{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T11:13:48Z","timestamp":1762341228276},"reference-count":13,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2019,1,29]],"date-time":"2019-01-29T00:00:00Z","timestamp":1548720000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2019,3]]},"DOI":"10.1007\/s11432-018-9658-0","type":"journal-article","created":{"date-parts":[[2019,2,2]],"date-time":"2019-02-02T02:49:32Z","timestamp":1549075772000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Automatic search method for multiple differentials and its application on MANTIS"],"prefix":"10.1007","volume":"62","author":[{"given":"Shiyao","family":"Chen","sequence":"first","affiliation":[]},{"given":"Ru","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Tingting","family":"Cui","sequence":"additional","affiliation":[]},{"given":"Meiqin","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,29]]},"reference":[{"key":"9658_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4613-9314-6","volume-title":"Differential Cryptanalysis of the Data Encryption Standard","author":"E Biham","year":"1993","unstructured":"Biham E, Shamir A. Differential Cryptanalysis of the Data Encryption Standard. Berlin: Springer, 1993"},{"key":"9658_CR2","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-3-642-21702-9_3","volume-title":"Proceedings of International Workshop on Fast Software Encryption","author":"C Blondeau","year":"2011","unstructured":"Blondeau C, G\u00e9rard B. Multiple differential cryptanalysis: theory and practice. In: Proceedings of International Workshop on Fast Software Encryption, 2011. 35\u201354"},{"key":"9658_CR3","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/978-3-642-34047-5_4","volume-title":"Proceedings of International Workshop on Fast Software Encryption","author":"M Q Wang","year":"2012","unstructured":"Wang M Q, Sun Y, Tischhauser E, et al. A model for structure attacks, with applications to PRESENT and Serpent. In: Proceedings of International Workshop on Fast Software Encryption, 2012. 49\u201368"},{"key":"9658_CR4","first-page":"450","volume-title":"Proceedings of International Workshop on Cryptographic Hardware and Embedded Systems","author":"A Bogdanov","year":"2007","unstructured":"Bogdanov A, Knudsen L R, Leander G, et al. PRESENT: an ultra-lightweight block cipher. In: Proceedings of International Workshop on Cryptographic Hardware and Embedded Systems, 2007. 450\u2013466"},{"key":"9658_CR5","first-page":"248","volume-title":"Proceedings of International Workshop on Fast Software Encryption","author":"C Dobraunig","year":"2016","unstructured":"Dobraunig C, Eichlseder M, Kales D, et al. Practical key-recovery attack on MANTIS5. In: Proceedings of International Workshop on Fast Software Encryption, 2016. 248\u2013260"},{"key":"9658_CR6","first-page":"111","volume-title":"Proceedings of International Workshop on Fast Software Encryption","author":"M Eichlseder","year":"2018","unstructured":"Eichlseder M, Kales D. Clustering related-tweak characteristics: application to MANTIS-6. In: Proceedings of International Workshop on Fast Software Encryption, 2018. 111\u2013132"},{"key":"9658_CR7","first-page":"123","volume-title":"Proceedings of Annual International Cryptology Conference","author":"C Beierle","year":"2016","unstructured":"Beierle C, Jean J, K\u00f6lbl S, et al. The SKINNY family of block ciphers and its low-latency variant MANTIS. In: Proceedings of Annual International Cryptology Conference, 2016. 123\u2013153"},{"key":"9658_CR8","first-page":"208","volume-title":"Proceedings of International Conference on the Theory and Application of Cryptology and Information Security","author":"J Borghoff","year":"2012","unstructured":"Borghoff J, Canteaut A, G\u00fcneysu T, et al. PRINCE\u2013a low-latency block cipher for pervasive computing applications. In: Proceedings of International Conference on the Theory and Application of Cryptology and Information Security, 2012. 208\u2013225"},{"key":"9658_CR9","volume-title":"Automatic enumeration of (related-key) differential and linear characteristics with predefined properties and its applications","author":"S W Sun","year":"2014","unstructured":"Sun S W, Hu L, Wang M Q, et al. Automatic enumeration of (related-key) differential and linear characteristics with predefined properties and its applications. 2014. https:\/\/eprint.iacr.org\/eprint-bin\/getfile.pl?entry=2014\/747& version=20140926:084100&file=747.pdf"},{"key":"9658_CR10","volume-title":"Automatic security evaluation and (related-key) differential characteristic search: application to SIMON","author":"S W Sun","year":"2014","unstructured":"Sun S W, Hu L, Wang P, et al. Automatic security evaluation and (related-key) differential characteristic search: application to SIMON, PRESENT, LBlock, DES(L) and other bit-oriented block ciphers. In: Proceedings of International Conference on the Theory and Application of Cryptology and Information Security, 2014. 158\u2013178"},{"key":"9658_CR11","volume-title":"Gurobi optimizer reference manual","author":"Gurobi Optimization.","year":"2018","unstructured":"Gurobi Optimization. Gurobi optimizer reference manual. 2018. http:\/\/www.gurobi.com"},{"key":"9658_CR12","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1137\/0123007","volume":"23","author":"E Balas","year":"1972","unstructured":"Balas E, Jeroslow R. Canonical cuts on the unit hypercube. SIAM J Appl Math, 1972, 23: 61\u201369","journal-title":"Canonical cuts on the unit hypercube. SIAM J Appl Math"},{"key":"9658_CR13","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/s00145-007-9013-7","volume":"21","author":"A A Sel\u00e7uk","year":"2008","unstructured":"Sel\u00e7uk A A. On probability of success in linear and differential cryptanalysis. J Cryptol, 2008, 21: 131\u2013147","journal-title":"J Cryptol"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-018-9658-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-018-9658-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-018-9658-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,28]],"date-time":"2020-01-28T19:26:45Z","timestamp":1580239605000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-018-9658-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,29]]},"references-count":13,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,3]]}},"alternative-id":["9658"],"URL":"https:\/\/doi.org\/10.1007\/s11432-018-9658-0","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1,29]]},"assertion":[{"value":"4 September 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 November 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 January 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"32111"}}