{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T09:04:02Z","timestamp":1765357442053,"version":"3.37.3"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2023,9,4]],"date-time":"2023-09-04T00:00:00Z","timestamp":1693785600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,9,4]],"date-time":"2023-09-04T00:00:00Z","timestamp":1693785600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072207","61902195"],"award-info":[{"award-number":["62072207","61902195"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"DOI":"10.1007\/s11128-023-04098-8","type":"journal-article","created":{"date-parts":[[2023,9,4]],"date-time":"2023-09-04T05:01:29Z","timestamp":1693803689000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Quantum key recovery attacks on tweakable Even\u2013Mansour ciphers"],"prefix":"10.1007","volume":"22","author":[{"given":"Ping","family":"Zhang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9557-5100","authenticated-orcid":false,"given":"Yiyuan","family":"Luo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,4]]},"reference":[{"key":"4098_CR1","doi-asserted-by":"publisher","unstructured":"Cogliati, B., Lampe, R., Seurin, Y.: Tweaking Even\u2013Mansour ciphers. In: Gennaro, R., Robshaw, M. (eds.) Advances in Cryptology\u2014CRYPTO 2015\u201435th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part I. Lecture Notes in Computer Science, vol. 9215, pp. 189\u2013208. Springer (2015). https:\/\/doi.org\/10.1007\/978-3-662-47989-6_9","DOI":"10.1007\/978-3-662-47989-6_9"},{"issue":"12","key":"4098_CR2","doi-asserted-by":"publisher","first-page":"394","DOI":"10.1007\/s11128-021-03322-7","volume":"20","author":"BN Bathe","year":"2021","unstructured":"Bathe, B.N., Anand, R., Dutta, S.: Evaluation of Grover\u2019s algorithm toward quantum cryptanalysis on chacha. Quantum Inf. Process. 20(12), 394 (2021). https:\/\/doi.org\/10.1007\/s11128-021-03322-7","journal-title":"Quantum Inf. Process."},{"key":"4098_CR3","doi-asserted-by":"publisher","unstructured":"Bonnetain, X.: Quantum key-recovery on full AEZ. In: Adams, C., Camenisch, J. (eds.) Selected Areas in Cryptography\u2014SAC 2017\u201424th International Conference, Ottawa, ON, Canada, August 16\u201318, 2017, Revised Selected Papers. Lecture Notes in Computer Science, vol. 10719, pp. 394\u2013406. Springer, Heidelberg (2017). https:\/\/doi.org\/10.1007\/978-3-319-72565-9_20","DOI":"10.1007\/978-3-319-72565-9_20"},{"issue":"2","key":"4098_CR4","doi-asserted-by":"publisher","first-page":"55","DOI":"10.13154\/tosc.v2019.i2.55-93","volume":"2019","author":"X Bonnetain","year":"2019","unstructured":"Bonnetain, X., Naya-Plasencia, M., Schrottenloher, A.: Quantum security analysis of AES. IACR Trans. Symmetric Cryptol. 2019(2), 55\u201393 (2019). https:\/\/doi.org\/10.13154\/tosc.v2019.i2.55-93","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"4098_CR5","doi-asserted-by":"crossref","unstructured":"Cai, B., Gao, F., Leander, G.: Quantum attacks on two-round Even\u2013Mansour. Front. Phys. 979 (2022)","DOI":"10.3389\/fphy.2022.1028014"},{"issue":"3","key":"4098_CR6","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/s11128-021-03027-x","volume":"20","author":"J Cui","year":"2021","unstructured":"Cui, J., Guo, J., Ding, S.: Applications of Simon\u2019s algorithm in quantum attacks on Feistel variants. Quantum Inf. Process. 20(3), 117 (2021). https:\/\/doi.org\/10.1007\/s11128-021-03027-x","journal-title":"Quantum Inf. Process."},{"issue":"4","key":"4098_CR7","doi-asserted-by":"publisher","first-page":"697","DOI":"10.1007\/s00145-015-9207-3","volume":"29","author":"I Dinur","year":"2016","unstructured":"Dinur, I., Dunkelman, O., Keller, N., Shamir, A.: Key recovery attacks on iterated Even\u2013Mansour encryption schemes. J. Cryptol. 29(4), 697\u2013728 (2016). https:\/\/doi.org\/10.1007\/s00145-015-9207-3","journal-title":"J. Cryptol."},{"issue":"6","key":"4098_CR8","doi-asserted-by":"publisher","first-page":"1179","DOI":"10.1007\/s10623-020-00741-y","volume":"88","author":"X Dong","year":"2020","unstructured":"Dong, X., Dong, B., Wang, X.: Quantum attacks on some Feistel block ciphers. Des. Codes Cryptogr. 88(6), 1179\u20131203 (2020). https:\/\/doi.org\/10.1007\/s10623-020-00741-y","journal-title":"Des. Codes Cryptogr."},{"key":"4098_CR9","doi-asserted-by":"publisher","unstructured":"Dong, X., Sun, S., Shi, D., Gao, F., Wang, X., Hu, L.: Quantum collision attacks on aes-like hashing with low quantum random access memories. In: Moriai, S., Wang, H. (eds.) Advances in Cryptology\u2014ASIACRYPT 2020\u201426th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7\u201311, 2020, Proceedings, Part II. Lecture Notes in Computer Science, vol. 12492, pp. 727\u2013757. Springer, Heidelberg (2020). https:\/\/doi.org\/10.1007\/978-3-030-64834-3_25","DOI":"10.1007\/978-3-030-64834-3_25"},{"issue":"10","key":"4098_CR10","doi-asserted-by":"publisher","first-page":"102501","DOI":"10.1007\/s11432-017-9468-y","volume":"61","author":"X Dong","year":"2018","unstructured":"Dong, X., Wang, X.: Quantum key-recovery attack on Feistel structures. Sci. China Inf. Sci. 61(10), 102501\u201311025017 (2018). https:\/\/doi.org\/10.1007\/s11432-017-9468-y","journal-title":"Sci. China Inf. Sci."},{"issue":"1","key":"4098_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s00145-013-9164-7","volume":"28","author":"O Dunkelman","year":"2015","unstructured":"Dunkelman, O., Keller, N., Shamir, A.: Slidex attacks on the Even\u2013Mansour encryption scheme. J. Cryptol. 28(1), 1\u201328 (2015). https:\/\/doi.org\/10.1007\/s00145-013-9164-7","journal-title":"J. Cryptol."},{"key":"4098_CR12","doi-asserted-by":"publisher","unstructured":"Grover, L.K.: A fast quantum mechanical algorithm for database search. In: Miller, G.L. (ed.) Proceedings of the 28th Annual ACM Symposium on the Theory of Computing, Philadelphia, Pennsylvania, USA, May 22\u201324, 1996, pp. 212\u2013219. ACM, New York (1996). https:\/\/doi.org\/10.1145\/237814.237866","DOI":"10.1145\/237814.237866"},{"key":"4098_CR13","doi-asserted-by":"publisher","unstructured":"Guo, T., Wang, P., Hu, L., Ye, D.: Attacks on beyond-birthday-bound macs in the quantum setting. In: Cheon, J.H., Tillich, J. (eds.) Post-Quantum Cryptography - 12th International Workshop, PQCrypto 2021, Daejeon, South Korea, July 20\u201322, 2021, Proceedings. Lecture Notes in Computer Science, vol. 12841, pp. 421\u2013441. Springer, Heidelberg (2021). https:\/\/doi.org\/10.1007\/978-3-030-81293-5_22","DOI":"10.1007\/978-3-030-81293-5_22"},{"issue":"2","key":"4098_CR14","doi-asserted-by":"publisher","first-page":"288","DOI":"10.13154\/tosc.v2016.i2.288-306","volume":"2016","author":"Z Guo","year":"2016","unstructured":"Guo, Z., Wu, W., Liu, R., Zhang, L.: Multi-key analysis of tweakable Even\u2013Mansour with applications to minalpher and OPP. IACR Trans. Symmetric Cryptol. 2016(2), 288\u2013306 (2016). https:\/\/doi.org\/10.13154\/tosc.v2016.i2.288-306","journal-title":"IACR Trans. Symmetric Cryptol."},{"issue":"1 &2","key":"4098_CR15","doi-asserted-by":"publisher","first-page":"65","DOI":"10.26421\/QIC20.1-2-4","volume":"20","author":"X Hao","year":"2020","unstructured":"Hao, X., Zhang, F., Wei, Y., Zhou, Y.: Quantum period finding based on the Bernstein\u2013Vazirani algorithm. Quantum Inf. Comput. 20(1 &2), 65\u201384 (2020). https:\/\/doi.org\/10.26421\/QIC20.1-2-4","journal-title":"Quantum Inf. Comput."},{"issue":"15","key":"4098_CR16","doi-asserted-by":"publisher","first-page":"150502","DOI":"10.1103\/PhysRevLett.103.150502","volume":"103","author":"AW Harrow","year":"2009","unstructured":"Harrow, A.W., Hassidim, A., Lloyd, S.: Quantum algorithm for linear systems of equations. Phys. Rev. Lett. 103(15), 150502 (2009)","journal-title":"Phys. Rev. Lett."},{"key":"4098_CR17","doi-asserted-by":"publisher","unstructured":"Hirose, S., Naito, Y., Sugawara, T.: Output masking of tweakable Even\u2013Mansour can be eliminated for message authentication code. In: Avanzi, R., Heys, H.M. (eds.) Selected Areas in Cryptography\u2014SAC 2016\u201423rd International Conference, St. John\u2019s, NL, Canada, August 10\u201312, 2016, Revised Selected Papers. Lecture Notes in Computer Science, vol. 10532, pp. 341\u2013359. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-319-69453-5_19","DOI":"10.1007\/978-3-319-69453-5_19"},{"key":"4098_CR18","doi-asserted-by":"publisher","unstructured":"Hosoyamada, A., Aoki, K.: On quantum related-key attacks on iterated Even\u2013Mansour ciphers. In: Obana, S., Chida, K. (eds.) Advances in Information and Computer Security\u201412th International Workshop on Security, IWSEC 2017, Hiroshima, Japan, August 30\u2013September 1, 2017, Proceedings. Lecture Notes in Computer Science, vol. 10418, pp. 3\u201318. Springer, Heidelberg (2017). https:\/\/doi.org\/10.1007\/978-3-319-64200-0_1","DOI":"10.1007\/978-3-319-64200-0_1"},{"issue":"1","key":"4098_CR19","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1587\/transfun.E102.A.27","volume":"102\u2013A","author":"A Hosoyamada","year":"2019","unstructured":"Hosoyamada, A., Aoki, K.: On quantum related-key attacks on iterated Even\u2013Mansour ciphers. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102\u2013A(1), 27\u201334 (2019). https:\/\/doi.org\/10.1587\/transfun.E102.A.27","journal-title":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci."},{"issue":"1","key":"4098_CR20","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1587\/transfun.E102.A.27","volume":"102\u2013A","author":"A Hosoyamada","year":"2019","unstructured":"Hosoyamada, A., Aoki, K.: On quantum related-key attacks on iterated Even\u2013Mansour ciphers. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102\u2013A(1), 27\u201334 (2019). https:\/\/doi.org\/10.1587\/transfun.E102.A.27","journal-title":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci."},{"key":"4098_CR21","doi-asserted-by":"publisher","unstructured":"Hosoyamada, A., Iwata, T.: 4-round Luby-Rackoff construction is a QPRP. In: Galbraith, S.D., Moriai, S. (eds.) Advances in Cryptology\u2014ASIACRYPT 2019\u201425th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8\u201312, 2019, Proceedings, Part I. Lecture Notes in Computer Science, vol. 11921, pp. 145\u2013174. Springer, Heidelberg (2019). https:\/\/doi.org\/10.1007\/978-3-030-34578-5_6","DOI":"10.1007\/978-3-030-34578-5_6"},{"issue":"1","key":"4098_CR22","doi-asserted-by":"publisher","first-page":"337","DOI":"10.46586\/tosc.v2021.i1.337-377","volume":"2021","author":"A Hosoyamada","year":"2021","unstructured":"Hosoyamada, A., Iwata, T.: Provably quantum-secure tweakable block ciphers. IACR Trans. Symmetric Cryptol. 2021(1), 337\u2013377 (2021). https:\/\/doi.org\/10.46586\/tosc.v2021.i1.337-377","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"4098_CR23","doi-asserted-by":"publisher","unstructured":"Hosoyamada, A., Sasaki, Y.: Quantum collision attacks on reduced SHA-256 and SHA-512. In: Malkin, T., Peikert, C. (eds.) Advances in Cryptology\u2014CRYPTO 2021\u201441st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16\u201320, 2021, Proceedings, Part I. Lecture Notes in Computer Science, vol. 12825, pp. 616\u2013646. Springer, Heidelberg (2021). https:\/\/doi.org\/10.1007\/978-3-030-84242-0_22","DOI":"10.1007\/978-3-030-84242-0_22"},{"key":"4098_CR24","doi-asserted-by":"publisher","unstructured":"Ito, G., Hosoyamada, A., Matsumoto, R., Sasaki, Y., Iwata, T.: Quantum chosen-ciphertext attacks against Feistel ciphers. In: Matsui, M. (ed.) Topics in Cryptology\u2014CT-RSA 2019\u2014The Cryptographers\u2019 Track at the RSA Conference 2019, San Francisco, CA, USA, March 4\u20138, 2019, Proceedings. Lecture Notes in Computer Science, vol. 11405, pp. 391\u2013411. Springer, Heidelberg (2019). https:\/\/doi.org\/10.1007\/978-3-030-12612-4_20","DOI":"10.1007\/978-3-030-12612-4_20"},{"key":"4098_CR25","doi-asserted-by":"publisher","unstructured":"Kaplan, M., Leurent, G., Leverrier, A., Naya-Plasencia, M.: Breaking symmetric cryptosystems using quantum period finding. In: Robshaw, M., Katz, J. (eds.) Advances in Cryptology\u2014CRYPTO 2016\u201436th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14\u201318, 2016, Proceedings, Part II. Lecture Notes in Computer Science, vol. 9815, pp. 207\u2013237. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53008-5_8","DOI":"10.1007\/978-3-662-53008-5_8"},{"key":"4098_CR26","doi-asserted-by":"publisher","unstructured":"Kuwakado, H., Morii, M.: Quantum distinguisher between the 3-round Feistel cipher and the random permutation. In: IEEE International Symposium on Information Theory, ISIT 2010, June 13\u201318, 2010, Austin, Texas, USA, Proceedings, pp. 2682\u20132685. IEEE, Piscataway (2010). https:\/\/doi.org\/10.1109\/ISIT.2010.5513654","DOI":"10.1109\/ISIT.2010.5513654"},{"key":"4098_CR27","unstructured":"Kuwakado, H., Morii, M.: Security on the quantum-type Even\u2013Mansour cipher. In: Proceedings of the International Symposium on Information Theory and Its Applications, ISITA 2012, Honolulu, HI, USA, October 28-31, 2012, pp. 312\u2013316. Springer, Heidelberg (2012). https:\/\/ieeexplore.ieee.org\/document\/6400943\/"},{"issue":"4","key":"4098_CR28","doi-asserted-by":"publisher","first-page":"71","DOI":"10.46586\/tosc.v2020.i4.71-87","volume":"2020","author":"H Kim","year":"2020","unstructured":"Kim, H., Lee, Y., Lee, J.: Forking tweakable Even\u2013Mansour ciphers. IACR Trans. Symmetric Cryptol. 2020(4), 71\u201387 (2020). https:\/\/doi.org\/10.46586\/tosc.v2020.i4.71-87","journal-title":"IACR Trans. Symmetric Cryptol."},{"issue":"10","key":"4098_CR29","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/s11128-021-03275-x","volume":"20","author":"W Liu","year":"2021","unstructured":"Liu, W., Gao, J.: Quantum security of grain-128\/grain-128a stream cipher against HHL algorithm. Quantum Inf. Process. 20(10), 343 (2021). https:\/\/doi.org\/10.1007\/s11128-021-03275-x","journal-title":"Quantum Inf. Process."},{"key":"4098_CR30","doi-asserted-by":"publisher","first-page":"108122","DOI":"10.1016\/j.compeleceng.2022.108122","volume":"101","author":"AK Malviya","year":"2022","unstructured":"Malviya, A.K., Tiwari, N., Chawla, M.: Quantum cryptanalytic attacks of symmetric ciphers: a review. Comput. Electr. Eng. 101, 108122 (2022). https:\/\/doi.org\/10.1016\/j.compeleceng.2022.108122","journal-title":"Comput. Electr. Eng."},{"issue":"5","key":"4098_CR31","doi-asserted-by":"publisher","first-page":"859","DOI":"10.1007\/s10623-021-00850-2","volume":"89","author":"B Mennink","year":"2021","unstructured":"Mennink, B., Neves, S.: On the resilience of Even\u2013Mansour to invariant permutations. Des. Codes Cryptogr. 89(5), 859\u2013893 (2021). https:\/\/doi.org\/10.1007\/s10623-021-00850-2","journal-title":"Des. Codes Cryptogr."},{"issue":"1","key":"4098_CR32","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1007\/s11128-022-03774-5","volume":"22","author":"J Nan","year":"2023","unstructured":"Nan, J., Hu, H., Zhang, P., Luo, Y.: Quantum attacks against BBB secure PRFS or macs built from public random permutations. Quantum Inf. Process. 22(1), 26 (2023). https:\/\/doi.org\/10.1007\/s11128-022-03774-5","journal-title":"Quantum Inf. Process."},{"issue":"5","key":"4098_CR33","doi-asserted-by":"publisher","first-page":"1474","DOI":"10.1137\/S0097539796298637","volume":"26","author":"DR Simon","year":"1997","unstructured":"Simon, D.R.: On the power of quantum computation. SIAM J. Comput. 26(5), 1474\u20131483 (1997). https:\/\/doi.org\/10.1137\/S0097539796298637","journal-title":"SIAM J. Comput."},{"issue":"1","key":"4098_CR34","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1007\/s11128-022-03752-x","volume":"22","author":"H Sun","year":"2023","unstructured":"Sun, H., Wei, C., Cai, B., Qin, S., Wen, Q., Gao, F.: Improved BV-based quantum attack on block ciphers. Quantum Inf. Process. 22(1), 9 (2023). https:\/\/doi.org\/10.1007\/s11128-022-03752-x","journal-title":"Quantum Inf. Process."},{"key":"4098_CR35","doi-asserted-by":"publisher","unstructured":"Wang, Z., Wei, S., Long, G., Hanzo, L.: Variational quantum attacks threaten advanced encryption standard based symmetric cryptography. Sci. China Inf. Sci. 65(10), (2022). https:\/\/doi.org\/10.1007\/s11432-022-3511-5","DOI":"10.1007\/s11432-022-3511-5"},{"issue":"5","key":"4098_CR36","doi-asserted-by":"publisher","first-page":"1161","DOI":"10.1007\/s10623-018-0510-5","volume":"87","author":"H Xie","year":"2019","unstructured":"Xie, H., Yang, L.: Using bernstein-vazirani algorithm to attack block ciphers. Des. Codes Cryptogr. 87(5), 1161\u20131182 (2019). https:\/\/doi.org\/10.1007\/s10623-018-0510-5","journal-title":"Des. Codes Cryptogr."},{"issue":"8","key":"4098_CR37","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1007\/s11128-020-02741-2","volume":"19","author":"H Xie","year":"2020","unstructured":"Xie, H., Yang, L.: A quantum related-key attack based on the Bernstein\u2013Vazirani algorithm. Quantum Inf. Process. 19(8), 240 (2020). https:\/\/doi.org\/10.1007\/s11128-020-02741-2","journal-title":"Quantum Inf. Process."},{"issue":"4","key":"4098_CR38","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/s11128-021-03036-w","volume":"20","author":"Y Xu","year":"2021","unstructured":"Xu, Y., Liu, W., Yu, W.: Quantum forgery attacks on copa, AES-COPA and marble authenticated encryption algorithms. Quantum Inf. Process. 20(4), 131 (2021). https:\/\/doi.org\/10.1007\/s11128-021-03036-w","journal-title":"Quantum Inf. Process."},{"issue":"10","key":"4098_CR39","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1007\/s11128-021-03256-0","volume":"20","author":"B Zhou","year":"2021","unstructured":"Zhou, B., Yuan, Z.: Quantum key-recovery attack on Feistel constructions: Bernstein\u2013Vazirani meet grover algorithm. Quantum Inf. Process. 20(10), 330 (2021). https:\/\/doi.org\/10.1007\/s11128-021-03256-0","journal-title":"Quantum Inf. Process."},{"key":"4098_CR40","doi-asserted-by":"publisher","unstructured":"Leander, G., May, A.: Grover meets simon\u2014quantumly attacking the fx-construction. In: Takagi, T., Peyrin, T. (eds.) Advances in Cryptology\u2014ASIACRYPT 2017\u201423rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3\u20137, 2017, Proceedings, Part II. Lecture Notes in Computer Science, vol. 10625, pp. 161\u2013178. Springer, Heidelberg (2017). https:\/\/doi.org\/10.1007\/978-3-319-70697-9_6","DOI":"10.1007\/978-3-319-70697-9_6"},{"key":"4098_CR41","doi-asserted-by":"publisher","unstructured":"Alagic, G., Bai, C., Katz, J., Majenz, C.: Post-quantum security of the Even\u2013Mansour cipher. In: Dunkelman, O., Dziembowski, S. (eds.) Advances in Cryptology\u2014EUROCRYPT 2022\u201441st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30\u2013June 3, 2022, Proceedings, Part III. Lecture Notes in Computer Science, vol. 13277, pp. 458\u2013487. Springer, Heidelberg (2022). https:\/\/doi.org\/10.1007\/978-3-031-07082-2_17","DOI":"10.1007\/978-3-031-07082-2_17"},{"key":"4098_CR42","doi-asserted-by":"publisher","first-page":"106172","DOI":"10.1016\/j.ipl.2021.106172","volume":"173","author":"K Shinagawa","year":"2022","unstructured":"Shinagawa, K., Iwata, T.: Quantum attacks on sum of Even\u2013Mansour pseudorandom functions. Inf. Process. Lett. 173, 106172 (2022). https:\/\/doi.org\/10.1016\/j.ipl.2021.106172","journal-title":"Inf. Process. Lett."},{"issue":"2","key":"4098_CR43","doi-asserted-by":"publisher","first-page":"153","DOI":"10.3390\/e24020153","volume":"24","author":"P Zhang","year":"2022","unstructured":"Zhang, P.: Quantum attacks on sum of Even\u2013Mansour construction with linear key schedules. Entropy 24(2), 153 (2022). https:\/\/doi.org\/10.3390\/e24020153","journal-title":"Entropy"},{"issue":"3","key":"4098_CR44","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/s001459900025","volume":"10","author":"S Even","year":"1997","unstructured":"Even, S., Mansour, Y.: A construction of a cipher from a single pseudorandom permutation. J. Cryptol. 10(3), 151\u2013162 (1997). https:\/\/doi.org\/10.1007\/s001459900025","journal-title":"J. Cryptol."},{"key":"4098_CR45","doi-asserted-by":"publisher","unstructured":"Chen, S., Lampe, R., Lee, J., Seurin, Y., Steinberger, J.P.: Minimizing the two-round even-mansour cipher. In: Garay, J.A., Gennaro, R. (eds.) Advances in Cryptology\u2014CRYPTO 2014\u201434th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17\u201321, 2014, Proceedings, Part I. Lecture Notes in Computer Science, vol. 8616, pp. 39\u201356. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-44371-2_3","DOI":"10.1007\/978-3-662-44371-2_3"},{"issue":"2","key":"4098_CR46","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1145\/261342.261346","volume":"28","author":"G Brassard","year":"1997","unstructured":"Brassard, G., H\u00f8yer, P., Tapp, A.: Quantum cryptanalysis of hash and claw-free functions. SIGACT News 28(2), 14\u201319 (1997). https:\/\/doi.org\/10.1145\/261342.261346","journal-title":"SIGACT News"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-023-04098-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-023-04098-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-023-04098-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,9]],"date-time":"2023-10-09T08:34:27Z","timestamp":1696840467000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-023-04098-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,4]]},"references-count":46,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2023,9]]}},"alternative-id":["4098"],"URL":"https:\/\/doi.org\/10.1007\/s11128-023-04098-8","relation":{},"ISSN":["1573-1332"],"issn-type":[{"type":"electronic","value":"1573-1332"}],"subject":[],"published":{"date-parts":[[2023,9,4]]},"assertion":[{"value":"8 May 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 August 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 September 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no conflicts of interest to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"336"}}