{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:38:55Z","timestamp":1740123535785,"version":"3.37.3"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2022,11,2]],"date-time":"2022-11-02T00:00:00Z","timestamp":1667347200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,11,2]],"date-time":"2022-11-02T00:00:00Z","timestamp":1667347200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2023,4]]},"DOI":"10.1007\/s11227-022-04872-y","type":"journal-article","created":{"date-parts":[[2022,11,2]],"date-time":"2022-11-02T19:28:23Z","timestamp":1667417303000},"page":"6252-6289","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A cluster-based practical key recovery attack on reduced-round AES using impossible-differential cryptanalysis"],"prefix":"10.1007","volume":"79","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2593-6679","authenticated-orcid":false,"given":"Debranjan","family":"Pal","sequence":"first","affiliation":[]},{"given":"Md Rasid","family":"Ali","sequence":"additional","affiliation":[]},{"given":"Abhijit","family":"Das","sequence":"additional","affiliation":[]},{"given":"Dipanwita","family":"Roy Chowdhury","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,2]]},"reference":[{"key":"4872_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4613-9314-6","volume-title":"Differential cryptanalysis of the data encryption standard","author":"E Biham","year":"1993","unstructured":"Biham E, Shamir A (1993) Differential cryptanalysis of the data encryption standard. Springer, Berlin, Heidelberg"},{"key":"4872_CR2","unstructured":"Knudsen L (1998) Deal - a 128-bit block cipher. In: NIST AES Proposal"},{"key":"4872_CR3","doi-asserted-by":"publisher","unstructured":"Biham E, Biryukov A, Shamir A (1999) Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials. In: Advances in Cryptology - EUROCRYPT \u201999, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, Proceeding, pp 12\u201323https:\/\/doi.org\/10.1007\/3-540-48910-X_2","DOI":"10.1007\/3-540-48910-X_2"},{"key":"4872_CR4","first-page":"179","volume-title":"Advances in Cryptology - ASIACRYPT 2014","author":"C Boura","year":"2014","unstructured":"Boura C, Naya-Plasencia M, Suder V (2014) Scrutinizing and improving impossible differential attacks: Applications to clefia, camellia, lblock and simon. In: Sarkar P, Iwata T (eds) Advances in Cryptology - ASIACRYPT 2014. Springer, Berlin, Heidelberg, pp 179\u2013199"},{"issue":"1","key":"4872_CR5","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/s00145-016-9251-7","volume":"31","author":"C Boura","year":"2018","unstructured":"Boura C, Lallemand V, Naya-Plasencia M, Suder V (2018) Making the impossible possible. J Cryptol 31(1):101\u2013133. https:\/\/doi.org\/10.1007\/s00145-016-9251-7","journal-title":"J Cryptol"},{"key":"4872_CR6","doi-asserted-by":"publisher","first-page":"7393401","DOI":"10.1155\/2018\/7393401","volume":"2018","author":"Q Yang","year":"2018","unstructured":"Yang Q, Hu L, Shi D, Todo Y, Sun S (2018) On the complexity of impossible differential cryptanalysis. Secur Commun Netw 2018:7393401\u20131739340111. https:\/\/doi.org\/10.1155\/2018\/7393401","journal-title":"Secur Commun Netw"},{"key":"4872_CR7","unstructured":"Biham E, Keller N (2000) Cryptanalysis of reduced variants of rijndael. In: 3rd AES Conference 230"},{"key":"4872_CR8","unstructured":"Gilbert H, Minier M (2000) A Collision Attack on 7 Rounds of Rijndael. In: The Third Advanced Encryption Standard Candidate Conference, April 13-14, New York, New York, USA, pp 230\u2013241"},{"key":"4872_CR9","doi-asserted-by":"publisher","unstructured":"Daemen J, Knudsen LR, Rijmen, V (1997) The block cipher square. In: Biham E (ed.) Fast Software Encryption, 4th international workshop, FSE \u201997, Haifa, Israel, January 20-22, 1997, Proceedings. Lecture Notes in Computer Science, vol 1267, pp 149\u2013165. Springer. https:\/\/doi.org\/10.1007\/BFb0052343","DOI":"10.1007\/BFb0052343"},{"key":"4872_CR10","doi-asserted-by":"publisher","unstructured":"Wagner DA (1999) The boomerang attack. In: Knudsen LR (ed) Fast software encryption, 6th international workshop, FSE \u201999, Rome, Italy, March 24-26, 1999, Proceedings. Lecture Notes in Computer Science, vol 1636, pp 156\u2013170. Springer. https:\/\/doi.org\/10.1007\/3-540-48519-8_12","DOI":"10.1007\/3-540-48519-8_12"},{"key":"4872_CR11","doi-asserted-by":"publisher","unstructured":"Biryukov A (2004). The Boomerang Attack on 5 and 6-Round Reduced AES. In: Dobbertin, H., Rijmen, V., Sowa, A. (eds.) Advanced Encryption Standard - AES, 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited Papers. Lecture Notes in Computer Science, vol 3373, pp 11\u201315. Springer. https:\/\/doi.org\/10.1007\/11506447_2","DOI":"10.1007\/11506447_2"},{"issue":"2","key":"4872_CR12","doi-asserted-by":"publisher","first-page":"133","DOI":"10.46586\/tosc.v2018.i2.133-160","volume":"2018","author":"L Grassi","year":"2018","unstructured":"Grassi L (2018) Mixture differential cryptanalysis: a new approach to distinguishers and attacks on round-reduced AES. IACR Trans Symmetric Cryptol 2018(2):133\u2013160","journal-title":"IACR Trans Symmetric Cryptol"},{"key":"4872_CR13","doi-asserted-by":"publisher","unstructured":"Biham E, Biryukov A, Dunkelman O, Richardson E, Shamir A (1998) Initial observations on skipjack: cryptanalysis of skipjack-3xor. In: Tavares, SE, Meijer H (eds) Selected Areas in Cryptography \u201998, SAC\u201998, Kingston, Ontario, Canada, August 17-18, 1998, Proceedings. Lecture Notes in Computer Science, vol 1556, pp 362\u2013376. Springer. https:\/\/doi.org\/10.1007\/3-540-48892-8_27","DOI":"10.1007\/3-540-48892-8_27"},{"key":"4872_CR14","doi-asserted-by":"publisher","unstructured":"Knudsen LR, Wagner DA (2002) Integral cryptanalysis. In: Daemen J, Rijmen V (eds) Fast Software encryption, 9th international workshop, FSE 2002, Leuven, Belgium, February 4-6, 2002, Revised Papers. Lecture Notes in Computer Science, vol 2365, pp 112\u2013127, Springer. https:\/\/doi.org\/10.1007\/3-540-45661-9_9","DOI":"10.1007\/3-540-45661-9_9"},{"key":"4872_CR15","doi-asserted-by":"publisher","unstructured":"Grassi L, Schofnegger M (2020) Mixture integral attacks on reduced-round AES with a known\/secret s-box. In: Bhargavan K, Oswald E, Prabhakaran M (eds) Progress in Cryptology - INDOCRYPT 2020 - 21st international conference on cryptology in India, Bangalore, India, December 13-16, 2020, Proceedings. Lecture Notes in Computer Science, vol 12578, pp 312\u2013331. https:\/\/doi.org\/10.1007\/978-3-030-65277-7_14","DOI":"10.1007\/978-3-030-65277-7_14"},{"issue":"6","key":"4872_CR16","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/C-M.1977.217750","volume":"10","author":"W Diffie","year":"1977","unstructured":"Diffie W, Hellman ME (1977) Special feature exhaustive cryptanalysis of the NBS data encryption standard. Computer 10(6):74\u201384. https:\/\/doi.org\/10.1109\/C-M.1977.217750","journal-title":"Computer"},{"key":"4872_CR17","doi-asserted-by":"publisher","unstructured":"Demirci H, Taskin I, \u00c7oban M, Baysal A (2009) Improved meet-in-the-middle attacks on AES. In: Roy BK, Sendrier N (eds) Progress in Cryptology - INDOCRYPT 2009, 10th international conference on cryptology in India, New Delhi, India, December 13-16. Proceedings. Lecture Notes in Computer Science, vol 5922, pp 144\u2013156. Springer. https:\/\/doi.org\/10.1007\/978-3-642-10628-6_10","DOI":"10.1007\/978-3-642-10628-6_10"},{"key":"4872_CR18","doi-asserted-by":"publisher","unstructured":"Cheon JH, Kim M, Kim K, Lee J, Kang S (2001) Improved Impossible Differential Cryptanalysis of Rijndael and Crypton. In: Information Security and Cryptology - ICISC 2001, 4th International Conference Seoul, Korea, December 6-7, Proceedings, pp 39\u201349. https:\/\/doi.org\/10.1007\/3-540-45861-1_4","DOI":"10.1007\/3-540-45861-1_4"},{"key":"4872_CR19","doi-asserted-by":"publisher","unstructured":"Zhang W, Wu W, Feng D (2007) New Results on Impossible Differential Cryptanalysis of Reduced AES. In: Information Security and Cryptology - ICISC 2007, 10th International Conference, Seoul, Korea, November 29-30, Proceedings, pp 239\u2013250. https:\/\/doi.org\/10.1007\/978-3-540-76788-6_19","DOI":"10.1007\/978-3-540-76788-6_19"},{"issue":"1","key":"4872_CR20","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.ipl.2004.02.018","volume":"91","author":"RC Phan","year":"2004","unstructured":"Phan RC (2004) Impossible differential cryptanalysis of 7-round advanced encryption standard (AES). Inf Process Lett 91(1):33\u201338","journal-title":"Inf Process Lett"},{"key":"4872_CR21","doi-asserted-by":"publisher","unstructured":"Daemen J, Rijmen V (2002) The design of Rijndael: AES - The advanced encryption standard. Information security and cryptography, Springer. https:\/\/doi.org\/10.1007\/978-3-662-04722-4","DOI":"10.1007\/978-3-662-04722-4"},{"issue":"3","key":"4872_CR22","doi-asserted-by":"publisher","first-page":"137","DOI":"10.46586\/tosc.v2021.i3.137-169","volume":"2021","author":"M Rahman","year":"2021","unstructured":"Rahman M, Saha D, Paul G (2021) Boomeyong: embedding yoyo within boomerang and its applications to key recovery attacks on AES and pholkos. IACR Trans Symmetric Cryptol 2021(3):137\u2013169. https:\/\/doi.org\/10.46586\/tosc.v2021.i3.137-169","journal-title":"IACR Trans Symmetric Cryptol"},{"key":"4872_CR23","unstructured":"Derbez P (2013) Meet-in-the-middle attacks on AES. (attaques par rencontre par le milieu sur l\u2019aes). PhD thesis, \u00c9cole Normale Sup\u00e9rieure, Paris, France. https:\/\/tel.archives-ouvertes.fr\/tel-00918146"},{"key":"4872_CR24","doi-asserted-by":"publisher","unstructured":"Tiessen T, Knudsen LR, K\u00f6lbl S, Lauridsen MM (2015) Security of the AES with a secret s-box. In: Leander, G. (ed.) Fast software encryption - 22nd international workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, revised selected papers. Lecture Notes in Computer Science, vol 9054, pp 175\u2013189. Springer. https:\/\/doi.org\/10.1007\/978-3-662-48116-5_9","DOI":"10.1007\/978-3-662-48116-5_9"},{"key":"4872_CR25","doi-asserted-by":"publisher","unstructured":"Bar-On A, Dunkelman O, Keller N, Ronen E, Shamir A (2018) Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities. In: Advances in cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part II, pp 185\u2013212. https:\/\/doi.org\/10.1007\/978-3-319-96881-0_7","DOI":"10.1007\/978-3-319-96881-0_7"},{"key":"4872_CR26","doi-asserted-by":"publisher","unstructured":"R\u00f8njom S, Bardeh NG, Helleseth T (2017) Yoyo tricks with AES. In: Takagi T, Peyrin T (eds) Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, Proceedings, Part I. Lecture notes in computer science, vol 10624, pp 217\u2013243, Springer. https:\/\/doi.org\/10.1007\/978-3-319-70694-8_8","DOI":"10.1007\/978-3-319-70694-8_8"},{"key":"4872_CR27","doi-asserted-by":"publisher","unstructured":"Dunkelman O, Keller N, Ronen E, Shamir A (2020) The Retracing Boomerang Attack. In: Canteaut, A., Ishai, Y. (eds.) Advances in Cryptology - EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, Proceedings, Part I. Lecture notes in computer science, vol 12105, pp 280\u2013309, Springer. https:\/\/doi.org\/10.1007\/978-3-030-45721-1_11","DOI":"10.1007\/978-3-030-45721-1_11"},{"key":"4872_CR28","unstructured":"Bariant A, Leurent G (2022) Truncated boomerang attacks and application to aes-based ciphers. IACR Cryptol ePrint Arch, 701"},{"issue":"2","key":"4872_CR29","doi-asserted-by":"publisher","first-page":"43","DOI":"10.46586\/tosc.v2022.i2.43-62","volume":"2022","author":"NG Bardeh","year":"2022","unstructured":"Bardeh NG, Rijmen V (2022) New key-recovery attack on reduced-round AES. IACR Trans Symmetric Cryptol 2022(2):43\u201362. https:\/\/doi.org\/10.46586\/tosc.v2022.i2.43-62","journal-title":"IACR Trans Symmetric Cryptol"},{"key":"4872_CR30","doi-asserted-by":"publisher","unstructured":"Mala H, Dakhilalian M, Rijmen V, Modarres-Hashemi M (2010) Improved Impossible Differential Cryptanalysis of 7-Round AES-128. In: Progress in Cryptology - INDOCRYPT 2010 - 11th International Conference on Cryptology in India, Hyderabad, India, December 12-15. Proceedings, pp 282\u2013291. https:\/\/doi.org\/10.1007\/978-3-642-17401-8_20","DOI":"10.1007\/978-3-642-17401-8_20"},{"key":"4872_CR31","doi-asserted-by":"publisher","unstructured":"Kakarla S, Mandava S, Saha D, Roy Chowdhury D (2017) On the Practical Implementation of Impossible Differential Cryptanalysis on Reduced-Round AES. In: Applications and Techniques in Information Security - 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6-7. Proceedings, pp 58\u201372. https:\/\/doi.org\/10.1007\/978-981-10-5421-1_6","DOI":"10.1007\/978-981-10-5421-1_6"},{"key":"4872_CR32","doi-asserted-by":"publisher","unstructured":"Pal D, Agrawal D, Das A, Chowdhury DR (2019) An Efficient Parallel Implementation of Impossible-Differential Cryptanalysis for Five-Round AES-128. In: Security, Privacy, and Applied cryptography Engineering - 9th International Conference, SPACE 2019, Gandhinagar, India, December 3-7, Proceedings, pp 106\u2013122. https:\/\/doi.org\/10.1007\/978-3-030-35869-3_9","DOI":"10.1007\/978-3-030-35869-3_9"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-022-04872-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-022-04872-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-022-04872-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,2]],"date-time":"2023-03-02T19:14:24Z","timestamp":1677784464000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-022-04872-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,2]]},"references-count":32,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2023,4]]}},"alternative-id":["4872"],"URL":"https:\/\/doi.org\/10.1007\/s11227-022-04872-y","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"type":"print","value":"0920-8542"},{"type":"electronic","value":"1573-0484"}],"subject":[],"published":{"date-parts":[[2022,11,2]]},"assertion":[{"value":"5 October 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 November 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}