{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:30:42Z","timestamp":1761676242810},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2015,1,20]],"date-time":"2015-01-20T00:00:00Z","timestamp":1421712000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2015,3]]},"DOI":"10.1007\/s11432-014-5219-0","type":"journal-article","created":{"date-parts":[[2015,1,20]],"date-time":"2015-01-20T03:49:59Z","timestamp":1421725799000},"page":"1-14","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["The DBlock family of block ciphers"],"prefix":"10.1007","volume":"58","author":[{"given":"WenLing","family":"Wu","sequence":"first","affiliation":[]},{"given":"Lei","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"XiaoLi","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,1,20]]},"reference":[{"key":"5219_CR1","volume-title":"Information Security and Cryptography","author":"J Daemen","year":"2002","unstructured":"Daemen J, Rijmen V. The design of Rijndael. In: Information Security and Cryptography. Berlin: Springer-Verlag, 2002"},{"key":"5219_CR2","first-page":"1","volume":"5912","author":"A Biryukov","year":"2009","unstructured":"Biryukov A, Khovratovich D. Related-key cryptanalysis of the full AES-192 and AES-256. In: Matsui M, ed. Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, 2009. 5912: 1\u201318","journal-title":"Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan"},{"key":"5219_CR3","first-page":"231","volume":"5677","author":"A Biryukov","year":"2009","unstructured":"Biryukov A, Khovratovich D, Nikolic I. Distinguisher and related-key attack on the full AES-256. In: Halevi S, ed. Proceedings of the 29th Annual International Cryptology Conference on Advances in Cryptology, Santa Barbara, CA, USA, 2009. 5677: 231\u2013249","journal-title":"Proceedings of the 29th Annual International Cryptology Conference on Advances in Cryptology, Santa Barbara, CA, USA"},{"key":"5219_CR4","first-page":"322","volume":"6110","author":"A Biryukov","year":"2010","unstructured":"Biryukov A, Nikolic I. Automatic search for related-key differential characteristics in byte-oriented block ciphers: Application to AES, Camellia, Khazad and others. In: Gilbert H, ed. Proceedings of the 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, 2010. 6110: 322\u2013344","journal-title":"Proceedings of the 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera"},{"key":"5219_CR5","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1007\/978-3-540-74462-7_2","volume":"4356","author":"W Zhang","year":"2006","unstructured":"Zhang W, Wu W, Zhang L, et al. Improved related-Key impossible differential attacks on reduced-round AES-192. In: Biham E, Youssef A M., eds. Proceedings of the 13th International Workshop on Selected Areas in Cryptography-SAC, Montreal, Canada, 2006. 4356: 15\u201327","journal-title":"Proceedings of the 13th International Workshop on Selected Areas in Cryptography-SAC, Montreal, Canada"},{"key":"5219_CR6","first-page":"344","volume":"7073","author":"A Bogdanov","year":"2011","unstructured":"Bogdanov A, Khovratovich D, Rechberger C. Biclique Cryptanalysis of the Full AES. In: Lee D H, Wang X, eds. Proceedings of the 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, 2011. 7073: 344\u2013371","journal-title":"Proceedings of the 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea"},{"key":"5219_CR7","first-page":"450","volume":"4727","author":"A Bogdanov","year":"2007","unstructured":"Bogdanov A, Knudsen L, Leander G, et al. PRESENT: An ultra-lightweight block cipher. In: Paillier P, Verbauwhede I, eds. Proceedings of the 9th International Workshop on Cryptographic Hardware and Embedded Systems, Vienna, Austria, 2007. 4727: 450\u2013466","journal-title":"Proceedings of the 9th International Workshop on Cryptographic Hardware and Embedded Systems, Vienna, Austria"},{"key":"5219_CR8","first-page":"46","volume":"4249","author":"D Hong","year":"2006","unstructured":"Hong D, Sung J, Hong S, et al. HIGHT: A new block cipher suitable for low-resource device. In: Goubin L, Matsui M, eds. Proceedings of the 8th International Workshop on Cryptographic Hardware and Embedded Systems, Yokohama, Japan, 2006. 4249: 46\u201359","journal-title":"Proceedings of the 8th International Workshop on Cryptographic Hardware and Embedded Systems, Yokohama, Japan"},{"key":"5219_CR9","first-page":"272","volume":"5747","author":"C Canniere","year":"2009","unstructured":"Canniere C, Dunkelman O, Knezevic M. KATAN and KTANTAN-A family of small and efficient hardware-oriented block ciphers. In: Clavier C, Gaj K, eds. Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems, Lausanne, Switzerland, 2009. 5747: 272\u2013288","journal-title":"Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems, Lausanne, Switzerland"},{"key":"5219_CR10","doi-asserted-by":"crossref","first-page":"327","DOI":"10.1007\/978-3-642-21554-4_19","volume":"6715","author":"W Wu","year":"2011","unstructured":"Wu W, Zhang L. LBlock: A lightweight block cipher. In: Lopez J, Tsudik G, eds. Proceedings of the 9th International Conference on Applied Cryptography and Network Security, Nerja, Spain, 2011. 6715: 327\u2013344","journal-title":"Proceedings of the 9th International Conference on Applied Cryptography and Network Security, Nerja, Spain"},{"key":"5219_CR11","first-page":"326","volume":"6917","author":"J Guo","year":"2011","unstructured":"Guo J, Peyrin T, Poschmann A, et al. The led block cipher. In: Preneel B, Takagi T, eds. Proceedings of the 13th International Workshop on Cryptographic Hardware and Embedded Systems, Nara, Japan, 2011. 6917: 326\u2013341","journal-title":"Proceedings of the 13th International Workshop on Cryptographic Hardware and Embedded Systems, Nara, Japan"},{"key":"5219_CR12","first-page":"342","volume":"6917","author":"K Shibutani","year":"2011","unstructured":"Shibutani K, Isobe T, Hiwatari H, et al. Piccolo: An ultra-lightweight blockcipher. In: Preneel B, Takagi T, eds. Proceedings of the 13th International Workshop on Cryptographic Hardware and Embedded Systems, Nara, Japan, 2011. 6917: 342\u2013357","journal-title":"Proceedings of the 13th International Workshop on Cryptographic Hardware and Embedded Systems, Nara, Japan"},{"key":"5219_CR13","first-page":"131","volume":"3357","author":"P Junod","year":"2004","unstructured":"Junod P, Vaudenay S. FOX: A new family of block ciphers. In: Handschuh H, Hasan M A, eds. Proceedings of the 11th International Workshop on Selected Areas in Cryptography, Waterloo, Canada, 2004. 3357: 131\u2013146","journal-title":"Proceedings of the 11th International Workshop on Selected Areas in Cryptography, Waterloo, Canada"},{"key":"5219_CR14","first-page":"432","volume":"2971","author":"D Kwon","year":"2003","unstructured":"Kwon D, Kim J, Park S, et al. New block cipher: ARIA. In: Lim J I, Lee D H, eds. Proceedings of the 6th International Conference on Information Security and Cryptology, Seoul, Korea, 2003. 2971: 432\u2013445","journal-title":"Proceedings of the 6th International Conference on Information Security and Cryptology, Seoul, Korea"},{"key":"5219_CR15","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/978-3-540-74619-5_12","volume":"4593","author":"T Shirai","year":"2007","unstructured":"Shirai T, Shibutani K, Akishita T, et al. The 128-bit blockcipher CLEFIA (Extended Abstract). In: Biryukov A, ed. Proceedings of the 14th International Workshop on Fast Software Encryption, Luxembourg, Luxembourg, 2007. 4593: 181\u2013195","journal-title":"Proceedings of the 14th International Workshop on Fast Software Encryption, Luxembourg, Luxembourg"},{"key":"5219_CR16","volume-title":"What is the effective key length for a block cipher: An attack on every block cipher","author":"J Huang","year":"2012","unstructured":"Huang J, Lai X. What is the effective key length for a block cipher: An attack on every block cipher. http:\/\/eprint.iacr.org\/2012\/677.pdf (2012)"},{"key":"5219_CR17","doi-asserted-by":"crossref","first-page":"252","DOI":"10.1007\/978-3-540-89641-8_18","volume":"5339","author":"J Nakahara Jr","year":"2008","unstructured":"Nakahara Jr J. 3D: A three-dimensional block cipher. In: Franklin M K, Hui L C K, Wong D S, eds. Proceedings of the 7th International Conference on Cryptology and Network Security, Hong-Kong, China, 2008. 5339: 252\u2013267","journal-title":"Proceedings of the 7th International Conference on Cryptology and Network Security, Hong-Kong, China"},{"key":"5219_CR18","volume-title":"The skein hash function family. Submission to NIST, Round 3","author":"N Ferguson","year":"2010","unstructured":"Ferguson N, Lucks S, Schneier B, et al. The skein hash function family. Submission to NIST, Round 3, 2010, http:\/\/www.skein-hash.info"},{"key":"5219_CR19","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/978-3-642-13858-4_2","volume":"6147","author":"T Suzaki","year":"2010","unstructured":"Suzaki T, Minematsu K. Improving the generalized Feistel. In: Hong S, Iwata T, eds. Proceedings of the 17th International Workshop Fast Software Encryption, Seoul, Korea, 2010. 6147: 19\u201339","journal-title":"Proceedings of the 17th International Workshop Fast Software Encryption, Seoul, Korea"},{"key":"5219_CR20","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4613-9314-6","volume-title":"Differential Cryptanalysis of the Data Encryption Standard","author":"E Biham","year":"1993","unstructured":"Biham E, Shamir A. Differential Cryptanalysis of the Data Encryption Standard. Berlin: Springer-Verlag, 1993"},{"key":"5219_CR21","first-page":"386","volume":"765","author":"M Matsui","year":"1993","unstructured":"Matsui M. Linear cryptoanalysis method for DES cipher. In: Helleseth T, ed. Proceedings of the Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, 1993. 765: 386\u2013397","journal-title":"Proceedings of the Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway"},{"key":"5219_CR22","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1007\/s00145-005-0129-3","volume":"18","author":"E Biham","year":"2005","unstructured":"Biham E, Biryukov A, Shamir A. Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials. J Crypt, 2005, 18: 291\u2013311","journal-title":"J Crypt"},{"key":"5219_CR23","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1007\/3-540-45661-9_9","volume":"2365","author":"L Knudsen","year":"2002","unstructured":"Knudsen L, Wagner D. Integral cryptanalysis. In: Daemen J, Rijmen V, eds. Proceedings of the 9th International Workshop on Fast Software Encryption, Leuven, Belgium, 2002. 2365: 112\u2013127","journal-title":"Proceedings of the 9th International Workshop on Fast Software Encryption, Leuven, Belgium"},{"key":"5219_CR24","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1007\/BF00203965","volume":"7","author":"E Biham","year":"1994","unstructured":"Biham E. New types of cryptanalytic attacks using related keys. J Crypt, 1994, 7: 229\u2013246","journal-title":"J Crypt"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-014-5219-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-014-5219-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-014-5219-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,19]],"date-time":"2019-08-19T17:56:55Z","timestamp":1566237415000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-014-5219-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,1,20]]},"references-count":24,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2015,3]]}},"alternative-id":["5219"],"URL":"https:\/\/doi.org\/10.1007\/s11432-014-5219-0","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,1,20]]}}}