{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,3]],"date-time":"2025-10-03T13:07:47Z","timestamp":1759496867347,"version":"3.37.3"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2021,3,24]],"date-time":"2021-03-24T00:00:00Z","timestamp":1616544000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,3,24]],"date-time":"2021-03-24T00:00:00Z","timestamp":1616544000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100010909","name":"Young Scientists Fund","doi-asserted-by":"publisher","award":["61702212"],"award-info":[{"award-number":["61702212"]}],"id":[{"id":"10.13039\/501100010909","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2021,10]]},"DOI":"10.1007\/s11227-021-03703-w","type":"journal-article","created":{"date-parts":[[2021,3,24]],"date-time":"2021-03-24T21:02:50Z","timestamp":1616619770000},"page":"11460-11480","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A CPU-GPU-based parallel search algorithm for the best differential characteristics of block ciphers"],"prefix":"10.1007","volume":"77","author":[{"given":"Pei","family":"Li","sequence":"first","affiliation":[]},{"given":"Shihao","family":"Zhou","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9033-2575","authenticated-orcid":false,"given":"Jiageng","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,24]]},"reference":[{"key":"3703_CR1","doi-asserted-by":"crossref","unstructured":"Biham E, Shamir A (1990) Differential cryptanalysis of des-like cryptosystems. In: A.\u00a0Menezes, S.A. Vanstone (eds.) Advances in Cryptology\u2014CRYPTO \u201990, 10th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings, Lecture Notes in Computer Science, vol. 537, pp. 2\u201321. Springer","DOI":"10.1007\/3-540-38424-3_1"},{"key":"3703_CR2","doi-asserted-by":"crossref","unstructured":"Biham E, Shamir A (1992) Differential cryptanalysis of the full 16-round des. In: E.F. Brickell (ed.) Advances in Cryptology\u2014CRYPTO\u201992, 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings, Lecture Notes in Computer Science, vol. 740, pp. 487\u2013496. Springer","DOI":"10.1007\/3-540-48071-4_34"},{"key":"3703_CR3","doi-asserted-by":"crossref","unstructured":"Biryukov A, Nikolic I (2010) Automatic search for related-key differential characteristics in byte-oriented block ciphers: Application to aes, camellia, khazad and others. In: H.\u00a0Gilbert (ed.) Advances in Cryptology\u2014EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco \/ French Riviera, May 30\u2014June 3, 2010. Proceedings, Lecture Notes in Computer Science, vol. 6110, pp. 322\u2013344. Springer","DOI":"10.1007\/978-3-642-13190-5_17"},{"key":"3703_CR4","doi-asserted-by":"crossref","unstructured":"Biryukov A, Velichkov V (2014) Automatic search for differential trails in ARX ciphers. In: J.\u00a0Benaloh (ed.) Topics in Cryptology\u2014CT-RSA 2014\u2014The Cryptographer\u2019s Track at the RSA Conference 2014, San Francisco, CA, USA, February 25-28, 2014. Proceedings, Lecture Notes in Computer Science, vol. 8366, pp. 227\u2013250. Springer","DOI":"10.1007\/978-3-319-04852-9_12"},{"key":"3703_CR5","doi-asserted-by":"crossref","unstructured":"Bogdanov A, Knudsen LR, Leander G, Paar C, Poschmann A, Robshaw MJB, Seurin Y, Vikkelsoe C (2007) PRESENT: an ultra-lightweight block cipher. In: P.\u00a0Paillier, I.\u00a0Verbauwhede (eds.) Cryptographic Hardware and Embedded Systems\u2014 CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings, Lecture Notes in Computer Science, vol. 4727, pp. 450\u2013466. Springer","DOI":"10.1007\/978-3-540-74735-2_31"},{"key":"3703_CR6","doi-asserted-by":"crossref","unstructured":"Carneiro T, Muritiba AEF, Negreiros M, de\u00a0Campos GAL (2011) A new parallel schema for branch-and-bound algorithms using GPGPU. In: J.L. Gaudiot, A.C.M.A. Melo, A.F.D. Souza, L.\u00a0Catabriga (eds.) 23rd International Symposium on Computer Architecture and High Performance Computing, SBAC-PAD 2011, Vit\u00f3ria, Esp\u00edrito Santo, Brazil, October 26-29, 2011, pp. 41\u201347. IEEE Computer Society","DOI":"10.1109\/SBAC-PAD.2011.20"},{"key":"3703_CR7","doi-asserted-by":"crossref","unstructured":"Chakroun I, Melab N (2013) Operator-level gpu-accelerated branch and bound algorithms. In: V.N. Alexandrov, M.\u00a0Lees, V.V. Krzhizhanovskaya, J.J. Dongarra, P.M.A. Sloot (eds.) Proceedings of the International Conference on Computational Science, ICCS 2013, Barcelona, Spain, 5-7 June, 2013, Procedia Computer Science, vol.\u00a018, pp. 280\u2013289. Elsevier","DOI":"10.1016\/j.procs.2013.05.191"},{"key":"3703_CR8","doi-asserted-by":"crossref","unstructured":"Chen J, Miyaji A, Su C, Teh J (2015) Improved differential characteristic searching methods. In: IEEE 2nd International Conference on Cyber Security and Cloud Computing, CSCloud 2015, New York, NY, USA, November 3-5, 2015, pp. 500\u2013508. IEEE Computer Society","DOI":"10.1109\/CSCloud.2015.42"},{"issue":"4","key":"3703_CR9","first-page":"644","volume":"18","author":"K Chen","year":"2016","unstructured":"Chen K, Tang X, Xu P, Guo M, Qiu W, Gong Z (2016) An improved automatic search method for differential trails in TEA cipher. Int. J. Netw. Secur. 18(4):644\u2013649","journal-title":"Int. J. Netw. Secur."},{"key":"3703_CR10","first-page":"102565","volume":"55","author":"Z Chen","year":"2020","unstructured":"Chen Z, Chen J, Meng W, Teh JS, Li P, Ren B (2020) Analysis of differential distribution of lightweight block cipher based on parallel processing on GPU. J. Inf. Secur. Appl. 55:102565","journal-title":"J. Inf. Secur. Appl."},{"key":"3703_CR11","unstructured":"Gaster BR, abd David R.\u00a0Kaeli LH, Mistry P, Schaa D (2013) Heterogeneous Computing with OpenCL (Second Edition). Morgan Kaufmann"},{"key":"3703_CR12","volume-title":"Parallel Processing and Applied Mathematics\u201411th International Conference, PPAM 2015, Krakow, Poland, September 6\u20139, 2015","author":"J Gmys","year":"2015","unstructured":"Gmys J, Mezmaz M, Melab N, Tuyttens D (2015) Ivm-based work stealing for parallel branch-and-bound on GPU. In: Wyrzykowski R, Deelman E, Dongarra JJ, Karczewski K, Kitowski J, Wiatr K (eds) Parallel Processing and Applied Mathematics\u201411th International Conference, PPAM 2015, Krakow, Poland, September 6\u20139, 2015. Revised Selected Papers, Part I, Lecture Notes in Computer Science Springer"},{"key":"3703_CR13","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1016\/j.parco.2016.01.008","volume":"59","author":"J Gmys","year":"2016","unstructured":"Gmys J, Mezmaz M, Melab N, Tuyttens D (2016) A gpu-based branch-and-bound algorithm using integer-vector-matrix data structure. Parallel Comput. 59:119\u2013139","journal-title":"Parallel Comput."},{"key":"3703_CR14","doi-asserted-by":"crossref","unstructured":"Harpes C, Kramer GG, Massey JL (1995) A generalization of linear cryptanalysis and the applicability of matsui\u2019s piling-up lemma. In: L.C. Guillou, J.\u00a0Quisquater (eds.) Advances in Cryptology\u2014EUROCRYPT \u201995, International Conference on the Theory and Application of Cryptographic Techniques, Saint-Malo, France, May 21-25, 1995, Proceeding, Lecture Notes in Computer Science, vol. 921, pp. 24\u201338. Springer","DOI":"10.1007\/3-540-49264-X_3"},{"key":"3703_CR15","doi-asserted-by":"crossref","unstructured":"Knudsen LR, Leander G (2011) PRESENT\u2014 block cipher. In: H.C.A. van Tilborg, S.\u00a0Jajodia (eds.) Encyclopedia of Cryptography and Security, 2nd Ed, pp. 953\u2013955. Springer","DOI":"10.1007\/978-1-4419-5906-5_605"},{"key":"3703_CR16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17342-4","volume-title":"The Block Cipher Companion","author":"LR Knudsen","year":"2011","unstructured":"Knudsen LR, Robshaw M (2011) The Block Cipher Companion. Springer, Information Security and Cryptography"},{"key":"3703_CR17","doi-asserted-by":"crossref","unstructured":"Lalami ME, Baz DE (2012) Gpu implementation of the branch and bound method for knapsack problems. In: 26th IEEE International Parallel and Distributed Processing Symposium Workshops & PhD Forum, IPDPS 2012, Shanghai, China, May 21-25, 2012, pp. 1769\u20131777. IEEE Computer Society","DOI":"10.1109\/IPDPSW.2012.219"},{"key":"3703_CR18","doi-asserted-by":"crossref","unstructured":"Lin L, Wu W, Zheng Y (2017) Improved automatic search tool for related-key differential characteristics on byte-oriented block ciphers. In: P.Q. Nguyen, J.\u00a0Zhou (eds.) Information Security\u201420th International Conference, ISC 2017, Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedings, Lecture Notes in Computer Science, vol. 10599, pp. 58\u201376. Springer","DOI":"10.1007\/978-3-319-69659-1_4"},{"key":"3703_CR19","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1007\/BFb0053451","volume-title":"Advances in Cryptology\u2014EUROCRYPT\u201994","author":"M Matsui","year":"1995","unstructured":"Matsui M (1995) On correlation between the order of s-boxes and the strength of des. In: De Santis A (ed) Advances in Cryptology\u2014EUROCRYPT\u201994. Springer, Berlin Heidelberg, Berlin, Heidelberg, pp 366\u2013375"},{"key":"3703_CR20","volume-title":"CUDA Programming: A Developer\u2019s Guide to Parallel Computing with GPUs","author":"C Shane","year":"2012","unstructured":"Shane C (2012) CUDA Programming: A Developer\u2019s Guide to Parallel Computing with GPUs, 1st edn. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA","edition":"1"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-021-03703-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-021-03703-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-021-03703-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,8]],"date-time":"2021-09-08T09:21:12Z","timestamp":1631092872000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-021-03703-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,24]]},"references-count":20,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2021,10]]}},"alternative-id":["3703"],"URL":"https:\/\/doi.org\/10.1007\/s11227-021-03703-w","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"type":"print","value":"0920-8542"},{"type":"electronic","value":"1573-0484"}],"subject":[],"published":{"date-parts":[[2021,3,24]]},"assertion":[{"value":"21 February 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 March 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}