{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:46:37Z","timestamp":1767339997676},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J. Comput. Sci. Technol."],"published-print":{"date-parts":[[2014,1]]},"DOI":"10.1007\/s11390-014-1419-8","type":"journal-article","created":{"date-parts":[[2014,1,20]],"date-time":"2014-01-20T13:18:32Z","timestamp":1390223912000},"page":"165-176","source":"Crossref","is-referenced-by-count":17,"title":["Related-Key Impossible Differential Attack on Reduced-Round LBlock"],"prefix":"10.1007","volume":"29","author":[{"given":"Long","family":"Wen","sequence":"first","affiliation":[]},{"given":"Mei-Qin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jing-Yuan","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,1,10]]},"reference":[{"key":"1419_CR1","doi-asserted-by":"crossref","unstructured":"Bogdanov A, Knudsen L R, Leander G, Paar C, Poschmann A, Robshaw M J B, Seurin Y, Vikkelsoe C. PRESENT: An ultra-lightweight block cipher. In Proc. the 9th International Workshop on Cryptographic Hardware and Embedded Systems, September 2007, pp. 450-466.","DOI":"10.1007\/978-3-540-74735-2_31"},{"key":"1419_CR2","doi-asserted-by":"crossref","unstructured":"Hong D, Sung J, Hong S et al. HIGHT: A new block cipher suitable for low-resource device. In Proc. the 8th International Workshop on Cryptographic Hardware and Embedded Systems, October 2006, pp. 46-59.","DOI":"10.1007\/11894063_4"},{"key":"1419_CR3","doi-asserted-by":"crossref","unstructured":"Shirai T, Shibutani K, Akishita T, Moriai S, Iwata T. The 128-bit blockcipher CLEFIA (extended abstract). In Proc. the 4th International Workshop on Fast Software Encryption, March 2007, pp. 181-195.","DOI":"10.1007\/978-3-540-74619-5_12"},{"key":"1419_CR4","doi-asserted-by":"crossref","unstructured":"Wu W, Zhang L. LBlock: A lightweight block cipher. In Proc. the 9th International Conference on Applied Cryptography and Network Security, June 2011, pp. 327-344.","DOI":"10.1007\/978-3-642-21554-4_19"},{"key":"1419_CR5","doi-asserted-by":"crossref","unstructured":"Liu Y, Gu D, Liu Z, Li W. Impossible differential attacks on reduced-round LBlock. In Proc. the 8th International Conference on Information Security Practice and Experience, April 2012, pp. 97-108.","DOI":"10.1007\/978-3-642-29101-2_7"},{"key":"1419_CR6","doi-asserted-by":"crossref","unstructured":"Karako\u00e7 F, Demirci H, Harmanci A E. Impossible differential cryptanalysis of reduced-round LBlock. In Proc. the 6th IFIP WG 11.2 International Conference on Information Security Theory and Practice: Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, June 2012, pp. 179-188.","DOI":"10.1007\/978-3-642-30955-7_16"},{"key":"1419_CR7","doi-asserted-by":"crossref","unstructured":"Sasaki Y, Wang L. Meet-in-the-middle technique for integral attacks against Feistel ciphers. In Proc. the 19th International Conference on Selected Areas in Cryptography, August 2012, pp. 234-251.","DOI":"10.1007\/978-3-642-35999-6_16"},{"key":"1419_CR8","doi-asserted-by":"crossref","unstructured":"Sasaki Y, Wang L. Comprehensive study of integral analysis on 22-round LBlock. In Proc. the 15th International Conference on Information Security and Cryptology, November 2012, pp. 156-169.","DOI":"10.1007\/978-3-642-37682-5_12"},{"key":"1419_CR9","unstructured":"Soleimany H, Nyberg K. Zero-correlation linear cryptanalysis of reduced-round LBlock. IACR Cryptology ePrint Archive, http:\/\/eprint.iacr.org\/2012\/570.pdf, Nov. 2013."},{"key":"1419_CR10","doi-asserted-by":"crossref","unstructured":"Liu S, Gong Z, Wang L. Improved related-key differential attacks on reduced-round LBlock. In Proc. the 14th International Conference on Information and Communications Security, October 2012, pp. 58-69.","DOI":"10.1007\/978-3-642-34129-8_6"},{"issue":"16","key":"1419_CR11","doi-asserted-by":"crossref","first-page":"624","DOI":"10.1016\/j.ipl.2012.04.012","volume":"112","author":"M Minier","year":"2012","unstructured":"Minier M, Naya-Plasencia M. A related key impossible differential attack against 22 rounds of the lightweight block cipher LBlock. Information Processing Letters, 2012, 112(16): 624-629.","journal-title":"Information Processing Letters"},{"key":"1419_CR12","doi-asserted-by":"crossref","unstructured":"Wang Y, Wu W, Yu X, Zhang L. Security on LBlock against biclique cryptanalysis. In Proc. the 13th International Workshop on Information Security Applications, August 2012, pp. 1-14.","DOI":"10.1007\/978-3-642-35416-8_1"},{"key":"1419_CR13","doi-asserted-by":"crossref","unstructured":"Biham E, Biryukov A, Shamir A. Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials. In Proc. the 18th Annual International Conference on the Theory and Applications of Cryptographic Techniques, May 1999, pp. 12-23.","DOI":"10.1007\/3-540-48910-X_2"},{"key":"1419_CR14","unstructured":"Knudsen L R. DEAL \u2014 A 128-bit block cipher. http:\/\/cite-seerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.32.7982&rep=rep1&type=pdf , Apr. 2013."},{"issue":"4","key":"1419_CR15","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1007\/BF00203965","volume":"7","author":"E Biham","year":"1991","unstructured":"Biham E. New types of cryptanalytic attacks using related keys. Journal of Cryptology, 1991, 7(4): 229-246.","journal-title":"Journal of Cryptology"},{"key":"1419_CR16","doi-asserted-by":"crossref","unstructured":"Jakimoski G, Desmedt Y. Related-key differential cryptanalysis of 192-bit key AES variants. In Proc. the 10th Annual International Workshop on Selected Areas in Cryptography, August 2003, pp. 208-221.","DOI":"10.1007\/978-3-540-24654-1_15"}],"container-title":["Journal of Computer Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-014-1419-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11390-014-1419-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-014-1419-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,14]],"date-time":"2020-08-14T10:16:11Z","timestamp":1597400171000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11390-014-1419-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,1]]},"references-count":16,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,1]]}},"alternative-id":["1419"],"URL":"https:\/\/doi.org\/10.1007\/s11390-014-1419-8","relation":{},"ISSN":["1000-9000","1860-4749"],"issn-type":[{"value":"1000-9000","type":"print"},{"value":"1860-4749","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,1]]}}}