{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:29:16Z","timestamp":1761611356668},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2014,5,6]],"date-time":"2014-05-06T00:00:00Z","timestamp":1399334400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2014,7]]},"DOI":"10.1007\/s11432-014-5096-6","type":"journal-article","created":{"date-parts":[[2014,5,6]],"date-time":"2014-05-06T22:14:58Z","timestamp":1399414498000},"page":"1-11","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["What is the effective key length for a block cipher: an attack on every practical block cipher"],"prefix":"10.1007","volume":"57","author":[{"given":"JiaLin","family":"Huang","sequence":"first","affiliation":[]},{"given":"XueJia","family":"Lai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,5,6]]},"reference":[{"key":"5096_CR1","doi-asserted-by":"crossref","first-page":"447","DOI":"10.1007\/3-540-39799-X_34","volume-title":"Proceedings of Advances in Cryptology","author":"M Luby","year":"1986","unstructured":"Luby M, Rackoff C. How to construct pseudo-random permutations from pseudo-random functions. In: Proceedings of Advances in Cryptology. Berlin\/Heidelberg: Springer, 1986. 447\u2013447"},{"key":"5096_CR2","first-page":"210","volume-title":"Proceedings of Advances in Cryptology","author":"S Even","year":"1993","unstructured":"Even S, Mansour Y. A construction of a cipher from a single pseudorandom permutation. In: Proceedings of Advances in Cryptology. Berlin\/Heidelberg: Springer, 1993. 210\u2013224"},{"key":"5096_CR3","doi-asserted-by":"crossref","first-page":"2161","DOI":"10.1007\/s11432-011-4448-8","volume":"55","author":"B Zhang","year":"2012","unstructured":"Zhang B, Jin C H. Practical security against linear cryptanalysis for SMS4-like ciphers with SP round function. Sci China Inf Sci, 2012, 55: 2161\u20132170","journal-title":"Sci China Inf Sci"},{"key":"5096_CR4","doi-asserted-by":"crossref","unstructured":"Lv J Q. Differential attack on five rounds of the SC2000 block cipher}. J Comput Sci Technol, 2011, 26: 722\u2013731","DOI":"10.1007\/s11390-011-1171-2"},{"key":"5096_CR5","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1007\/s11390-011-9420-y","volume":"26","author":"B Z Su","year":"2011","unstructured":"Su B Z, Wu W L, Zhang W T. Security of the SMS4 block cipher against differential cryptanalysis. J Comput Sci Technol, 2011, 26: 130\u2013138","journal-title":"J Comput Sci Technol"},{"key":"5096_CR6","first-page":"344","volume-title":"Proceedings of the 17th International Conference on the Theory and Application of Cryptology and Information Security","author":"A Bogdanov","year":"2011","unstructured":"Bogdanov A, Khovratovich D, Rechberger C. Biclique cryptanalysis of the full AES. In: Proceedings of the 17th International Conference on the Theory and Application of Cryptology and Information Security, Berlin\/Heidelberg: Springer-Verlag, 2011. 344\u2013371"},{"key":"5096_CR7","volume-title":"Cryptology ePrint Archive, Report 2011\/466","author":"K Jia","year":"2011","unstructured":"Jia K, Yu H, Wang X. A meet-in-the-middle attack on the full KASUMI. Cryptology ePrint Archive, Report 2011\/466, 2011"},{"key":"5096_CR8","volume-title":"Cryptology ePrint Archive, Report 2011\/417","author":"E Biham","year":"2011","unstructured":"Biham E, Dunkelman O, Keller N, et al. New data-efficient attacks on reduced-round IDEA. Cryptology ePrint Archive, Report 2011\/417, 2011"},{"key":"5096_CR9","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1049\/iet-ifs.2011.0342","volume":"6","author":"J Lu","year":"2012","unstructured":"Lu J, Wei Y, Kim J, et al. Cryptanalysis of reduced versions of the Camellia block cipher. IET Inf Secur, 2012, 6: 228\u2013238","journal-title":"IET Inf Secur"},{"key":"5096_CR10","doi-asserted-by":"crossref","first-page":"392","DOI":"10.1007\/978-3-642-29011-4_24","volume":"7237","author":"D Khovratovich","year":"2012","unstructured":"Khovratovich D, Leurent G, Rechberger C. Narrow-Bicliques: cryptanalysis of full IDEA. Lect Note Comput Sci, 2012, 7237: 392\u2013410","journal-title":"Lect Note Comput Sci"},{"key":"5096_CR11","volume-title":"Proceedings of the 1st Advanced Encryption Standard (AES) Conference, Ventura","author":"J Daemen","year":"1998","unstructured":"Daemen J, Rijmen V. AES proposal: Rijndael. In: Proceedings of the 1st Advanced Encryption Standard (AES) Conference, Ventura, 1998"},{"key":"5096_CR12","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1007\/BFb0052334","volume":"1267","author":"M Matsui","year":"1997","unstructured":"Matsui M. New block encryption algorithm MISTY. Lect Note Comput Sci, 1997, 1267: 54\u201368","journal-title":"Lect Note Comput Sci"},{"key":"5096_CR13","doi-asserted-by":"crossref","first-page":"432","DOI":"10.1007\/978-3-540-24691-6_32","volume":"2971","author":"D Kwon","year":"2004","unstructured":"Kwon D, Kim J, Park S, et al. New block cipher: ARIA. Lect Note Comput Sci, 2004, 2971: 432\u2013445","journal-title":"Lect Note Comput Sci"},{"key":"5096_CR14","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1007\/3-540-46416-6_2","volume":"547","author":"X J Lai","year":"1991","unstructured":"Lai X J, Massey J L, Murphy S. Markov ciphers and differential cryptanalysis. Lect Note Comput Sci, 1991, 547: 17\u201338","journal-title":"Lect Note Comput Sci"},{"key":"5096_CR15","unstructured":"3rd Generation Partnership Project. Technical Specification Group Services and System Aspects, 3G Security, Speci- fication of the 3GPP Confidentiality and Integrity Algorithms: KASUMI Specification. V3.1.1. 2001"},{"key":"5096_CR16","first-page":"219","volume-title":"Proceedings of Proceedings of the 12th International Conference on Cryptographic Hardware and Embedded Systems","author":"A Poschmann","year":"2010","unstructured":"Poschmann A, Ling S, Wang H. 256 bit standardized crypto for 650 GE: GOST revisited. In: Proceedings of Proceedings of the 12th International Conference on Cryptographic Hardware and Embedded Systems. Berlin\/Heidelberg: Springer-Verlag, 2010. 219\u2013233"},{"key":"5096_CR17","unstructured":"National Soviet Bureau of Standards. Information Processing System-Cryptographic Protection-Cryptographic Algorithm GOST 28147-89. 1989"},{"key":"5096_CR18","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1007\/978-3-642-34047-5_2","volume-title":"Proceedings of Fast Software Encryption","author":"I Dinur","year":"2012","unstructured":"Dinur I, Dunkelman O, Shamir A. Improved attacks on full GOST. In: Proceedings of Fast Software Encryption. Berlin\/Heidelberg: Springer, 2012. 9\u201328"},{"key":"5096_CR19","doi-asserted-by":"crossref","first-page":"450","DOI":"10.1007\/978-3-540-74735-2_31","volume":"4727","author":"A Bogdanov","year":"2007","unstructured":"Bogdanov A, Knudsen L R, Leander G, et al. PRESENT: an ultra-lightweight block cipher. Lect Note Comput Sci, 2007, 4727: 450\u2013466","journal-title":"Lect Note Comput Sci"},{"key":"5096_CR20","doi-asserted-by":"crossref","first-page":"272","DOI":"10.1007\/978-3-642-04138-9_20","volume":"5747","author":"C D Canni\u00e8re","year":"2009","unstructured":"Canni\u00e8re C D, Dunkelman O, Knezevic M. KATAN and KTANTAN-a family of small and efficient hardware-oriented block ciphers. Lect Note Comput Sci, 2009, 5747: 272\u2013288","journal-title":"Lect Note Comput Sci"},{"key":"5096_CR21","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1007\/978-3-642-19574-7_16","volume":"6544","author":"A Bogdanov","year":"2010","unstructured":"Bogdanov A, Rechberger C. A 3-subset meet-in-the-middle attack: cryptanalysis of the lightweight block cipher KTANTAN. Lect Note Comput Sci, 2010, 6544: 229\u2013240","journal-title":"Lect Note Comput Sci"},{"key":"5096_CR22","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1007\/11894063_4","volume":"4249","author":"D Hong","year":"2006","unstructured":"Hong D, Sung J, Hong S, et al. HIGHT: a new block cipher suitable for low-resource device. Lect Note Comput Sci, 2006, 4249: 46\u201359","journal-title":"Lect Note Comput Sci"},{"key":"5096_CR23","volume-title":"TEA Extensions. Technical Report","author":"R M Needham","year":"1997","unstructured":"Needham R M, Wheeler D J. TEA Extensions. Technical Report, Cambridge University, Cambridge, 1997"},{"key":"5096_CR24","doi-asserted-by":"crossref","first-page":"342","DOI":"10.1007\/978-3-642-23951-9_23","volume":"6917","author":"K Shibutani","year":"2011","unstructured":"Shibutani K, Isobe T, Hiwatari H, et al. Piccolo: an ultra-lightweight block cipher. Lect Note Comput Sci, 2011, 6917: 342\u2013357","journal-title":"Lect Note Comput Sci"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-014-5096-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-014-5096-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-014-5096-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T11:37:56Z","timestamp":1559389076000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-014-5096-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5,6]]},"references-count":24,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2014,7]]}},"alternative-id":["5096"],"URL":"https:\/\/doi.org\/10.1007\/s11432-014-5096-6","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,5,6]]}}}