{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T15:33:48Z","timestamp":1766158428386},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,12,24]],"date-time":"2019-12-24T00:00:00Z","timestamp":1577145600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,12,24]],"date-time":"2019-12-24T00:00:00Z","timestamp":1577145600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2020,1]]},"DOI":"10.1007\/s11432-019-1507-1","type":"journal-article","created":{"date-parts":[[2019,12,27]],"date-time":"2019-12-27T11:03:07Z","timestamp":1577444587000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Cryptanalysis of PRIMATEs"],"prefix":"10.1007","volume":"63","author":[{"given":"Yanbin","family":"Li","sequence":"first","affiliation":[]},{"given":"Meiqin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Wenqing","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,24]]},"reference":[{"key":"1507_CR1","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1145\/586110.586125","volume-title":"Proceedings of ACM Conference on Computer and Communications Security (CCS)","author":"P Rogaway","year":"2002","unstructured":"Rogaway P. Authenticated-encryption with associated-data. In: Proceedings of ACM Conference on Computer and Communications Security (CCS), 2002. 98\u2013107"},{"key":"1507_CR2","first-page":"531","volume-title":"Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology","author":"M Bellare","year":"2000","unstructured":"Bellare M, Namprempre C. Authenticated encryption: relations among notions and analysis of the generic composition paradigm. In: Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, 2000. 531\u2013545"},{"key":"1507_CR3","first-page":"529","volume-title":"Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology","author":"C Jutla","year":"2001","unstructured":"Jutla C. Encryption modes with almost free message integrity. In: Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology, 2001. 529\u2013544"},{"key":"1507_CR4","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1007\/3-540-45473-X_8","volume-title":"Proceedings of International Workshop on Fast Software Encryption","author":"V Gligor","year":"2002","unstructured":"Gligor V, Donescu P. Fast encryption and authentication: XCBC encryption and XECB authentication modes. In: Proceedings of International Workshop on Fast Software Encryption, 2002. 92\u2013108"},{"key":"1507_CR5","first-page":"365","volume-title":"Proceedings of ACM Transactions on Information and System Security (TISSEC)","author":"P Rogaway","year":"2003","unstructured":"Rogaway P, Bellare M, Black J, et al. OCB: a block-cipher mode of operation for efficient authenticated encryption. In: Proceedings of ACM Transactions on Information and System Security (TISSEC), 2003. 365\u2013403"},{"key":"1507_CR6","unstructured":"National Institute of Standards and Technology (NIST). Advanced encryption standard (AES). FIPS 197. https:\/\/csrc.nist.gov\/csrc\/media\/publications\/fips\/197\/final\/documents\/fips-197.pdf"},{"key":"1507_CR7","volume-title":"Recommendation for block cipher modes of operation: Galois\/counter mode (GCM) and GMAC. NIST Special Publication 800-38D","author":"M Dworkin","year":"2007","unstructured":"Dworkin M. Recommendation for block cipher modes of operation: Galois\/counter mode (GCM) and GMAC. NIST Special Publication 800-38D, 2007. https:\/\/www.govinfo.gov\/content\/pkg\/GOVPUB-C13-1e1d0b2a761f50d919d892b9e020965b\/pdf\/GOVPUB-C13-1e1d0b2a761f50d919d892b9e020965b.pdf"},{"key":"1507_CR8","unstructured":"The CAESAR Committee. CAESAR: competition for authenticated encryption: security, applicability, and robustness. http:\/\/competitions.cr.yp.to\/caesar.html"},{"key":"1507_CR9","unstructured":"Andreeva E, Bilgin B, Bogdanov A, et al. PRIMATEs v1.02: submission to the CAESAR competition. http:\/\/primates.ae\/"},{"key":"1507_CR10","first-page":"197","volume-title":"Proceedings of International Conference on Cryptology in India","author":"D Saha","year":"2014","unstructured":"Saha D, Kuila S, Chowdhury D R. EscApe: diagonal fault analysis of APE. In: Proceedings of International Conference on Cryptology in India, 2014. 197\u2013216"},{"key":"1507_CR11","unstructured":"Minaud B. Improved beer-recovery attack against APE. https:\/\/aezoo.compute.dtu.dk\/doku.php?id=primates"},{"key":"1507_CR12","volume-title":"Applications of key recovery cube-attack-like","author":"P Morawiecki","year":"2015","unstructured":"Morawiecki P, Pieprzyk J, Srebrny M, et al. Applications of key recovery cube-attack-like. 2015. http:\/\/eprint.iacr.org\/2015\/1009.pdf"},{"key":"1507_CR13","first-page":"293","volume":"18","author":"K Lukas","year":"2017","unstructured":"Lukas K, Daemen J. Cube attack on primates. Proc Rom Acad, 2017, 18: 293\u2013306","journal-title":"Proc Rom Acad"},{"key":"1507_CR14","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1007\/978-3-319-12280-9_5","volume-title":"Proceedings of International Conference on Cryptology and Network Security","author":"Y Todo","year":"2014","unstructured":"Todo Y, Aoki K. FFT key recovery for integral attack. In: Proceedings of International Conference on Cryptology and Network Security, 2014. 64\u201381"},{"key":"1507_CR15","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1007\/3-540-45325-3_20","volume-title":"Proceedings of the 8th IMA International Conference on Cryptography and Coding","author":"J Daemen","year":"2001","unstructured":"Daemen J, Rijmen V. The wide trail design strategy. In: Proceedings of the 8th IMA International Conference on Cryptography and Coding, 2001. 222\u2013238"},{"key":"1507_CR16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The Design of Rijndael","author":"J Daemen","year":"2002","unstructured":"Daemen J, Rijmen V. The Design of Rijndael. Berlin: Springer, 2002"},{"key":"1507_CR17","first-page":"2488","volume-title":"Proceedings of IEEE International Symposium on Information Theory","author":"C Boura","year":"2010","unstructured":"Boura C, Canteaut A. A zero-sum proposition for the Keccak-f permutation with 18 rounds. In: Proceedings of IEEE International Symposium on Information Theory, 2010. 2488\u20132492"},{"key":"1507_CR18","volume-title":"Proceedings of Annual Meeting of Chinese Association for Cryptologic Research","author":"M H Yang","year":"2009","unstructured":"Yang M H, Lai X J. The computational method of the algebraic degree of Boolean functions (in Chinese). In: Proceedings of Annual Meeting of Chinese Association for Cryptologic Research, 2009"},{"key":"1507_CR19","volume-title":"Zero-sum distinguishers for reduced Keccak-f and for the core functions of Luffa and Hamsi","author":"J P Aumasson","year":"2009","unstructured":"Aumasson J P, Meier W. Zero-sum distinguishers for reduced Keccak-f and for the core functions of Luffa and Hamsi. 2009. http:\/\/www.131002.net\/data\/papers\/AM09.pdf"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-019-1507-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11432-019-1507-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-019-1507-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,12]],"date-time":"2023-05-12T13:59:48Z","timestamp":1683899988000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11432-019-1507-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,24]]},"references-count":19,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,1]]}},"alternative-id":["1507"],"URL":"https:\/\/doi.org\/10.1007\/s11432-019-1507-1","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12,24]]},"assertion":[{"value":"16 March 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 May 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 August 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 December 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"112106"}}