{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T00:47:23Z","timestamp":1776127643678,"version":"3.50.1"},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,3,1]],"date-time":"2021-03-01T00:00:00Z","timestamp":1614556800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,3,1]],"date-time":"2021-03-01T00:00:00Z","timestamp":1614556800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2021,3]]},"DOI":"10.1007\/s11128-021-03027-x","type":"journal-article","created":{"date-parts":[[2021,3,19]],"date-time":"2021-03-19T10:15:57Z","timestamp":1616148957000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["Applications of Simon\u2019s algorithm in quantum attacks on Feistel variants"],"prefix":"10.1007","volume":"20","author":[{"given":"Jingyi","family":"Cui","sequence":"first","affiliation":[]},{"given":"Jiansheng","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Shuzhen","family":"Ding","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,19]]},"reference":[{"issue":"1","key":"3027_CR1","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/s10623-015-0157-4","volume":"78","author":"A Broadbent","year":"2016","unstructured":"Broadbent, A., Schaffner, C.: Quantum cryptography beyond quantum key distribution. Des. Codes Crypt. 78(1), 351\u2013382 (2016)","journal-title":"Des. Codes Crypt."},{"key":"3027_CR2","doi-asserted-by":"crossref","unstructured":"Hosoyamada, A., Sasaki, Y.: Quantum Demiric-Sel\u00e7uk meet-in-the-middle attacks: applications to 6-round generic Feistel constructions. In: International Conference on Security and Cryptography for Networks, pp. 386\u2013403 (2018)","DOI":"10.1007\/978-3-319-98113-0_21"},{"key":"3027_CR3","doi-asserted-by":"crossref","unstructured":"Canteaut, A., Duval, S., Leurent, G., Naya-Plasencia, M., Perrin, L., Pornin, T., Schrottenloher, A.: Saturnin: a suite of lightweight symmetric algorithms for post-quantum security. https:\/\/csrc.nist.gov\/CSRC\/media\/Projects\/Lightweight-Cryptography\/documents\/round-1\/spec-doc\/SATURNIN-spec.pdf (2019). Accessed 19 May 2019","DOI":"10.46586\/tosc.v2020.iS1.160-207"},{"key":"3027_CR4","doi-asserted-by":"crossref","unstructured":"Bonnetain, X.: Quantum key-recovery on full AEZ. In: SAC 2017, pp. 394\u2013406 (2017)","DOI":"10.1007\/978-3-319-72565-9_20"},{"key":"3027_CR5","doi-asserted-by":"crossref","unstructured":"Hosoyamada, A., Sasaki, Y.: Cryptanalysis against symmetric-key schemes with online classical queries and offline quantum computations. In: RSA 2018, pp. 198\u2013218 (2018)","DOI":"10.1007\/978-3-319-76953-0_11"},{"key":"3027_CR6","unstructured":"Mossayebi, S.: A concrete security treatment of symmetric encryption in a quantum computing world. Ph.D. Thesis, The University of London (2015)"},{"key":"3027_CR7","doi-asserted-by":"crossref","unstructured":"Boneh, D., Dagdelen, \u00d6., Fischlin, M., Lehmann, A., Schaffner, C., Zhandry, M.: Random oracles in a quantum world. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 41\u201369 (2011)","DOI":"10.1007\/978-3-642-25385-0_3"},{"key":"3027_CR8","doi-asserted-by":"crossref","unstructured":"Kaplan, M., Leurent, G., Leverrier, A., Naya-Plasencia, M.: Breaking symmetric cryptosystems using quantum period finding. In: CRYPTO 2016, pp. 207\u2013237 (2016)","DOI":"10.1007\/978-3-662-53008-5_8"},{"key":"3027_CR9","doi-asserted-by":"crossref","unstructured":"Zhandry, M.: How to construct quantum random functions. In: 53rd Annual IEEE Symposium on Foundations of Computer Science, pp. 679\u2013687 (2012)","DOI":"10.1109\/FOCS.2012.37"},{"key":"3027_CR10","doi-asserted-by":"crossref","unstructured":"Damg\u00e5rd, I., Funder, J., Nielsen, J. B., Salvail, L.: Superposition attacks on cryptographic protocols. In: ICITS 2013, pp. 142\u2013161 (2013)","DOI":"10.1007\/978-3-319-04268-8_9"},{"key":"3027_CR11","doi-asserted-by":"crossref","unstructured":"Boneh, D., Zhandry, M.: Secure signatures and chosen ciphertext security in a quantum computing world. In: CRYPTO 2013, pp. 361\u2013379 (2013)","DOI":"10.1007\/978-3-642-40084-1_21"},{"key":"3027_CR12","doi-asserted-by":"crossref","unstructured":"Boneh, D., Zhandry, M.: Quantum-secure message authentication codes. In: EUROCRYPT 2013, pp. 592\u2013608 (2013)","DOI":"10.1007\/978-3-642-38348-9_35"},{"issue":"5","key":"3027_CR13","doi-asserted-by":"publisher","first-page":"1474","DOI":"10.1137\/S0097539796298637","volume":"26","author":"DR Simon","year":"1997","unstructured":"Simon, D.R.: On the power of quantum computation. SIAM J. Comput. 26(5), 1474\u20131483 (1997)","journal-title":"SIAM J. Comput."},{"key":"3027_CR14","doi-asserted-by":"crossref","unstructured":"Kuwakado, H., Morii, M.: Quantum distinguisher between the 3-round Feistel cipher and the random permutation. In: IEEE International Symposium on Information Theory, pp. 2682\u20132685 (2010)","DOI":"10.1109\/ISIT.2010.5513654"},{"key":"3027_CR15","unstructured":"Kuwakado, H., Morii, M.: Security on the quantum-type Even-Mansour cipher. In: International Symposium on Information Theory and its Applications, pp. 312\u2013316 (2012)"},{"key":"3027_CR16","unstructured":"Dong, X., Dong, B., Wang, X.: Quantum attacks on some Feistel block ciphers. https:\/\/eprint.iacr.org\/2018\/504.pdf (2018). Accessed 19 May 2019"},{"key":"3027_CR17","doi-asserted-by":"crossref","unstructured":"Bonnetain, X., Naya-Plasencia, M., Schrottenloher, A.: On quantum slide attacks. In: SAC 2019, pp. 492\u2013519 (2019)","DOI":"10.1007\/978-3-030-38471-5_20"},{"key":"3027_CR18","doi-asserted-by":"crossref","unstructured":"Ito, G., Hosoyamada, A., Matsumoto, R., Sasaki, Y., Iwata, T.: Quantum chosen-ciphertext attacks against Feistel ciphers. In: RSA 2019, pp. 391\u2013411 (2019)","DOI":"10.1007\/978-3-030-12612-4_20"},{"issue":"1 & 2","key":"3027_CR19","first-page":"65","volume":"17","author":"T Santoli","year":"2017","unstructured":"Santoli, T., Schaffner, C.: Using Simon\u2019s algorithm to attack symmetric-key cryptographic primitives. Quantum Inf. Comput. 17(1 & 2), 65\u201378 (2017)","journal-title":"Quantum Inf. Comput."},{"issue":"2","key":"3027_CR20","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/CC.2018.8300271","volume":"15","author":"T Shi","year":"2018","unstructured":"Shi, T., Jin, C., Guan, J.: Collision attacks against AEZ-PRF for authenticated encryption AEZ. China Commun. 15(2), 46\u201353 (2018)","journal-title":"China Commun."},{"key":"3027_CR21","unstructured":"Liu F., Liu F.: Universal forgery and key recovery attacks: application to FKS, FKD and Keyak. https:\/\/eprint.iacr.org\/2017\/691.pdf (2017) Accessed 19 May 2019"},{"key":"3027_CR22","unstructured":"Liu F., Liu F.: Universal forgery with birthday paradox: application to blockcipher-based message authentication codes and authenticated encryptions. https:\/\/eprint.iacr.org\/2017\/653.pdf (2017) Accessed 19 May 2019"},{"key":"3027_CR23","unstructured":"Xie, H., Yang, L.: Quantum miss-in-the-middle attack. https:\/\/arxiv.org\/pdf\/1812.08499.pdf (2018) Accessed 20 May 2019"},{"key":"3027_CR24","doi-asserted-by":"crossref","unstructured":"Hosoyamada, A., Aoki, K.: On quantum related-key attacks on iterated Even\u2013Mansour ciphers. In: 12th International Workshop on Security, pp. 3\u201318 (2017)","DOI":"10.1007\/978-3-319-64200-0_1"},{"key":"3027_CR25","doi-asserted-by":"crossref","unstructured":"Leander, G., May, A.: Grover meets Simon-quantumly attacking the FX-construction. In: ASIACRYPT 2017, pp. 161\u2013178 (2017)","DOI":"10.1007\/978-3-319-70697-9_6"},{"key":"3027_CR26","doi-asserted-by":"publisher","first-page":"102501","DOI":"10.1007\/s11432-017-9468-y","volume":"61","author":"X Dong","year":"2018","unstructured":"Dong, X., Wang, X.: Quantum key-recovery attack on Feistel structures. Sci. China Inf. Sci. 61, 102501 (2018)","journal-title":"Sci. China Inf. Sci."},{"key":"3027_CR27","doi-asserted-by":"publisher","first-page":"22501","DOI":"10.1007\/s11432-017-9436-7","volume":"62","author":"X Dong","year":"2019","unstructured":"Dong, X., Li, Z., Wang, X.: Quantum cryptanalysis on some generalized Feistel schemes. Sci. China Inf. Sci. 62, 22501 (2019)","journal-title":"Sci. China Inf. Sci."},{"key":"3027_CR28","doi-asserted-by":"crossref","unstructured":"Ni, B., Dong, X.: Improved quantum attack on type-1 generalized Feistel schemes and its application to CAST-256. https:\/\/eprint.iacr.org\/2019\/318.pdf (2019). Accessed 19 May 2019","DOI":"10.1007\/978-3-030-35423-7_22"},{"key":"3027_CR29","unstructured":"Ito, G., Iwata, T.: Quantum distinguishing attacks against type-1 generalized Feistel ciphers.https:\/\/eprint.iacr.org\/2019\/327.pdf (2019). Accessed 19 May 2019"},{"key":"3027_CR30","doi-asserted-by":"crossref","unstructured":"Bonnetain, X., Naya-Plasencia, M., Schrottenloher, A.: Quantum security analysis of AES. https:\/\/eprint.iacr.org\/2019\/272.pdf (2019). Accessed 19 May 2019","DOI":"10.46586\/tosc.v2019.i2.55-93"},{"key":"3027_CR31","doi-asserted-by":"crossref","unstructured":"Matsui, M.: New block encryption algorithm MISTY. In: FSE 1997, pp. 54\u201368 (1997)","DOI":"10.1007\/BFb0052334"},{"key":"3027_CR32","doi-asserted-by":"crossref","unstructured":"Zheng, Y., Matsumoto, T., Imai, H.: On the construction of block ciphers provably secure and not relying on any unproved hypotheses. In: CRYPTO 1989, pp. 461\u2013480 (1989)","DOI":"10.1007\/0-387-34805-0_42"},{"key":"3027_CR33","doi-asserted-by":"crossref","unstructured":"Adams, C., Gilchrist, J.: The CAST-256 encryption algorithm. https:\/\/www.rfc-editor.org\/info\/rfc2612 (1999). Accessed 20 May 2019","DOI":"10.17487\/rfc2612"},{"key":"3027_CR34","doi-asserted-by":"crossref","unstructured":"Shirai, T., Shibutani, K., Akishita, T., Moriai, S., Iwata, T.: The 128-bit blockcipher CLEFIA (Extended abstract). In: FSE 2007, pp. 181\u2013195 (2007)","DOI":"10.1007\/978-3-540-74619-5_12"},{"key":"3027_CR35","unstructured":"Burwick, C., Coppersmith, D., D\u2019Avignon, E., et\u00a0al.: MARS\u2014a candidate cipher for AES. http:\/\/cryptosoft.de\/docs\/Mars.pdf (1999) Accessed 20 May 2019"},{"key":"3027_CR36","unstructured":"Diffie, W., Ledin, G.: SMS4 encryption algorithm for wireless networks. https:\/\/eprint.iacr.org\/2008\/329.pdf (2008). Accessed 20 May 2019"},{"key":"3027_CR37","unstructured":"National Security Agency: SKIPJACK and KEA algorithm specifications. https:\/\/csrc.nist.gov\/CSRC\/media\/Projects\/Cryptographic-Algorithm-Validation-Program\/documents\/skipjack\/skipjack.pdf (1998). Accessed 20 May 2019"},{"key":"3027_CR38","volume-title":"Handbook of Applied Cryptography","author":"AJ Menezes","year":"1997","unstructured":"Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)"},{"key":"3027_CR39","unstructured":"Alagic, G., Majenz, C., Russell, A., Song, F.: Quantum-secure message authentication via blind-unforgeability. https:\/\/eprint.iacr.org\/2018\/1150.pdf (2018). Accessed 21 May 2019"},{"key":"3027_CR40","unstructured":"Loceff, M.: A course in quantum computing. http:\/\/lapastillaroja.net\/wp-content\/uploads\/2016\/09\/Intro_to_QC_Vol_1_Loceff.pdf (2016). Accessed 5 Jan 2019"},{"key":"3027_CR41","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1090\/conm\/305\/05215","volume":"305","author":"G Brassard","year":"2002","unstructured":"Brassard, G., H\u00f8yer, P., Mosca, M.: Quantum amplitude amplification and estimation. Quantum computation and information: a millennium volume. Contemp. Math. 305, 53\u201374 (2002)","journal-title":"Contemp. Math."},{"key":"3027_CR42","volume-title":"Basic Matrix Theory","author":"LE Fuller","year":"2017","unstructured":"Fuller, L.E.: Basic Matrix Theory. Courier Dover Publications, Mineola (2017)"},{"issue":"3","key":"3027_CR43","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1023\/A:1019991004496","volume":"27","author":"S Murphy","year":"2002","unstructured":"Murphy, S., Robshaw, M.J.B.: Key-dependent S-boxes and differential cryptanalysis. Des. Codes Crypt. 27(3), 229\u2013255 (2002)","journal-title":"Des. Codes Crypt."},{"issue":"3","key":"3027_CR44","first-page":"221","volume":"1","author":"J Daemen","year":"2007","unstructured":"Daemen, J., Rijmen, V.: Probability distributions of correlation and differentials in block ciphers. J. Math. Crypt. 1(3), 221\u2013242 (2007)","journal-title":"J. Math. Crypt."},{"issue":"11","key":"3027_CR45","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1007\/s11128-019-2444-x","volume":"18","author":"TR Shi","year":"2019","unstructured":"Shi, T.R., Jin, C.H., Hu, B., et al.: Complete analysis of Simon\u2019s quantum algorithm with additional collisions. Quantum Inf. Process. 18(11), 334 (2019)","journal-title":"Quantum Inf. Process."},{"issue":"2","key":"3027_CR46","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1137\/0217022","volume":"17","author":"M Luby","year":"1988","unstructured":"Luby, M., Rackoff, C.: How to construct pseudorandom permutations from pseudorandom functions. SIAM J. Comput. 17(2), 373\u2013386 (1988)","journal-title":"SIAM J. Comput."},{"key":"3027_CR47","doi-asserted-by":"crossref","unstructured":"Treger, J., Patarin, J.: Generic attacks on Feistel networks with internal permutations. In: AFRICACRYPT 2009, pp. 41\u201359 (2009)","DOI":"10.1007\/978-3-642-02384-2_4"},{"key":"3027_CR48","doi-asserted-by":"crossref","unstructured":"Gilbert, H., Minier, M.: New results on the pseudorandomness of some blockcipher constructions. In; FSE 2001, pp. 248\u2013266 (2001)","DOI":"10.1007\/3-540-45473-X_21"},{"key":"3027_CR49","doi-asserted-by":"crossref","unstructured":"Moriai, S., Vaudenay, S.: On the pseudorandomness of top-level schemes of block ciphers. In: ASIACRYPT 2000, pp. 289\u2013302 (2000)","DOI":"10.1007\/3-540-44448-3_22"},{"issue":"7","key":"3027_CR50","doi-asserted-by":"publisher","first-page":"1320","DOI":"10.3724\/SP.J.1016.2009.01320","volume":"32","author":"LT Zhang","year":"2009","unstructured":"Zhang, L.T., Wu, W.L.: Pseudorandomness and super pseudorandomness on the unbalanced feistel networks with contracting functions. Chin. J. Comput. 32(7), 1320\u20131330 (2009)","journal-title":"Chin. J. Comput."},{"issue":"3","key":"3027_CR51","first-page":"378","volume":"15","author":"WL Wu","year":"2006","unstructured":"Wu, W.L., Wei, H.R.: Pseudorandomness on the round-structure of Skipjack. Chin. Inst. Electron. 15(3), 378\u2013383 (2006)","journal-title":"Chin. Inst. Electron."},{"key":"3027_CR52","unstructured":"Samajder, S., Sarkar, P.: Another look at success probability in linear cryptanalysis. https:\/\/eprint.iacr.org\/2017\/391.pdf (2017). Accessed 19 May 2019"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-021-03027-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-021-03027-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-021-03027-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,31]],"date-time":"2021-03-31T22:53:56Z","timestamp":1617231236000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-021-03027-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3]]},"references-count":52,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,3]]}},"alternative-id":["3027"],"URL":"https:\/\/doi.org\/10.1007\/s11128-021-03027-x","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3]]},"assertion":[{"value":"23 July 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 February 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 March 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"117"}}