, Japan, October 10\u201313, 2006, Proceedings, pp. 46\u201359. (2006).","DOI":"10.1007\/11894063_4"},{"key":"1571_CR19","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/4898612","author":"M Huang","year":"2020","unstructured":"Huang M., Wang L.: Automatic search for the linear (hull) characteristics of ARX ciphers: applied to speck, sparx, chaskey, and CHAM-64. Secur. Commun. Netw. (2020). https:\/\/doi.org\/10.1155\/2020\/4898612.","journal-title":"Secur. Commun. Netw."},{"issue":"12","key":"1571_CR20","doi-asserted-by":"publisher","first-page":"3062","DOI":"10.1093\/comjnl\/bxab126","volume":"65","author":"M Huang","year":"2022","unstructured":"Huang M., Zhen X., Wang L.: On the probability and automatic search of rotational-xor cryptanalysis on ARX ciphers. Comput. J. 65(12), 3062\u20133080 (2022).","journal-title":"Comput. J."},{"key":"1571_CR21","doi-asserted-by":"crossref","unstructured":"Khovratovich D., Nikolic I., Pieprzyk J., Sokolowski P., Steinfeld R.: Rotational cryptanalysis of ARX revisited. In: Gregor L. (ed.) Fast Software Encryption\u201422nd International Workshop, FSE 2015, Istanbul, Turkey, March 8\u201311, 2015, Revised Selected Papers, pp. 519\u2013536. (2015).","DOI":"10.1007\/978-3-662-48116-5_25"},{"key":"1571_CR22","doi-asserted-by":"crossref","unstructured":"Khovratovich D., Nikolic I.: Rotational cryptanalysis of ARX. In: Seokhie H., Tetsu I. (eds.) Fast Software Encryption, 17th International Workshop, FSE 2010, Seoul, Korea, February 7\u201310, 2010, Revised Selected Papers, pp. 333\u2013346. (2010).","DOI":"10.1007\/978-3-642-13858-4_19"},{"key":"1571_CR23","unstructured":"Lee H., Kang H., Hong D., Sung J., Hong S.: New impossible differential characteristic of speck64 using milp. Cryptology ePrint Archive, Report 2016\/1137. (2016). https:\/\/eprint.iacr.org\/2016\/1137. Accessed Nov 2023."},{"key":"1571_CR24","doi-asserted-by":"crossref","unstructured":"Lipmaa H., Moriai S.: Efficient algorithms for computing differential properties of addition. In: Fast Software Encryption, 8th International Workshop, FSE 2001 Yokohama, Japan, April 2\u20134, 2001, Revised Papers, pp. 336\u2013350. (2001).","DOI":"10.1007\/3-540-45473-X_28"},{"issue":"3","key":"1571_CR25","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1016\/j.ipl.2015.11.005","volume":"116","author":"Yu Liu","year":"2016","unstructured":"Liu Yu., Kai F., Wang W., Sun L., Wang M.: Linear cryptanalysis of reduced-round SPECK. Inf. Process. Lett. 116(3), 259\u2013266 (2016).","journal-title":"Inf. Process. Lett."},{"issue":"3","key":"1571_CR26","doi-asserted-by":"publisher","first-page":"24","DOI":"10.46586\/tosc.v2017.i3.24-36","volume":"2017","author":"Y Liu","year":"2017","unstructured":"Liu Y., De Witte G., Ranea A., Ashur T.: Rotational-xor cryptanalysis of reduced-round SPECK. IACR Trans. Symmetric Cryptol. 2017(3), 24\u201336 (2017).","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"1571_CR27","unstructured":"Lv G., Jin C., Cui T.: A miqcp-based automatic search algorithm for differential-linear trails of arx ciphers(long paper). Cryptology ePrint Archive, Report 2023\/259. (2023). https:\/\/eprint.iacr.org\/2023\/259. Accessed Jan 2024."},{"key":"1571_CR28","unstructured":"Matsui M.: On correlation between the order of s-boxes and the strength of DES. In: Advances in Cryptology\u2014EUROCRYPT \u201994, Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, May 9\u201312, 1994, Proceedings, pp. 366\u2013375. (1994)."},{"key":"1571_CR29","unstructured":"Mouha N., Preneel B.: Towards finding optimal differential characteristics for arx: application to salsa20. Cryptology ePrint Archive, Report 2013\/328. (2013). https:\/\/eprint.iacr.org\/2013\/328. Accessed Oct 2023."},{"key":"1571_CR30","doi-asserted-by":"crossref","unstructured":"Mouha N., Wang Q., Gu D., Preneel B.: Differential and linear cryptanalysis using mixed-integer linear programming. In: Information Security and Cryptology\u20147th International Conference, Inscrypt 2011, Beijing, China, November 30\u2013December 3, 2011. Revised Selected Papers, pp. 57\u201376. (2011).","DOI":"10.1007\/978-3-642-34704-7_5"},{"key":"1571_CR31","doi-asserted-by":"crossref","unstructured":"Ohta K., Moriai S., Aoki K.: Improving the search algorithm for the best linear expression. In: Advances in Cryptology\u2014CRYPTO \u201995, 15th Annual International Cryptology Conference, Santa Barbara, California, USA, August 27\u201331, 1995, Proceedings, pp. 157\u2013170. (1995).","DOI":"10.1007\/3-540-44750-4_13"},{"key":"1571_CR32","doi-asserted-by":"crossref","unstructured":"Roh D., Koo B., Jung Y., Jeong I., Lee D., Kwon D.: Revised version of block cipher CHAM. In: Information Security and Cryptology\u2014ICISC 2019\u201422th International Conference, Seoul, South Korea, December 4\u20136, 2019, Revised Selected Papers, pp. 1\u201319. (2019).","DOI":"10.1007\/978-3-030-40921-0_1"},{"issue":"9","key":"1571_CR33","doi-asserted-by":"publisher","first-page":"2113","DOI":"10.1007\/s10623-021-00904-5","volume":"89","author":"S Sadeghi","year":"2021","unstructured":"Sadeghi S., Rijmen V., Bagheri N.: Proposing an milp-based method for the experimental verification of difference-based trails: application to SPECK, SIMECK. Des. Codes Cryptogr. 89(9), 2113\u20132155 (2021).","journal-title":"Des. Codes Cryptogr."},{"key":"1571_CR34","doi-asserted-by":"crossref","unstructured":"Sinz C.: Towards an optimal CNF encoding of boolean cardinality constraints. In: Principles and Practice of Constraint Programming\u2014CP 2005, 11th International Conference, CP 2005, Sitges, Spain, October 1\u20135, 2005, Proceedings, pp. 827\u2013831. (2005).","DOI":"10.1007\/11564751_73"},{"issue":"1","key":"1571_CR35","doi-asserted-by":"publisher","first-page":"269","DOI":"10.46586\/tosc.v2021.i1.269-315","volume":"2021","author":"L Sun","year":"2021","unstructured":"Sun L., Wang W., Wang M.: Accelerating the search of differential and linear characteristics with the SAT method. IACR Trans. Symmetric Cryptol. 2021(1), 269\u2013315 (2021).","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"1571_CR36","doi-asserted-by":"publisher","first-page":"3603","DOI":"10.1007\/s10623-023-01259-9","volume":"91","author":"S Wang","year":"2023","unstructured":"Wang S., Feng D., Bin H., Guan J., Shi T., Zhang K.: New method for combining Matsui\u2019s bounding conditions with sequential encoding method. Des. Codes Cryptogr. 91, 3603\u20133642 (2023).","journal-title":"Des. Codes Cryptogr."},{"key":"1571_CR37","doi-asserted-by":"crossref","unstructured":"Zhang Y., Sun S., Cai J., Hu L.: Speeding up MILP aided differential characteristic search with matsui\u2019s strategy. In: Information Security - 21st International Conference, ISC 2018, Guildford, UK, September 9\u201312, 2018, Proceedings, pp. 101\u2013115. (2018).","DOI":"10.1007\/978-3-319-99136-8_6"},{"key":"1571_CR38","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/2193543","author":"D Zhou","year":"2021","unstructured":"Zhou D., Chen H., Zong R., Song N.: Zero-correlation linear cryptanalysis on SPARX-64. J. Sens. (2021). https:\/\/doi.org\/10.1155\/2021\/2193543.","journal-title":"J. Sens."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-025-01571-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10623-025-01571-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-025-01571-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:55:16Z","timestamp":1750276516000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10623-025-01571-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,5]]},"references-count":38,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["1571"],"URL":"https:\/\/doi.org\/10.1007\/s10623-025-01571-6","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"type":"print","value":"0925-1022"},{"type":"electronic","value":"1573-7586"}],"subject":[],"published":{"date-parts":[[2025,2,5]]},"assertion":[{"value":"6 February 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 December 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 January 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 February 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}