{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T21:21:40Z","timestamp":1740172900931,"version":"3.37.3"},"reference-count":12,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,7,8]],"date-time":"2024-07-08T00:00:00Z","timestamp":1720396800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,7,8]],"date-time":"2024-07-08T00:00:00Z","timestamp":1720396800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comput Virol Hack Tech"],"DOI":"10.1007\/s11416-024-00532-2","type":"journal-article","created":{"date-parts":[[2024,7,8]],"date-time":"2024-07-08T04:01:50Z","timestamp":1720411310000},"page":"525-531","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Differences with high probability and impossible differentials for the KB-256 cipher"],"prefix":"10.1007","volume":"20","author":[{"given":"R.","family":"Astrakhantsev","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1652-973X","authenticated-orcid":false,"given":"A.","family":"Chuhno","sequence":"additional","affiliation":[]},{"given":"A.","family":"Dmukh","sequence":"additional","affiliation":[]},{"given":"A.","family":"Kurochkin","sequence":"additional","affiliation":[]},{"given":"I.","family":"Astrakhantseva","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,8]]},"reference":[{"key":"532_CR1","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/3-540-38424-3_1","volume-title":"Advances in Cryptology-CRYPTO\u2019 90","author":"E Biham","year":"1991","unstructured":"Biham, E., Shamir, A.: Differential cryptanalysis of des-like cryptosystems. In: Menezes, A.J., Vanstone, S.A. (eds.) Advances in Cryptology-CRYPTO\u2019 90, pp. 2\u201321. Springer, Berlin, Heidelberg (1991)"},{"key":"532_CR2","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume-title":"Advances in Cryptology \u2013 EUROCRYPT \u201993","author":"M Matsui","year":"1994","unstructured":"Matsui, M.: Linear cryptanalysis method for des cipher. In: Helleseth, T. (ed.) Advances in Cryptology \u2013 EUROCRYPT \u201993, pp. 386\u2013397. Springer, Berlin, Heidelberg (1994)"},{"issue":"2","key":"532_CR3","first-page":"83","volume":"11","author":"FM Malyshev","year":"2020","unstructured":"Malyshev, F.M., Trishin, A.E.: Linear and differential cryptanalysis: Another viewpoint 11(2), 83\u201398 (2020)","journal-title":"Linear and differential cryptanalysis: Another viewpoint"},{"key":"532_CR4","doi-asserted-by":"crossref","unstructured":"Shirai, T., Shibutani, K., Akishita, T., Moriai, S., Iwata, T.: The 128-bit blockcipher clefia (extended abstract). In: Biryukov, A. (ed.) Fast Software Encryption, pp. 181\u2013195. Springer, Berlin, Heidelberg (2007)","DOI":"10.1007\/978-3-540-74619-5_12"},{"key":"532_CR5","doi-asserted-by":"crossref","unstructured":"Shirai, T., Preneel, B.: On feistel ciphers using optimal diffusion mappings across multiple rounds. In: International Conference on the Theory and Application of Cryptology and Information Security (2004). https:\/\/api.semanticscholar.org\/CorpusID:11202917","DOI":"10.1007\/978-3-540-30539-2_1"},{"key":"532_CR6","doi-asserted-by":"crossref","unstructured":"Shirai, T., Shibutani, K.: On feistel structures using a diffusion switching mechanism. In: Fast Software Encryption Workshop (2006). https:\/\/api.semanticscholar.org\/CorpusID:16285931","DOI":"10.1007\/11799313_4"},{"key":"532_CR7","unstructured":"The 128-bit blockcipher clefia security and performance evaluations. https:\/\/api.semanticscholar.org\/CorpusID:46963092"},{"key":"532_CR8","doi-asserted-by":"crossref","unstructured":"Biham, E., Biryukov, A., Shamir, A.: Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. J. Cryptol. 18(4) (2002)","DOI":"10.1007\/s00145-005-0129-3"},{"issue":"2","key":"532_CR9","doi-asserted-by":"publisher","first-page":"181","DOI":"10.4213\/mvk295","volume":"10","author":"VM Fomichev","year":"2019","unstructured":"Fomichev, V.M., Koreneva, A.M., Miftakhutdinova, A.R., Zadorozhny, D.I.: Evaluation of the maximum performance of block encryption algorithms. Matematicheskie Voprosy Kriptografii 10(2), 181\u2013191 (2019)","journal-title":"Matematicheskie Voprosy Kriptografii"},{"key":"532_CR10","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/s11416-020-00351-1","volume":"16","author":"VM Fomichev","year":"2020","unstructured":"Fomichev, V.M., Koreneva, A.M.: Encryption performance and security of certain wide block ciphers. Journal of Computer Virology and Hacking Techniques 16, 197\u2013216 (2020)","journal-title":"Journal of Computer Virology and Hacking Techniques"},{"key":"532_CR11","unstructured":"GOST 34.12-2018 Information Technology. Cryptographic data security. Block ciphers, Russia (2018)"},{"key":"532_CR12","unstructured":"Astrakhancev, R.: Source code of the implementation of the algorithm for enumeration of impossible differentials. https:\/\/github.com\/Astrarog\/hse - impossible"}],"container-title":["Journal of Computer Virology and Hacking Techniques"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-024-00532-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11416-024-00532-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-024-00532-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,9]],"date-time":"2025-01-09T10:10:23Z","timestamp":1736417423000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11416-024-00532-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,8]]},"references-count":12,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2024,9]]}},"alternative-id":["532"],"URL":"https:\/\/doi.org\/10.1007\/s11416-024-00532-2","relation":{},"ISSN":["2263-8733"],"issn-type":[{"type":"electronic","value":"2263-8733"}],"subject":[],"published":{"date-parts":[[2024,7,8]]},"assertion":[{"value":"2 November 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 June 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 July 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that there are no conflict of interest regarding the publication of this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}