{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T06:12:02Z","timestamp":1747807922520},"reference-count":10,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2010,3,1]],"date-time":"2010-03-01T00:00:00Z","timestamp":1267401600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2010,3]]},"DOI":"10.1007\/s11432-010-0048-2","type":"journal-article","created":{"date-parts":[[2010,3,1]],"date-time":"2010-03-01T06:47:01Z","timestamp":1267426021000},"page":"546-556","source":"Crossref","is-referenced-by-count":8,"title":["Differential-algebraic cryptanalysis of reduced-round of Serpent-256"],"prefix":"10.1007","volume":"53","author":[{"given":"MeiQin","family":"Wang","sequence":"first","affiliation":[]},{"given":"XiaoYun","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Lucas C.K.","family":"Hui","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,3,1]]},"reference":[{"key":"48_CR1","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E. Biham","year":"1991","unstructured":"Biham E, Shamir A. Differential cryptanalysis of DES-like cryptosystems. J Cryptol, 1991, 4: 3\u201372","journal-title":"J Cryptol"},{"key":"48_CR2","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4613-9314-6","volume-title":"Differential Cryptanalysis of the Data Encryption Standard","author":"E. Biham","year":"1993","unstructured":"Biham E, Shamir A. Differential Cryptanalysis of the Data Encryption Standard. Berlin: Springer-Verlag, 1993"},{"key":"48_CR3","series-title":"LNCS","first-page":"386","volume-title":"Advances in Cryptology Eurocrypt 1993","author":"M. Matsui","year":"1993","unstructured":"Matsui M. Linear cryptanalysis method for DES cipher. In: Helleseth T, ed. Advances in Cryptology Eurocrypt 1993. LNCS 765. Berlin: Springer-Verlag, 1993. 386\u2013397"},{"key":"48_CR4","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1007\/3-540-36178-2_17","volume-title":"Advances in Cryptology ASIACRYPT 2002","author":"N. T. Courtois","year":"2002","unstructured":"Courtois N T, Piepryyk J. Cryptanalysis of block ciphers with overdefined systems of equations. In: Zheng Y L, ed. Advances in Cryptology ASIACRYPT 2002, LNCS 2501. Berlin: Springer-Verlag, 2002. 267\u2013287"},{"key":"48_CR5","series-title":"LNCS","first-page":"193","volume-title":"Fast Software Encryption FSE 2009","author":"M. Albrecht","year":"2009","unstructured":"Albrecht M, Cid C. Algebraic techniques in differential cryptanalysis. In: Fast Software Encryption FSE 2009, LNCS 5665. Berlin: Springer-Verlag, 2009. 193\u2013208"},{"key":"48_CR6","series-title":"LNCS","first-page":"308","volume-title":"Progress in Cryptology Indocrypt 2008","author":"D. Orr","year":"2008","unstructured":"Orr D, Sebastiaan I, Nathan K. A differential-linear attack on 12-round Serpent. In: Progress in Cryptology Indocrypt 2008, LNCS 5365. Berlin: Springer-Verlag, 2008. 308\u2013321"},{"key":"48_CR7","unstructured":"Anderson R J, Biham E, Knudsen L R. Serpent: A proposal for the Advanced Encryption Standard. Available at: http:\/\/www.cs.technion.ac.il\/biham\/Reports\/Serpent"},{"key":"48_CR8","unstructured":"NIST. A request for candidate algorithm nominations for the AES. Available online at http:\/\/www.nist.gov\/aes"},{"key":"48_CR9","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1007\/3-540-44987-6_21","volume-title":"Advances in Cryptology Eurocrypt 2001","author":"E. Biham","year":"2001","unstructured":"Biham E, Dunkelman O, Keller N. The rectangle attack-rectangling the Serpent. In: Pfitzmann B, ed. Advances in Cryptology Eurocrypt 2001, LNCS 2045. Berlin: Springer-Verlag, 2001. 340\u2013357"},{"key":"48_CR10","series-title":"LNCS","first-page":"174","volume-title":"Security in Communication Networks SCN 2002","author":"A. A. Selcuk","year":"2002","unstructured":"Selcuk A A, Bicak A. On probability of success in linear and differential cryptanalysis. In: Cimato S, Galdi C, Persiano G, eds. Security in Communication Networks SCN 2002, LNCS 2576. Berlin: Springer-Verlag, 2002. 174\u2013185"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-010-0048-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-010-0048-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-010-0048-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T15:36:03Z","timestamp":1559403363000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-010-0048-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,3]]},"references-count":10,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2010,3]]}},"alternative-id":["48"],"URL":"https:\/\/doi.org\/10.1007\/s11432-010-0048-2","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,3]]}}}