{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T09:08:19Z","timestamp":1765357699208,"version":"3.37.3"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,9,30]],"date-time":"2024-09-30T00:00:00Z","timestamp":1727654400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,9,30]],"date-time":"2024-09-30T00:00:00Z","timestamp":1727654400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/100018240","name":"Research Center for Informatics, Czech Technical University in Prague","doi-asserted-by":"publisher","award":["CZ.02.1.01\/0.0\/0.0\/16 019\/0000765"],"award-info":[{"award-number":["CZ.02.1.01\/0.0\/0.0\/16 019\/0000765"]}],"id":[{"id":"10.13039\/100018240","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001823","name":"Ministerstvo \u0160kolstv\u00ed, Ml\u00e1de\u017ee a Telov\u00fdchovy","doi-asserted-by":"publisher","award":["SGS23\/211\/OHK3\/3T\/18"],"award-info":[{"award-number":["SGS23\/211\/OHK3\/3T\/18"]}],"id":[{"id":"10.13039\/501100001823","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comput Virol Hack Tech"],"DOI":"10.1007\/s11416-024-00540-2","type":"journal-article","created":{"date-parts":[[2024,9,30]],"date-time":"2024-09-30T09:01:53Z","timestamp":1727686913000},"page":"885-900","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Reducing overdefined systems of polynomial equations derived from small scale variants of the AES via data mining methods"],"prefix":"10.1007","volume":"20","author":[{"given":"Jana","family":"Beru\u0161kov\u00e1","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6546-8953","authenticated-orcid":false,"given":"Martin","family":"Jure\u010dek","sequence":"additional","affiliation":[]},{"given":"Olha","family":"Jure\u010dkov\u00e1","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,30]]},"reference":[{"key":"540_CR1","first-page":"22","volume":"19","author":"V Rijmen","year":"2001","unstructured":"Rijmen, V., Daemen, J.: Advanced encryption standard. Proc. Federal Inf. Process. Stand. Public. Natl. Inst. Stand. Technol. 19, 22 (2001)","journal-title":"Proc. Federal Inf. Process. Stand. Public. Natl. Inst. Stand. Technol."},{"key":"540_CR2","doi-asserted-by":"crossref","unstructured":"Courtois, N., Klimov, A., Patarin, J., Shamir, A.: Efficient algorithms for solving overdefined systems of multivariate polynomial equations. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 392\u2013407. Springer (2000)","DOI":"10.1007\/3-540-45539-6_27"},{"key":"540_CR3","doi-asserted-by":"crossref","unstructured":"Bard, G.: Algebraic cryptanalysis. Springer (2009)","DOI":"10.1007\/978-0-387-88757-9"},{"key":"540_CR4","doi-asserted-by":"publisher","unstructured":"Cid, C., Murphy, S., Robshaw, M.J.B.: Small scale variants of the aes. In: Gilbert, H., Handschuh, H. (eds.) Fast Software Encryption, pp. 145\u2013162. Springer, Berlin (2005). https:\/\/doi.org\/10.1007\/11502760_10","DOI":"10.1007\/11502760_10"},{"key":"540_CR5","doi-asserted-by":"publisher","unstructured":"Cox, D.A., Little, J., O\u2019Shea, D.: Ideals, Varieties, and Algorithms: An Introduction to Computational Algebraic Geometry and Commutative Algebra, 4th edn. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-16721-3","DOI":"10.1007\/978-3-319-16721-3"},{"key":"540_CR6","doi-asserted-by":"crossref","unstructured":"Cid, C., Murphy, S., Robshaw, M.J.: Small scale variants of the aes. In: International Workshop on Fast Software Encryption, pp. 145\u2013162. Springer (2005)","DOI":"10.1007\/11502760_10"},{"key":"540_CR7","doi-asserted-by":"crossref","unstructured":"Buchmann, J., Pyshkin, A., Weinmann, R.-P.: A zero-dimensional gr\u00f6bner basis for aes-128. In: Fast Software Encryption: 13th International Workshop, FSE 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers 13, pp. 78\u201388. Springer (2006)","DOI":"10.1007\/11799313_6"},{"key":"540_CR8","doi-asserted-by":"crossref","unstructured":"Murphy, S., Robshaw, M.J.: Essential algebraic structure within the aes. In: Annual International Cryptology Conference, pp. 1\u201316. Springer (2002)","DOI":"10.1007\/3-540-45708-9_1"},{"key":"540_CR9","doi-asserted-by":"crossref","unstructured":"Toli, I., Zanoni, A.: An algebraic interpretation of 128. In: International Conference on Advanced Encryption Standard, pp. 84\u201397. Springer (2004)","DOI":"10.1007\/11506447_8"},{"key":"540_CR10","doi-asserted-by":"crossref","unstructured":"Zhao, K., Cui, J., Xie, Z., et al.: Algebraic cryptanalysis scheme of aes-256 using gr\u00f6bner basis. J. Electric. Comput. Eng. 2017 (2017)","DOI":"10.1155\/2017\/9828967"},{"key":"540_CR11","doi-asserted-by":"crossref","unstructured":"Courtois, N.T., Pieprzyk, J.: Cryptanalysis of block ciphers with overdefined systems of equations. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 267\u2013287. Springer (2002)","DOI":"10.1007\/3-540-36178-2_17"},{"issue":"1","key":"540_CR12","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1049\/el:20030015","volume":"39","author":"S Murphy","year":"2003","unstructured":"Murphy, S., Robshaw, M.: Comments on the security of the aes and the xsl technique. Electron. Lett. 39(1), 36\u201338 (2003)","journal-title":"Electron. Lett."},{"key":"540_CR13","doi-asserted-by":"crossref","unstructured":"Cid, C., Leurent, G.: An analysis of the xsl algorithm. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 333\u2013352. Springer (2005)","DOI":"10.1007\/11593447_18"},{"issue":"2","key":"540_CR14","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/s11786-009-0020-y","volume":"3","author":"S Bulygin","year":"2010","unstructured":"Bulygin, S., Brickenstein, M.: Obtaining and solving systems of equations in key variables only for the small variants of AES. Math. Comput. Sci. 3(2), 185\u2013200 (2010)","journal-title":"Math. Comput. Sci."},{"key":"540_CR15","unstructured":"Nover, H.: Algebraic cryptanalysis of aes: an overview. University of Wisconsin, USA, pp. 1\u201316 (2005)"},{"key":"540_CR16","doi-asserted-by":"crossref","unstructured":"Bielik, M., Jure\u010dek, M., Jure\u010dkov\u00e1, O., L\u00f3rencz, R.: Yet another algebraic cryptanalysis of small scale variants of aes. In: International Conference on Security and Cryptography (SECRYPT), pp. 415\u2013427 (2022)","DOI":"10.5220\/0011327900003283"},{"issue":"3","key":"540_CR17","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1006\/jsco.1996.0125","volume":"24","author":"W Bosma","year":"1997","unstructured":"Bosma, W., Cannon, J., Playoust, C.: The magma algebra system I: the user language. J. Symb. Comput. 24(3), 235\u2013265 (1997). https:\/\/doi.org\/10.1006\/jsco.1996.0125","journal-title":"J. Symb. Comput."},{"issue":"1","key":"540_CR18","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/S0022-4049(99)00005-5","volume":"139","author":"J-C Faug\u00e9re","year":"1999","unstructured":"Faug\u00e9re, J.-C.: A new efficient algorithm for computing gr\u00f6bner bases (f4). J. Pure Appl. Algebra 139(1), 61\u201388 (1999). https:\/\/doi.org\/10.1016\/S0022-4049(99)00005-5","journal-title":"J. Pure Appl. Algebra"},{"key":"540_CR19","doi-asserted-by":"publisher","unstructured":"Cid, C., Murphy, S., Robshaw, M.: Algebraic Aspects of the Advanced Encryption Standard. Springer, New York (2006). https:\/\/doi.org\/10.1007\/978-0-387-36842-9","DOI":"10.1007\/978-0-387-36842-9"},{"issue":"2","key":"540_CR20","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/s11786-009-0020-y","volume":"3","author":"S Bulygin","year":"2010","unstructured":"Bulygin, S., Brickenstein, M.: Obtaining and solving systems of equations in key variables only for the small variants of AES. Math. Comput. Sci. 3(2), 185\u2013200 (2010). https:\/\/doi.org\/10.1007\/s11786-009-0020-y","journal-title":"Math. Comput. Sci."},{"key":"540_CR21","doi-asserted-by":"publisher","DOI":"10.2307\/2532178","volume-title":"Finding Groups in Data: An Introduction to Cluster Analysis","author":"L Kaufman","year":"1990","unstructured":"Kaufman, L., Rousseeuw, P.: Finding Groups in Data: An Introduction to Cluster Analysis. Wiley, New York (1990). https:\/\/doi.org\/10.2307\/2532178"},{"key":"540_CR22","unstructured":"Lewin, M.: All About XOR. Overload. [cit. 2022-07-01] (2012). https:\/\/accu.org\/journals\/overload\/20\/109\/lewin_1915\/"},{"key":"540_CR23","unstructured":"Kaufman, L., Rousseeuw, P.J.: Finding Groups in Data: An Introduction to Cluster Analysis. Wiley (2009)"},{"key":"540_CR24","unstructured":"Wang, J., Shen, H.T., Song, J., Ji, J.: Hashing for similarity search: A survey. CoRR arXiv:1408.2927 (2014) 10.48550\/ARXIV.1408.2927 . [cit. 2022-08-27]"},{"key":"540_CR25","unstructured":"Briggs, J.: Faiss: The Missing Manual. [online]. [cit. 2022-07-27]. https:\/\/www.pinecone.io\/learn\/locality-sensitive-hashing\/"},{"key":"540_CR26","doi-asserted-by":"publisher","unstructured":"Giovini, A., Mora, T., Niesi, G., Robbiano, L., Traverso, C.: one sugar cube, please or selection strategies in the buchberger algorithm. In: ISSAC 91: International Symposium on Symbolic Algebraic Computation Bonn West Germany, 49\u201354. Association for Computing Machinery, New York (1991). https:\/\/doi.org\/10.1145\/120694.120701","DOI":"10.1145\/120694.120701"},{"issue":"9","key":"540_CR27","doi-asserted-by":"publisher","first-page":"1326","DOI":"10.1016\/j.jsc.2008.02.017","volume":"44","author":"M Brickenstein","year":"2009","unstructured":"Brickenstein, M., Dreyer, A.: Polybori: a framework for Gr\u00f6bner-basis computations with Boolean polynomials. J. Symb. Comput. 44(9), 1326\u20131345 (2009). https:\/\/doi.org\/10.1016\/j.jsc.2008.02.017","journal-title":"J. Symb. Comput."}],"container-title":["Journal of Computer Virology and Hacking Techniques"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-024-00540-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11416-024-00540-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-024-00540-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,15]],"date-time":"2024-10-15T15:15:58Z","timestamp":1729005358000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11416-024-00540-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,30]]},"references-count":27,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2024,11]]}},"alternative-id":["540"],"URL":"https:\/\/doi.org\/10.1007\/s11416-024-00540-2","relation":{},"ISSN":["2263-8733"],"issn-type":[{"type":"electronic","value":"2263-8733"}],"subject":[],"published":{"date-parts":[[2024,9,30]]},"assertion":[{"value":"22 May 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 September 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 September 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or non-financial interests to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}