{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,12,12]],"date-time":"2023-12-12T05:21:09Z","timestamp":1702358469042},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Syst Sci Complex"],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.1007\/s11424-023-1511-7","type":"journal-article","created":{"date-parts":[[2023,12,12]],"date-time":"2023-12-12T00:02:22Z","timestamp":1702339342000},"page":"2681-2702","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Algebraic-Differential Attacks on a Family of Arithmetization-Oriented Symmetric Ciphers"],"prefix":"10.1007","volume":"36","author":[{"given":"Zhengnan","family":"Li","sequence":"first","affiliation":[]},{"given":"Baofeng","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Dongdai","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,12]]},"reference":[{"issue":"3","key":"1511_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.46586\/tosc.v2020.i3.1-45","volume":"2020","author":"A Aly","year":"2020","unstructured":"Aly A, Ashur T, Ben-Sasson E, et al., Design of symmetric-key primitives for advanced cryptographic protocols, IACR Trans. Symmetric Cryptol., 2020, 2020(3): 1\u201345.","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"1511_CR2","doi-asserted-by":"crossref","unstructured":"Albrecht M, Rechberger C, Schneider T, et al., Ciphers for MPC and FHE, Advances in Cryptology - EUROCRYPT 2015-34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, 2015.","DOI":"10.1007\/978-3-662-46800-5_17"},{"key":"1511_CR3","doi-asserted-by":"crossref","unstructured":"Albrecht M, Grassi L, Rechberger C, et al., MiMC: Efficient encryption and cryptographic hashing with minimal multiplicative complexity, Advances in Cryptology - ASIACRYPT 2016-22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, 2016.","DOI":"10.1007\/978-3-662-53887-6_7"},{"key":"1511_CR4","unstructured":"Ashur T and Dhooghe S, MARVELlous: A STARK-friendly family of cryptographic primitives, 2018, https:\/\/eprint.iacr.org\/2018\/1098."},{"key":"1511_CR5","doi-asserted-by":"crossref","unstructured":"Albrecht M, Grassi L, Perrin L, et al., Feistel structures for MPC, and more, Computer Security -ESORICS 2019-24th European Symposium on Research in Computer Security, Luxembourg, 2019.","DOI":"10.1007\/978-3-030-29962-0_8"},{"key":"1511_CR6","doi-asserted-by":"crossref","unstructured":"Grassi L, Luftenegger R, Rechberger C, et al., On a generalization of substitution-permutation networks: The HADES design strategy, Advances in Cryptology - EUROCRYPT 2020-39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, 2020.","DOI":"10.1007\/978-3-030-45724-2_23"},{"key":"1511_CR7","unstructured":"Canteaut A, Beyne T, Dinuret I, et al., Report on the security of stark-friendly hash functions (version 2.0), 2020, https:\/\/hal.inria.fr\/hal-02883253\/document."},{"key":"1511_CR8","doi-asserted-by":"crossref","unstructured":"Dinur I, Liu Y, Meier W, et al., Optimized interpolation attacks on LowMC, Advances in Cryptology - ASIACRYPT 2015-21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, 2015.","DOI":"10.1007\/978-3-662-48800-3_22"},{"key":"1511_CR9","doi-asserted-by":"crossref","unstructured":"Dobraunig C, Eichlseder M, and Mendel F, Higher-order cryptanalysis of LowMC, Information Security and Cryptology - ICISC 2015\u201318th International Conference, Seoul, 2015.","DOI":"10.1007\/978-3-319-30840-1_6"},{"issue":"3","key":"1511_CR10","doi-asserted-by":"publisher","first-page":"163","DOI":"10.46586\/tosc.v2018.i3.163-181","volume":"2018","author":"C Rechberger","year":"2018","unstructured":"Rechberger C, Soleimany H, and Tiessen T, Cryptanalysis of low-data instances of full LowMCv2, IACR Trans. Symmetric Cryptol., 2018, 2018(3): 163\u2013181.","journal-title":"IACR Trans. Symmetric Cryptol."},{"issue":"4","key":"1511_CR11","doi-asserted-by":"publisher","first-page":"130","DOI":"10.46586\/tosc.v2020.i4.130-146","volume":"2020","author":"S Banik","year":"2020","unstructured":"Banik S, Barooti K, Durak F, et al., Cryptanalysis of LowMC instances using single plaintext\/ciphertext pair, IACR Trans. Symmetric Cryptol., 2020, 2020(4): 130\u2013146.","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"1511_CR12","doi-asserted-by":"crossref","unstructured":"Albrecht M, Cid C, Grassi L, et al., Algebraic cryptanalysis of STARK-friendly designs: Application to MARVELlous and MiMC, Advances in Cryptology - ASIACRYPT 2019\u201325th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, 2019.","DOI":"10.1007\/978-3-030-34618-8_13"},{"key":"1511_CR13","doi-asserted-by":"crossref","unstructured":"Li C and Preneel B, Improved interpolation attacks on cryptographic primitives of low algebraic degree, Selected Areas in Cryptography-SAC 2019\u201326th International Conference, Waterloo, 2019.","DOI":"10.1007\/978-3-030-38471-5_8"},{"key":"1511_CR14","doi-asserted-by":"crossref","unstructured":"Roy A, Andreeva E, and Sauer J, Interpolation cryptanalysis of unbalanced feistel networks with low degree round functions, Selected Areas in Cryptography - SAC 2020-27th International Conference, Halifax, 2020.","DOI":"10.1007\/978-3-030-81652-0_11"},{"key":"1511_CR15","doi-asserted-by":"crossref","unstructured":"Beyne T, Canteaut A, Dinur I, et al., Out of oddity-new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems, Advances in Cryptology - CRYPTO 2020\u201340th Annual International Cryptology Conference, Santa Barbara, 2020.","DOI":"10.1007\/978-3-030-56877-1_11"},{"key":"1511_CR16","doi-asserted-by":"crossref","unstructured":"Eichlseder M, Grassi L, L\u00fcftenegger R, et al., An algebraic attack on ciphers with low-degree round functions: Application to full MiMC, Advances in Cryptology - ASIACRYPT 2020\u201326th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, 2020.","DOI":"10.1007\/978-3-030-64837-4_16"},{"key":"1511_CR17","doi-asserted-by":"crossref","unstructured":"Bertoni G, Daemen J, Peeters M, et al., On the indifferentiability of the sponge construction, Advances in Cryptology-EUROCRYPT 2008-27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, 2008.","DOI":"10.1007\/978-3-540-78967-3_11"},{"issue":"6","key":"1511_CR18","doi-asserted-by":"publisher","first-page":"1218","DOI":"10.1007\/s11424-011-0218-3","volume":"24","author":"Y Sun","year":"2011","unstructured":"Sun Y and Wang D, The F5 algorithm in Buchberger\u2019s style, Journal of Systems Science & Complexity, 2011, 24(6): 1218\u20131231.","journal-title":"Journal of Systems Science & Complexity"},{"key":"1511_CR19","doi-asserted-by":"publisher","first-page":"546","DOI":"10.1007\/s11432-010-0048-2","volume":"53","author":"M Wang","year":"2010","unstructured":"Wang M, Wang X, and Hui L, Differential-algebraic cryptanalysis of reduced-round of serpent 256, Sci. China Inf. Sci., 2010, 53: 546\u2013556.","journal-title":"Sci. China Inf. Sci."},{"issue":"1","key":"1511_CR20","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1007\/s11424-019-8357-z","volume":"32","author":"D Lu","year":"2019","unstructured":"Lu D, Sun Y, and Wang D, A survey on algorithms for computing comprehensive Gr\u00f6bner systems and comprehensive Gr\u00f6bner bases, Journal of Systems Science & Complexity, 2019, 32(1): 234\u2013255.","journal-title":"Journal of Systems Science & Complexity"}],"container-title":["Journal of Systems Science and Complexity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11424-023-1511-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11424-023-1511-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11424-023-1511-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,12]],"date-time":"2023-12-12T00:08:48Z","timestamp":1702339728000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11424-023-1511-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12]]},"references-count":20,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2023,12]]}},"alternative-id":["1511"],"URL":"https:\/\/doi.org\/10.1007\/s11424-023-1511-7","relation":{},"ISSN":["1009-6124","1559-7067"],"issn-type":[{"value":"1009-6124","type":"print"},{"value":"1559-7067","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12]]},"assertion":[{"value":"27 December 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 March 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 December 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare no conflict of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}]}}