{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:45:41Z","timestamp":1762004741309,"version":"build-2065373602"},"reference-count":9,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2018,4,23]],"date-time":"2018-04-23T00:00:00Z","timestamp":1524441600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1007\/s11432-017-9231-5","type":"journal-article","created":{"date-parts":[[2018,4,28]],"date-time":"2018-04-28T10:32:44Z","timestamp":1524911564000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Differential attacks on reduced SIMON versions with dynamic key-guessing techniques"],"prefix":"10.1007","volume":"61","author":[{"given":"Ning","family":"Wang","sequence":"first","affiliation":[]},{"given":"Xiaoyun","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Keting","family":"Jia","sequence":"additional","affiliation":[]},{"given":"Jingyuan","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,23]]},"reference":[{"key":"9231_CR1","volume-title":"IACR Cryptology ePrint Archive","author":"R Beaulieu","year":"2013","unstructured":"Beaulieu R, Shors D, Smith J, et al. The simon and speck families of lightweight block ciphers. IACR Cryptology ePrint Archive, 2013. https:\/\/eprint.iacr.org\/2013\/404.pdf"},{"key":"9231_CR2","first-page":"525\u2013545","volume-title":"Proceedings of International Conference on Fast Software Encryption","author":"F Abed","year":"2014","unstructured":"Abed F, List E, Lucks S, et al. Differential cryptanalysis of round-reduced simon and Speck. In: Proceedings of International Conference on Fast Software Encryption, London, 2014. 525\u2013545"},{"key":"9231_CR3","first-page":"546\u2013570","volume-title":"Proceedings of International Conference on Fast Software Encryption","author":"A Biryukov","year":"2014","unstructured":"Biryukov A, Roy A, Velichkov V. Differential analysis of block ciphers simon and speck. In: Proceedings of International Conference on Fast Software Encryption, London, 2014. 546\u2013570"},{"key":"9231_CR4","first-page":"139\u2013156","volume-title":"Proceedings of International Conference on Cryptology and Information Security in Latin America","author":"I Dinur","year":"2015","unstructured":"Dinur I, Dunkelman O, Gutman M, et al. Improved top-down techniques in differential cryptanalysis. In: Proceedings of International Conference on Cryptology and Information Security in Latin America, Guadalajara, 2015. 139\u2013156"},{"key":"9231_CR5","first-page":"158\u2013178","volume-title":"Proceedings of International Conference on the Theory and Application of Cryptology and Information Security","author":"S W Sun","year":"2014","unstructured":"Sun S W, Hu L, Wang P, et al. Automatic security evaluation and related-key differential characteristic search: application to simon, present, lblock, desl and other bit-oriented block ciphers. In: Proceedings of International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, 2014. 158\u2013178"},{"key":"9231_CR6","first-page":"17\u201336","volume-title":"Proceedings of Annual International Cryptology Conference","author":"X Y Wang","year":"2005","unstructured":"Wang X Y, Yin Y L, Yu H B. Finding collisions in the full SHA-1. In: Proceedings of Annual International Cryptology Conference, Santa Barbara, 2005. 17\u201336"},{"key":"9231_CR7","first-page":"428\u2013449","volume-title":"Proceedings of International Conference on Information Systems Security and Privacy","author":"K X Qiao","year":"2016","unstructured":"Qiao K X, Hu L, Sun S W. Differential analysis on simeck and simon with dynamic key-guessing techniques. In: Proceedings of International Conference on Information Systems Security and Privacy, Rome, 2016. 428\u2013449"},{"key":"9231_CR8","first-page":"61\u201375","volume-title":"Proceedings of International Conference on Fast Software Encryption","author":"U K\u00fchn","year":"2002","unstructured":"K\u00fchn U. Improved cryptanalysis of MISTY1. In: Proceedings of International Conference on Fast Software Encryption, Leuven, 2002. 61\u201375"},{"key":"9231_CR9","first-page":"428\u2013449","volume-title":"Proceedings of International Conference on Fast Software Encryption","author":"H F Chen","year":"2016","unstructured":"Chen H F, Wang X Y. Improved linear hull attack on round-reduced simon with dynamic key-guessing techniques. In: Proceedings of International Conference on Fast Software Encryption, Bochum, 2016. 428\u2013449"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-017-9231-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-017-9231-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-017-9231-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,22]],"date-time":"2019-04-22T23:26:40Z","timestamp":1555975600000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-017-9231-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4,23]]},"references-count":9,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2018,9]]}},"alternative-id":["9231"],"URL":"https:\/\/doi.org\/10.1007\/s11432-017-9231-5","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"type":"print","value":"1674-733X"},{"type":"electronic","value":"1869-1919"}],"subject":[],"published":{"date-parts":[[2018,4,23]]},"assertion":[{"value":"16 June 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 August 2017","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 April 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"098103"}}