{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T21:21:35Z","timestamp":1740172895214,"version":"3.37.3"},"reference-count":11,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,6,24]],"date-time":"2023-06-24T00:00:00Z","timestamp":1687564800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,6,24]],"date-time":"2023-06-24T00:00:00Z","timestamp":1687564800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comput Virol Hack Tech"],"DOI":"10.1007\/s11416-023-00488-9","type":"journal-article","created":{"date-parts":[[2023,6,24]],"date-time":"2023-06-24T17:02:36Z","timestamp":1687626156000},"page":"295-300","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Full round impossible differentials for Feistel ciphers"],"prefix":"10.1007","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1570-548X","authenticated-orcid":false,"given":"D.","family":"Zakharov","sequence":"first","affiliation":[]},{"given":"M.","family":"Pudovkina","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,24]]},"reference":[{"key":"488_CR1","doi-asserted-by":"crossref","unstructured":"Biham, E., Biryukov, A., Shamir, A.: Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials. In: Advances in Cryptology\u2013EUROCRYPT\u201999: International Conference on the Theory and Application of Cryptographic Techniques Prague, Czech Republic, May 2\u20136, 1999 Proceedings 18. Springer. (1999), pp. 12\u201323","DOI":"10.1007\/3-540-48910-X_2"},{"key":"488_CR2","unstructured":"Knudsen, L.: DEAL-a 128-bit block cipher. In: complexity 258.2, p. 216 (1998)"},{"key":"488_CR3","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1007\/978-1-4613-9314-6","volume-title":"Differential Cryptanalysis of the Data Encryption Standard","author":"E Biham","year":"1993","unstructured":"Biham, E., Shamir, A.: Differential Cryptanalysis of the Data Encryption Standard, 9th edn., p. 188. Springer, New York (1993)","edition":"9"},{"key":"488_CR4","doi-asserted-by":"crossref","unstructured":"Tezcan, C.: Improbable differential attacks on present using undisturbed bits. J. Comput. Appl. Math. 259, 503\u2013511 (2014)","DOI":"10.1016\/j.cam.2013.06.023"},{"key":"488_CR5","doi-asserted-by":"crossref","unstructured":"Boura, C., Naya-Plasencia, M., Suder, V.: Scrutinizing and improving impossible differential attacks: applications to CLEFIA, Camellia, LBlock and Simon. In: Advances in Cryptology-ASIACRYPT 2014: 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, ROC, December 7-11, 2014. Proceedings, Part I 20. Springer. pp. 179\u2013199 (2014)","DOI":"10.1007\/978-3-662-45611-8_10"},{"key":"488_CR6","doi-asserted-by":"crossref","unstructured":"Phan, Raphael C.-W.: Impossible differential cryptanalysis of 7-round Advanced Encryption Standard (AES). In: Information processing letters 91.1, pp. 33\u201338 (2004)","DOI":"10.1016\/j.ipl.2004.02.018"},{"key":"488_CR7","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1049\/iet-ifs.2010.0174","volume":"52","author":"R Li","year":"2011","unstructured":"Li, R., Sun, B., Li, C.: Impossible differential cryptanalysis of SPN ciphers. IET Inf. Secur. 52, 111\u2013120 (2011)","journal-title":"IET Inf. Secur."},{"key":"488_CR8","doi-asserted-by":"crossref","unstructured":"Wei, Y. et al.: Impossible differential cryptanalysis on Feistel ciphers with SP and SPS round functions. In: Applied Cryptography and Network Security: 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010. Proceedings 8. Springer. pp. 105\u2013122 (2010)","DOI":"10.1007\/978-3-642-13708-2_7"},{"issue":"4","key":"488_CR9","doi-asserted-by":"publisher","first-page":"728","DOI":"10.1049\/cje.2018.04.002","volume":"27","author":"T Cui","year":"2018","unstructured":"Cui, T., Jin, C., Ma, J.: A new method for finding impossible differentials of generalized Feistel structures. Chin. J. Electron. 27(4), 728\u2013733 (2018)","journal-title":"Chin. J. Electron."},{"key":"488_CR10","first-page":"94","volume":"41","author":"WU Xiaonian","year":"2020","unstructured":"Xiaonian, W.U., et al.: Analysis of impossible differential distinguisher for GRANULE and MANTRA ciphers. J. Commun. 41, 94\u2013101 (2020)","journal-title":"J. Commun."},{"key":"488_CR11","doi-asserted-by":"crossref","unstructured":"Bansod, G., Patil, A., Pisharoty, N.: GRANULE: an ultra lightweight cipher design for embedded security. In: Cryptology ePrint Archive (2018)","DOI":"10.1504\/IJAHUC.2018.091568"}],"container-title":["Journal of Computer Virology and Hacking Techniques"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-023-00488-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11416-023-00488-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-023-00488-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,18]],"date-time":"2024-04-18T18:12:19Z","timestamp":1713463939000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11416-023-00488-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,24]]},"references-count":11,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2024,6]]}},"alternative-id":["488"],"URL":"https:\/\/doi.org\/10.1007\/s11416-023-00488-9","relation":{},"ISSN":["2263-8733"],"issn-type":[{"type":"electronic","value":"2263-8733"}],"subject":[],"published":{"date-parts":[[2023,6,24]]},"assertion":[{"value":"18 November 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 June 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 June 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or non-financial interests to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}