{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:29:47Z","timestamp":1772119787207,"version":"3.50.1"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T00:00:00Z","timestamp":1762300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T00:00:00Z","timestamp":1762300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"the Science and Technology on Communication Security Laboratory Foundation","award":["No.6142103012207"],"award-info":[{"award-number":["No.6142103012207"]}]},{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["No. 62272147"],"award-info":[{"award-number":["No. 62272147"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"the Natural Science Foundation of Hubei Province of China","award":["No.2024AFB573"],"award-info":[{"award-number":["No.2024AFB573"]}]},{"name":"the innovation group project of the Natural Science Foundation of Hubei Province of China","award":["No.2023AFA021"],"award-info":[{"award-number":["No.2023AFA021"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"DOI":"10.1007\/s11128-025-04975-4","type":"journal-article","created":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T14:22:50Z","timestamp":1762352570000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Quantum cryptanalysis on Feistel variants in related-key settings"],"prefix":"10.1007","volume":"24","author":[{"given":"Xiaoyu","family":"Wang","sequence":"first","affiliation":[]},{"given":"Siwei","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Zejun","family":"Xiang","sequence":"additional","affiliation":[]},{"given":"Shasha","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xiangyong","family":"Zeng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,5]]},"reference":[{"issue":"5","key":"4975_CR1","doi-asserted-by":"publisher","first-page":"1484","DOI":"10.1137\/S0097539795293172","volume":"26","author":"PW Shor","year":"1997","unstructured":"Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26(5), 1484\u20131509 (1997)","journal-title":"SIAM J. Comput."},{"key":"4975_CR2","doi-asserted-by":"crossref","unstructured":"Grover, L.K.: A fast quantum mechanical algorithm for database search. In: Miller, G.L. (ed.) Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, Philadelphia, Pennsylvania, USA, May 22\u201324, 1996, pp. 212\u2013219. ACM, New York (1996)","DOI":"10.1145\/237814.237866"},{"issue":"5","key":"4975_CR3","doi-asserted-by":"publisher","first-page":"1474","DOI":"10.1137\/S0097539796298637","volume":"26","author":"DR Simon","year":"1997","unstructured":"Simon, D.R.: On the power of quantum computation. SIAM J. Comput. 26(5), 1474\u20131483 (1997)","journal-title":"SIAM J. Comput."},{"key":"4975_CR4","doi-asserted-by":"crossref","unstructured":"Kuwakado, H., Morii, M.: Quantum distinguisher between the 3-round Feistel cipher and the random permutation. In: IEEE International Symposium on Information Theory, ISIT 2010, June 13\u201318, 2010, Austin, Texas, USA, Proceedings, pp. 2682\u20132685. IEEE, Piscataway (2010)","DOI":"10.1109\/ISIT.2010.5513654"},{"issue":"8","key":"4975_CR5","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/s11128-022-03642-2","volume":"21","author":"R Shi","year":"2022","unstructured":"Shi, R., Xie, H., Feng, H., Yuan, F., Liu, B.: Quantum zero correlation linear cryptanalysis. Quantum Inf. Process. 21(8), 293 (2022)","journal-title":"Quantum Inf. Process."},{"key":"4975_CR6","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/978-981-99-8727-6_11","volume-title":"Advances in Cryptology\u2013ASIACRYPT 2023","author":"A Hosoyamada","year":"2023","unstructured":"Hosoyamada, A.: Quantum speed-up for multidimensional (zero correlation) linear distinguishers. In: Guo, J., Steinfeld, R. (eds.) Advances in Cryptology\u2013ASIACRYPT 2023, vol. 14440, pp. 311\u2013345. Springer, Singapore (2023)"},{"issue":"6","key":"4975_CR7","doi-asserted-by":"publisher","first-page":"1179","DOI":"10.1007\/s10623-020-00741-y","volume":"88","author":"X Dong","year":"2020","unstructured":"Dong, X., Dong, B., Wang, X.: Quantum attacks on some Feistel block ciphers. Des. Codes Cryptogr. 88(6), 1179\u20131203 (2020)","journal-title":"Des. Codes Cryptogr."},{"key":"4975_CR8","unstructured":"Kuwakado, H., Morii, M.: Security on the quantum-type Even-Mansour cipher. In: Proceedings of the International Symposium on Information Theory and Its Applications, ISITA 2012, Honolulu, HI, USA, October 28\u201331, 2012, pp. 312\u2013316. IEEE, Piscataway (2012)"},{"key":"4975_CR9","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/978-3-662-53008-5_8","volume-title":"Advances in Cryptology\u2013CRYPTO 2016","author":"M Kaplan","year":"2016","unstructured":"Kaplan, M., Leurent, G., Leverrier, A., Naya-Plasencia, M.: Breaking symmetric cryptosystems using quantum period finding. In: Robshaw, M., Katz, J. (eds.) Advances in Cryptology\u2013CRYPTO 2016, vol. 9815, pp. 207\u2013237. Springer, Berlin, Heidelberg (2016)"},{"key":"4975_CR10","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/978-3-319-70697-9_6","volume-title":"Advances in Cryptology\u2013ASIACRYPT 2017","author":"G Leander","year":"2017","unstructured":"Leander, G., May, A.: Grover meets Simon\u2013quantumly attacking the FX construction. In: Takagi, T., Peyrin, T. (eds.) Advances in Cryptology\u2013ASIACRYPT 2017, vol. 10625, pp. 161\u2013178. Springer, Cham (2017)"},{"issue":"10","key":"4975_CR11","doi-asserted-by":"publisher","first-page":"102501","DOI":"10.1007\/s11432-017-9468-y","volume":"61","author":"X Dong","year":"2018","unstructured":"Dong, X., Wang, X.: Quantum key-recovery attack on Feistel structures. Sci. China Inf. Sci. 61(10), 102501\u201311025017 (2018)","journal-title":"Sci. China Inf. Sci."},{"issue":"3","key":"4975_CR12","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1007\/s11128-023-03877-7","volume":"22","author":"W Liu","year":"2023","unstructured":"Liu, W., Wang, M., Li, Z.: Quantum all-subkeys-recovery attacks on 6-round Feistel-2* structure based on multi-equations quantum claw finding. Quantum Inf. Process. 22(3), 142 (2023)","journal-title":"Quantum Inf. Process."},{"issue":"1 &2","key":"4975_CR13","first-page":"65","volume":"17","author":"T Santoli","year":"2017","unstructured":"Santoli, T., Schaffner, C.: Using Simon\u2019s algorithm to attack symmetric-key cryptographic primitives. Quantum Inf. Comput. 17(1 &2), 65\u201378 (2017)","journal-title":"Quantum Inf. Comput."},{"issue":"3","key":"4975_CR14","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/s11128-021-03027-x","volume":"20","author":"J Cui","year":"2021","unstructured":"Cui, J., Guo, J., Ding, S.: Applications of Simon\u2019s algorithm in quantum attacks on Feistel variants. Quantum Inf. Process. 20(3), 117 (2021)","journal-title":"Quantum Inf. Process."},{"key":"4975_CR15","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1007\/978-3-030-92062-3_15","volume-title":"Advances in Cryptology\u2013ASIACRYPT 2021","author":"X Bonnetain","year":"2021","unstructured":"Bonnetain, X., Leurent, G., Naya-Plasencia, M., Schrottenloher, A.: Quantum linearization attacks. In: Tibouchi, M., Wang, H. (eds.) Advances in Cryptology\u2013ASIACRYPT 2021, vol. 13090, pp. 422\u2013452. Springer, Cham (2021)"},{"key":"4975_CR16","doi-asserted-by":"publisher","first-page":"779","DOI":"10.1007\/978-3-031-15982-4_26","volume-title":"Advances in Cryptology\u2013CRYPTO 2022","author":"F Canale","year":"2022","unstructured":"Canale, F., Leander, G., Stennes, L.: Simon\u2019s algorithm and symmetric crypto: generalizations and automatized applications. In: Dodis, Y., Shrimpton, T. (eds.) Advances in Cryptology\u2013CRYPTO 2022, vol. 13509, pp. 779\u2013808. Springer, Cham (2022)"},{"issue":"2","key":"4975_CR17","doi-asserted-by":"publisher","first-page":"296","DOI":"10.46586\/tosc.v2024.i2.296-321","volume":"2024","author":"Z Xiang","year":"2018","unstructured":"Xiang, Z., Wang, X., Yu, B., Sun, B., Zhang, S., Zeng, X., Shen, X., Li, N.: Links between quantum distinguishers based on Simon\u2019s algorithm and truncated differentials. IACR Trans. Symmetric Cryptol. 2024(2), 296\u2013321 (2018)","journal-title":"IACR Trans. Symmetric Cryptol."},{"issue":"11","key":"4975_CR18","doi-asserted-by":"publisher","first-page":"1545","DOI":"10.1109\/PROC.1975.10005","volume":"63","author":"H Feistel","year":"1975","unstructured":"Feistel, H., Notz, W.A., Smith, J.L.: Some cryptographic techniques for machine-to-machine data communications. Proc. IEEE 63(11), 1545\u20131554 (1975)","journal-title":"Proc. IEEE"},{"key":"4975_CR19","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1007\/978-3-030-12612-4_20","volume-title":"Topics in Cryptology\u2013CT-RSA 2019","author":"G Ito","year":"2019","unstructured":"Ito, G., Hosoyamada, A., Matsumoto, R., Sasaki, Y., Iwata, T.: Quantum chosen-ciphertext attacks against Feistel ciphers. In: Matsui, M. (ed.) Topics in Cryptology\u2013CT-RSA 2019, vol. 11405, pp. 391\u2013411. Springer, Cham (2019)"},{"issue":"2","key":"4975_CR20","doi-asserted-by":"publisher","first-page":"22501","DOI":"10.1007\/s11432-017-9436-7","volume":"62","author":"X Dong","year":"2019","unstructured":"Dong, X., Li, Z., Wang, X.: Quantum cryptanalysis on some generalized Feistel schemes. Sci. China Inf. Sci. 62(2), 22501\u201312250112 (2019)","journal-title":"Sci. China Inf. Sci."},{"key":"4975_CR21","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1007\/978-3-030-35423-7_22","volume-title":"Progress in Cryptology\u2013INDOCRYPT 2019","author":"B Ni","year":"2019","unstructured":"Ni, B., Ito, G., Dong, X., Iwata, T.: Quantum attacks against type-1 generalized Feistel ciphers and applications to CAST-256. In: Hao, F., Ruj, S., Gupta, S.S. (eds.) Progress in Cryptology\u2013INDOCRYPT 2019, vol. 11898, pp. 433\u2013455. Springer, Cham (2019)"},{"key":"4975_CR22","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1007\/978-3-030-44223-1_25","volume-title":"Post-Quantum Cryptography","author":"S Hodzic","year":"2020","unstructured":"Hodzic, S., Knudsen, L.R., Kidmose, A.B.: On quantum distinguishers for type-3 generalized Feistel network based on separability. In: Ding, J., Tillich, J. (eds.) Post-Quantum Cryptography, vol. 12100, pp. 461\u2013480. Springer, Cham (2020)"},{"issue":"2","key":"4975_CR23","doi-asserted-by":"publisher","first-page":"209","DOI":"10.23919\/cje.2021.00.294","volume":"32","author":"Z Zhang","year":"2023","unstructured":"Zhang, Z., Wu, W., Sui, H., Wang, B.: Quantum attacks on type-3 generalized Feistel scheme and unbalanced Feistel scheme with expanding functions. Chin. J. Electron. 32(2), 209\u2013216 (2023)","journal-title":"Chin. J. Electron."},{"issue":"11","key":"4975_CR24","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1007\/s11128-020-02929-6","volume":"19","author":"S Hodzic","year":"2020","unstructured":"Hodzic, S., Knudsen, L.R.: A quantum distinguisher for 7\/8-round SMS4 block cipher. Quantum Inf. Process. 19(11), 411 (2020)","journal-title":"Quantum Inf. Process."},{"key":"4975_CR25","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1007\/978-3-030-65277-7_17","volume-title":"Progress in Cryptology\u2013INDOCRYPT 2020","author":"C Cid","year":"2020","unstructured":"Cid, C., Hosoyamada, A., Liu, Y., Sim, S.M.: Quantum cryptanalysis on contracting Feistel structures and observation on related-key settings. In: Bhargavan, K., Oswald, E., Prabhakaran, M. (eds.) Progress in Cryptology\u2013INDOCRYPT 2020, vol. 12578, pp. 373\u2013394. Springer, Cham (2020)"},{"issue":"4","key":"4975_CR26","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/BF00203965","volume":"7","author":"E Biham","year":"1994","unstructured":"Biham, E.: New types of cryptanalytic attacks using related keys. J. Cryptol. 7(4), 229\u2013246 (1994)","journal-title":"J. Cryptol."},{"issue":"1","key":"4975_CR27","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1080\/0161-118791861749","volume":"11","author":"RS Winternitz","year":"1987","unstructured":"Winternitz, R.S., Hellman, M.E.: Chosen-key attacks on a block cipher. Cryptologia 11(1), 16\u201320 (1987)","journal-title":"Cryptologia"},{"issue":"1","key":"4975_CR28","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1016\/j.ipl.2014.08.009","volume":"115","author":"M R\u00f6tteler","year":"2015","unstructured":"R\u00f6tteler, M., Steinwandt, R.: A note on quantum related-key attacks. Inf. Process. Lett. 115(1), 40\u201344 (2015)","journal-title":"Inf. Process. Lett."},{"key":"4975_CR29","doi-asserted-by":"crossref","unstructured":"Hosoyamada, A., Aoki, K.: On quantum related-key attacks on iterated Even-Mansour ciphers. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102\u2013A(1), 27\u201334 (2019)","DOI":"10.1587\/transfun.E102.A.27"},{"issue":"8","key":"4975_CR30","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1007\/s11128-020-02741-2","volume":"19","author":"H Xie","year":"2020","unstructured":"Xie, H., Yang, L.: A quantum related-key attack based on the Bernstein-Vazirani algorithm. Quantum Inf. Process. 19(8), 240 (2020)","journal-title":"Quantum Inf. Process."},{"issue":"5","key":"4975_CR31","doi-asserted-by":"publisher","first-page":"1411","DOI":"10.1137\/S0097539796300921","volume":"26","author":"E Bernstein","year":"1997","unstructured":"Bernstein, E., Vazirani, U.: Quantum complexity theory. SIAM J. Comput. 26(5), 1411\u20131473 (1997)","journal-title":"SIAM J. Comput."},{"issue":"1","key":"4975_CR32","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1007\/s11128-022-03752-x","volume":"22","author":"H Sun","year":"2023","unstructured":"Sun, H., Wei, C., Cai, B., Qin, S., Wen, Q., Gao, F.: Improved BV-based quantum attack on block ciphers. Quantum Inf. Process. 22(1), 9 (2023)","journal-title":"Quantum Inf. Process."},{"key":"4975_CR33","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/978-3-031-88661-4_5","volume-title":"Topics in Cryptology\u2013CT-RSA 2025","author":"X Wang","year":"2025","unstructured":"Wang, X., Xiang, Z., Zhang, S., Chen, S., Zeng, X.: Quantum chosen-ciphertext attacks based on Simon\u2019s algorithm against unified structures. In: Patra, A. (ed.) Topics in Cryptology\u2013CT-RSA 2025, pp. 99\u2013122. Springer, Cham (2025)"},{"issue":"10","key":"4975_CR34","doi-asserted-by":"publisher","first-page":"2300155","DOI":"10.1002\/qute.202300155","volume":"6","author":"H-W Sun","year":"2023","unstructured":"Sun, H.-W., Cai, B.-B., Qin, S.-J., Wen, Q.-Y., Gao, F.: Quantum attacks on type-1 generalized Feistel schemes. Adv. Quantum Technol. 6(10), 2300155 (2023)","journal-title":"Adv. Quantum Technol."},{"key":"4975_CR35","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1007\/3-540-60590-8_16","volume-title":"Fast Software Encryption","author":"LR Knudsen","year":"1994","unstructured":"Knudsen, L.R.: Truncated and higher order differentials. In: Preneel, B. (ed.) Fast Software Encryption, vol. 1008, pp. 196\u2013211. Springer, Berlin, Heidelberg (1994)"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-025-04975-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-025-04975-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-025-04975-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T11:18:07Z","timestamp":1764415087000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-025-04975-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,5]]},"references-count":35,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2025,11]]}},"alternative-id":["4975"],"URL":"https:\/\/doi.org\/10.1007\/s11128-025-04975-4","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-4699945\/v1","asserted-by":"object"}]},"ISSN":["1573-1332"],"issn-type":[{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,5]]},"assertion":[{"value":"7 July 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 October 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 November 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"362"}}