{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:47:12Z","timestamp":1767340032634},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2014,11,1]],"date-time":"2014-11-01T00:00:00Z","timestamp":1414800000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. Comput. Sci. Technol."],"published-print":{"date-parts":[[2014,11]]},"DOI":"10.1007\/s11390-014-1496-8","type":"journal-article","created":{"date-parts":[[2014,11,21]],"date-time":"2014-11-21T16:19:40Z","timestamp":1416586780000},"page":"1134-1139","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Improved Linear Cryptanalysis of CAST-256"],"prefix":"10.1007","volume":"29","author":[{"given":"Jing-Yuan","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Mei-Qin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Long","family":"Wen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,11,17]]},"reference":[{"issue":"1","key":"1496_CR1","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E Biham","year":"1991","unstructured":"Biham E, Shamir A. Differential cryptanalysis of DES-like cryptosystems. Journal of Cryptology, 1991, 4(1): 3\u201372.","journal-title":"Journal of Cryptology"},{"key":"1496_CR2","doi-asserted-by":"crossref","unstructured":"Matsui M. Linear cryptanalysis method for DES cipher. In Proc. Workshop on the Theory and Application of Cryptographic Techniques, May 1993, pp.386\u2013397.","DOI":"10.1007\/3-540-48285-7_33"},{"key":"1496_CR3","doi-asserted-by":"crossref","unstructured":"Knudsen L. Truncated and higher order differentials. In Proc. the 2nd Int. Workshop on Fast Software Encryption, December 1994, pp.196\u2013211.","DOI":"10.1007\/3-540-60590-8_16"},{"key":"1496_CR4","doi-asserted-by":"crossref","unstructured":"Biham E, Biryukov A, Shamir A. Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials. In Proc. Int. Conf. the Theory and Application of Cryptographic Techniques, May 1999, pp.12\u201323.","DOI":"10.1007\/3-540-48910-X_2"},{"key":"1496_CR5","doi-asserted-by":"crossref","unstructured":"Borst J, Knudsen L, Rijmen V. Two attacks on reduced IDEA. In Proc. the 16th Advances in Cryptology-Eurocrypt, May 1997, pp.1\u201313.","DOI":"10.1007\/3-540-69053-0_1"},{"key":"1496_CR6","doi-asserted-by":"crossref","unstructured":"Blondeau C, G\u00e9rard B. Multiple differential cryptanalysis: Theory and practice. In Proc. the 18th Int. Workshop on Fast Software Encryption, February 2011, pp.35\u201354.","DOI":"10.1007\/978-3-642-21702-9_3"},{"key":"1496_CR7","doi-asserted-by":"crossref","unstructured":"Wang M Q, Sun Y, Tischhauser E, Preneel B. A model for structure attacks, with applications to PRESENT and Serpent. In Proc. the 19th Int. Workshop on Fast Software Encryption, March 2012, pp.49\u201368.","DOI":"10.1007\/978-3-642-34047-5_4"},{"key":"1496_CR8","doi-asserted-by":"crossref","unstructured":"Wagner D. The boomerang attack. In Proc. the 6th Int. Workshop on Fast Software Encryption, March 1999, pp.156\u2013170.","DOI":"10.1007\/3-540-48519-8_12"},{"key":"1496_CR9","doi-asserted-by":"crossref","unstructured":"Albrecht M, Cid C. Algebraic techniques in differential cryptanalysis. In Proc. the 16th Int. Workshop on Fast Software Encryption, February 2009, pp.193\u2013208.","DOI":"10.1007\/978-3-642-03317-9_12"},{"key":"1496_CR10","doi-asserted-by":"crossref","unstructured":"Wang M, Sun Y, Mouha N, Preneel B. Algebraic techniques in differential cryptanalysis revisited. In Proc. the 16th Information Security and Privacy Australasian Conference, July 2011, pp.120\u2013141.","DOI":"10.1007\/978-3-642-22497-3_9"},{"key":"1496_CR11","doi-asserted-by":"crossref","unstructured":"Biryukov A, De Canni\u00e8re C, Quisquater M. On multiple linear approximations. In Proc. the 24th Int. Cryptology Conf., August 2004, pp.1\u201322.","DOI":"10.1007\/978-3-540-28628-8_1"},{"key":"1496_CR12","doi-asserted-by":"crossref","unstructured":"Hermelin M, Cho J, Nyberg K. Multidimensional extension of Matsui's Algorithm 2. In Proc. the 16th Int. Workshop on Fast Software Encryption, February 2009, pp.209-227.","DOI":"10.1007\/978-3-642-03317-9_13"},{"key":"1496_CR13","doi-asserted-by":"crossref","unstructured":"Kaliski B, Robshaw M. Linear cryptanalysis using multiple approximations. In Proc. the 14th Int. Cryptology Conf. Advances in Cryptology, August 1994, pp.26\u201339.","DOI":"10.1007\/3-540-48658-5_4"},{"issue":"3","key":"1496_CR14","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1007\/s10623-012-9697-z","volume":"70","author":"A Bogdanov","year":"2014","unstructured":"Bogdanov A, Rijmen V. Linear hulls with correlation zero and linear cryptanalysis of block ciphers. Designs, Codes and Cryptography, 2014, 70(3): 369\u2013383.","journal-title":"Designs, Codes and Cryptography"},{"key":"1496_CR15","doi-asserted-by":"crossref","unstructured":"Adams C, Gilchrist J. The CAST-256 encryption algorithm, June 1999. http:\/\/www.ietf.org\/rfc\/rfc2612.txt , Sept. 2014.","DOI":"10.17487\/rfc2612"},{"key":"1496_CR16","doi-asserted-by":"crossref","unstructured":"Adams C. The CAST-128 encryption algorithm, May 1997. http:\/\/www.ietf.org\/rfc\/rfc2144.txt , Oct. 2014.","DOI":"10.17487\/rfc2144"},{"key":"1496_CR17","doi-asserted-by":"crossref","unstructured":"Nakahara J J, Rasmussen M. Linear analysis of reduced-round CAST-128 and CAST-256. In Proc. the 7th Brazilian Symposium on Information and Computer System Security, Aug. 2007, pp.45\u201355.","DOI":"10.5753\/sbseg.2007.20914"},{"key":"1496_CR18","doi-asserted-by":"crossref","unstructured":"Wang M Q, Wang X Y, Hu C H. New linear cryptanalytic results of reduced-round of CAST-128 and CAST-256. In Proc. the 15th Int. Workshop on Selected Areas in Cryptography, August 2009, pp.429\u2013441.","DOI":"10.1007\/978-3-642-04159-4_28"},{"key":"1496_CR19","doi-asserted-by":"crossref","unstructured":"Sun Y, Wang M Q, Sun Q M. How to search linear approximation for large non-surjective S-box. In Proc. the 6th ACM Symposium on Information, Computer and Communications Security, March 2011, pp.459\u2013465.","DOI":"10.1145\/1966913.1966979"},{"key":"1496_CR20","unstructured":"Biham E. A note on comparing the AES candidates. In Proc. the 2nd AES Candidate Conference, March 1999, pp.22\u201323."},{"issue":"4","key":"1496_CR21","first-page":"913","volume":"84","author":"H Seki","year":"2001","unstructured":"Seki H, Kaneko T. Differential cryptanalysis of CAST-256 reduced to nine quad-rounds. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2001, 84(4): 913\u2013918.","journal-title":"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"},{"key":"1496_CR22","doi-asserted-by":"crossref","unstructured":"Bogdanov A, Leander G, Nyberg K, Wang M Q. Integral and multidimensional linear distinguishers with correlation zero. In Proc. the 18th Int. Conf. Theory and Application of Cryptology and Information Security, December 2012, pp.244\u2013261.","DOI":"10.1007\/978-3-642-34961-4_16"},{"issue":"3","key":"1496_CR23","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1023\/A:1008229029587","volume":"12","author":"CM Adams","year":"1997","unstructured":"Adams C M. Constructing symmetric ciphers using the CAST design procedure. Designs, Codes and Cryptography, 1997, 12(3): 283\u2013316.","journal-title":"Designs, Codes and Cryptography"},{"key":"1496_CR24","doi-asserted-by":"crossref","unstructured":"Ferguson N, Kelsey J, Lucks S, Schneier B, Stay M, Wagner D, Whiting D. Improved cryptanalysis of Rijndael. In Proc. the 7th Int. Workshop on Fast Software Encryption, April 2000, pp.213\u2013230.","DOI":"10.1007\/3-540-44706-7_15"},{"issue":"1","key":"1496_CR25","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1007\/s00145-007-9013-7","volume":"21","author":"AA Sel\u00e7uk","year":"2008","unstructured":"Sel\u00e7uk A A. On probability of success in linear and differential cryptanalysis. Journal of Cryptology, 2008, 21(1): 131\u2013147.","journal-title":"Journal of Cryptology"}],"container-title":["Journal of Computer Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-014-1496-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11390-014-1496-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-014-1496-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,18]],"date-time":"2023-07-18T12:01:56Z","timestamp":1689681716000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11390-014-1496-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11]]},"references-count":25,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2014,11]]}},"alternative-id":["1496"],"URL":"https:\/\/doi.org\/10.1007\/s11390-014-1496-8","relation":{},"ISSN":["1000-9000","1860-4749"],"issn-type":[{"value":"1000-9000","type":"print"},{"value":"1860-4749","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,11]]}}}