{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T07:51:22Z","timestamp":1772265082685,"version":"3.50.1"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T00:00:00Z","timestamp":1769558400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T00:00:00Z","timestamp":1769558400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072445"],"award-info":[{"award-number":["62072445"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072445"],"award-info":[{"award-number":["62072445"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072445"],"award-info":[{"award-number":["62072445"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072445"],"award-info":[{"award-number":["62072445"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1007\/s10623-025-01750-5","type":"journal-article","created":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T14:26:58Z","timestamp":1769610418000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Research on constructing integral distinguishers for block ciphers via the division property"],"prefix":"10.1007","volume":"94","author":[{"given":"Yu","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Wenling","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Yafei","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yongxia","family":"Mao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,28]]},"reference":[{"key":"1750_CR1","doi-asserted-by":"crossref","unstructured":"Daemen J., Knudsen L., Rijmen V.: The block cipher square. In: Fast Software Encryption: 4th International Workshop, FSE\u201397 Haifa, Israel, January 20\u201322 1997 Proceedings 4, pp. 149\u2013165 (1997). Springer","DOI":"10.1007\/BFb0052343"},{"key":"1750_CR2","doi-asserted-by":"crossref","unstructured":"Knudsen L., Wagner D.: Integral cryptanalysis. In: Fast Software Encryption: 9th International Workshop, FSE 2002 Leuven, Belgium, February 4\u20136, 2002 Revised Papers 9, pp. 112\u2013127 (2002). Springer","DOI":"10.1007\/3-540-45661-9_9"},{"key":"1750_CR3","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E Biham","year":"1991","unstructured":"Biham E., Shamir A.: Differential cryptanalysis of des-like cryptosystems. Journal of CRYPTOLOGY 4, 3\u201372 (1991).","journal-title":"Journal of CRYPTOLOGY"},{"key":"1750_CR4","doi-asserted-by":"crossref","unstructured":"Nyberg K.: Linear approximation of block ciphers. In: Workshop on the Theory and Application of of Cryptographic Techniques, pp. 439\u2013444 (1994). Springer","DOI":"10.1007\/BFb0053460"},{"key":"1750_CR5","doi-asserted-by":"crossref","unstructured":"Z\u2019aba M.R., Raddum H., Henricksen M., Dawson E.: Bit-pattern based integral attack. In: Nyberg, K. (ed.) Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers. Lecture Notes in Computer Science, vol. 5086, pp. 363\u2013381 (2008)","DOI":"10.1007\/978-3-540-71039-4_23"},{"key":"1750_CR6","doi-asserted-by":"crossref","unstructured":"Zhang W., Su B., Wu W., Feng D., Wu C.: Extending higher-order integral: An efficient unified algorithm of constructing integral distinguishers for block ciphers. In: Bao, F., Samarati, P., Zhou, J. (eds.) Applied Cryptography and Network Security - 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings. Lecture Notes in Computer Science, vol. 7341, pp. 117\u2013134 (2012)","DOI":"10.1007\/978-3-642-31284-7_8"},{"key":"1750_CR7","doi-asserted-by":"crossref","unstructured":"Todo Y., Morii M.: Bit-based division property and application to simon family. In: Peyrin, T. (ed.) Fast Software Encryption - 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers. Lecture Notes in Computer Science, vol. 9783, pp. 357\u2013377 (2016)","DOI":"10.1007\/978-3-662-52993-5_18"},{"issue":"10","key":"1750_CR8","doi-asserted-by":"publisher","first-page":"2207","DOI":"10.1007\/S10623-020-00773-4","volume":"88","author":"B Lambin","year":"2020","unstructured":"Lambin B., Derbez P., Fouque P.: Linearly equivalent s-boxes and the division property. Des. Codes Cryptogr. 88(10), 2207\u20132231 (2020). https:\/\/doi.org\/10.1007\/S10623-020-00773-4.","journal-title":"Des. Codes Cryptogr."},{"key":"1750_CR9","doi-asserted-by":"crossref","unstructured":"Xiang Z., Zhang W., Bao Z., Lin D.: Applying MILP method to searching integral distinguishers based on division property for 6 lightweight block ciphers. In: Cheon, J.H., Takagi, T. (eds.) Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I. Lecture Notes in Computer Science, vol. 10031, pp. 648\u2013678 (2016)","DOI":"10.1007\/978-3-662-53887-6_24"},{"issue":"2","key":"1750_CR10","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1049\/iet-ifs.2018.5151","volume":"13","author":"W Zhang","year":"2019","unstructured":"Zhang W., Rijmen V.: Division cryptanalysis of block ciphers with a binary diffusion layer. IET Inf. Secur. 13(2), 87\u201395 (2019).","journal-title":"IET Inf. Secur."},{"issue":"1","key":"1750_CR11","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1049\/iet-ifs.2018.5283","volume":"14","author":"L Sun","year":"2020","unstructured":"Sun L., Wang W., Wang M.: Milp-aided bit-based division property for primitives with non-bit-permutation linear layers. IET Inf. Secur. 14(1), 12\u201320 (2020).","journal-title":"IET Inf. Secur."},{"key":"1750_CR12","doi-asserted-by":"crossref","unstructured":"ElSheikh M., Youssef A.M.: On milp-based automatic search for bit-based division property for ciphers with (large) linear layers. In: Baek, J., Ruj, S. (eds.) Information Security and Privacy - 26th Australasian Conference, ACISP 2021, Virtual Event, December 1-3, 2021, Proceedings. Lecture Notes in Computer Science, vol. 13083, pp. 111\u2013131 (2021)","DOI":"10.1007\/978-3-030-90567-5_6"},{"key":"1750_CR13","doi-asserted-by":"crossref","unstructured":"Hong C., Zhang S., Chen S., Lin D., Xiang Z.: More accurate division property propagations based on optimized implementations of linear layers. In: Yu, Y., Yung, M. (eds.) Information Security and Cryptology - 17th International Conference, Inscrypt 2021, Virtual Event, August 12-14, 2021, Revised Selected Papers. Lecture Notes in Computer Science, vol. 13007, pp. 212\u2013232 (2021)","DOI":"10.1007\/978-3-030-88323-2_11"},{"key":"1750_CR14","doi-asserted-by":"crossref","unstructured":"Kwon D, Kim J., Park S., Sung S.H., Sohn Y., Song J.H., Yeom Y., Yoon E., Lee S., Lee J., Chee S., Han D., Hong J.: New block cipher: ARIA. In: Lim, J.I., Lee, D.H. (eds.) Information Security and Cryptology - ICISC 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers. Lecture Notes in Computer Science, vol. 2971, pp. 432\u2013445 (2003)","DOI":"10.1007\/978-3-540-24691-6_32"},{"key":"1750_CR15","unstructured":"China S.A.: SM4 Block Cipher Algorithm (2016)"},{"issue":"6","key":"1750_CR16","doi-asserted-by":"publisher","first-page":"690","DOI":"10.13868\/j.cnki.jcr.000334","volume":"6","author":"W Wu","year":"2019","unstructured":"Wu W., Zhang L., Zheng Y., Li L.: The block cipher ublock. Journal of Cryptologic Research 6(6), 690\u2013703 (2019). https:\/\/doi.org\/10.13868\/j.cnki.jcr.000334.","journal-title":"Journal of Cryptologic Research"},{"key":"1750_CR17","unstructured":"Daemen J., Rijmen V.: Rijndael for AES. In: The Third Advanced Encryption Standard Candidate Conference, April 13-14, 2000, New York, New York, USA, pp. 343\u2013348 (2000)"},{"issue":"3","key":"1750_CR18","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/s00145-021-09398-9","volume":"34","author":"C Dobraunig","year":"2021","unstructured":"Dobraunig C., Eichlseder M., Mendel F., Schl\u00e4ffer M.: Ascon v1.2: Lightweight authenticated encryption and hashing. J. Cryptol 34(3), 33 (2021).","journal-title":"J. Cryptol"},{"key":"1750_CR19","doi-asserted-by":"publisher","unstructured":"Hebborn P., Lambin B., Leander G., Todo Y.: Lower bounds on the degree of block ciphers. In: Moriai, S., Wang, H. (eds.) Advances in Cryptology - ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part I. Lecture Notes in Computer Science, vol. 12491, pp. 537\u2013566 (2020). https:\/\/doi.org\/10.1007\/978-3-030-64837-4_18","DOI":"10.1007\/978-3-030-64837-4_18"},{"key":"1750_CR20","doi-asserted-by":"publisher","unstructured":"Hebborn P., Lambin B., Leander G., Todo Y.: Strong and tight security guarantees against integral distinguishers. In: Tibouchi, M., Wang, H. (eds.) Advances in Cryptology - ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part I. Lecture Notes in Computer Science, vol. 13090, pp. 362\u2013391 (2021). https:\/\/doi.org\/10.1007\/978-3-030-92062-3_13 .","DOI":"10.1007\/978-3-030-92062-3_13"},{"key":"1750_CR21","doi-asserted-by":"publisher","unstructured":"Banik S., Pandey S.K., Peyrin T., Sasaki Y., Sim S.M., Todo Y.: GIFT: A small present - towards reaching the limit of lightweight encryption. In: Fischer, W., Homma, N. (eds.) Cryptographic Hardware and Embedded Systems - CHES 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings. Lecture Notes in Computer Science, vol. 10529, pp. 321\u2013345 (2017). https:\/\/doi.org\/10.1007\/978-3-319-66787-4_16 .","DOI":"10.1007\/978-3-319-66787-4_16"},{"key":"1750_CR22","doi-asserted-by":"publisher","unstructured":"Beierle C., Jean J., K\u00f6lbl S., Leander G., Moradi A., Peyrin T., Sasaki Y., Sasdrich P., Sim S.M.: The SKINNY family of block ciphers and its low-latency variant MANTIS. In: Robshaw, M., Katz, J. (eds.) Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part II. Lecture Notes in Computer Science, vol. 9815, pp. 123\u2013153 (2016). https:\/\/doi.org\/10.1007\/978-3-662-53008-5_5 .","DOI":"10.1007\/978-3-662-53008-5_5"},{"key":"1750_CR23","doi-asserted-by":"publisher","unstructured":"Eskandari Z., Kidmose A.B., K\u00f6lbl S., Tiessen T.: Finding integral distinguishers with ease. In: Cid, C., Jr., M.J.J. (eds.) Selected Areas in Cryptography - SAC 2018 - 25th International Conference, Calgary, AB, Canada, August 15-17, 2018, Revised Selected Papers, vol. 11349, pp. 115\u2013138 (2018). https:\/\/doi.org\/10.1007\/978-3-030-10970-7_6","DOI":"10.1007\/978-3-030-10970-7_6"},{"issue":"2","key":"1750_CR24","doi-asserted-by":"publisher","first-page":"289","DOI":"10.46586\/TOSC.V2022.I2.289-321","volume":"2022","author":"P Derbez","year":"2022","unstructured":"Derbez P., Lambin B.: Fast MILP models for division property. IACR Trans. Symmetric Cryptol 2022(2), 289\u2013321 (2022). https:\/\/doi.org\/10.46586\/TOSC.V2022.I2.289-321.","journal-title":"Symmetric Cryptol"},{"issue":"6","key":"1750_CR25","first-page":"1197","volume":"10","author":"YX Mao","year":"2023","unstructured":"Mao Y.X., Wu W.L.: Improved integral distinguishers based on division property for sm4 and fox block ciphers. Journal of Cryptologic Research 10(6), 1197\u20131208 (2023).","journal-title":"Journal of Cryptologic Research"},{"issue":"4","key":"1750_CR26","first-page":"1980","volume":"35","author":"M Huang","year":"2024","unstructured":"Huang M., Zhang S., Hong C., Zeng L., Xiang Z.: Milp characterization method for division property propagation in complex linear layers of block ciphers. Journal of Software 35(4), 1980 (2024).","journal-title":"Journal of Software"},{"issue":"1","key":"1750_CR27","doi-asserted-by":"publisher","first-page":"396","DOI":"10.46586\/tosc.v2020.i1.396-424","volume":"2020","author":"K Hu","year":"2020","unstructured":"Hu K., Wang Q., Wang M.: Finding bit-based division property for ciphers with complex linear layers. IACR Trans. Symmetric Cryptol. 2020(1), 396\u2013424 (2020).","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"1750_CR28","doi-asserted-by":"crossref","unstructured":"Derbez P., Fouque P.: Increasing precision of division property. IACR Cryptol. ePrint Arch., 22 (2021)","DOI":"10.46586\/tosc.v2020.i4.173-194"},{"issue":"1","key":"1750_CR29","doi-asserted-by":"publisher","first-page":"5","DOI":"10.13154\/TOSC.V2019.I1.5-45","volume":"2019","author":"C Beierle","year":"2019","unstructured":"Beierle C., Leander G., Moradi A., Rasoolzadeh S.: CRAFT: lightweight tweakable block cipher with efficient protection against DFA attacks. IACR Trans. Symmetric Cryptol 2019(1), 5\u201345 (2019). https:\/\/doi.org\/10.13154\/TOSC.V2019.I1.5-45.","journal-title":"IACR Trans. Symmetric Cryptol"},{"key":"1750_CR30","doi-asserted-by":"crossref","unstructured":"Todo Y.: Structural evaluation by generalized integral property. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 287\u2013314 (2015). Springer","DOI":"10.1007\/978-3-662-46800-5_12"},{"key":"1750_CR31","doi-asserted-by":"crossref","unstructured":"Sun S., Hu L., Wang P.: Automatic security evaluation and (related-key) differential characteristic search: Application to simon, present, lblock, des(l) and other bit-oriented block ciphers. In: Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part I, pp. 158\u2013178 (2014)","DOI":"10.1007\/978-3-662-45611-8_9"},{"key":"1750_CR32","unstructured":"Gurobi Optimization, LLC: Gurobi Optimizer Reference Manual (2023). https:\/\/www.gurobi.com"},{"issue":"4","key":"1750_CR33","doi-asserted-by":"publisher","first-page":"99","DOI":"10.46586\/tosc.v2017.i4.99-129","volume":"2017","author":"A Abdelkhalek","year":"2017","unstructured":"Abdelkhalek A., Sasaki Y., Todo Y.: Milp modeling for (large) s-boxes to optimize probability of differential characteristics. IACR Trans. Symmetric Cryptol. 2017(4), 99\u2013129 (2017).","journal-title":"IACR Trans. Symmetric Cryptol."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-025-01750-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10623-025-01750-5","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-025-01750-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T04:49:41Z","timestamp":1772254181000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10623-025-01750-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,28]]},"references-count":33,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2026,2]]}},"alternative-id":["1750"],"URL":"https:\/\/doi.org\/10.1007\/s10623-025-01750-5","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,28]]},"assertion":[{"value":"21 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 October 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 November 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 January 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"38"}}