{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,7]],"date-time":"2025-12-07T13:08:48Z","timestamp":1765112928007},"reference-count":9,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,10,27]],"date-time":"2020-10-27T00:00:00Z","timestamp":1603756800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,10,27]],"date-time":"2020-10-27T00:00:00Z","timestamp":1603756800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2021,1]]},"DOI":"10.1007\/s11432-019-9938-0","type":"journal-article","created":{"date-parts":[[2020,11,3]],"date-time":"2020-11-03T13:03:24Z","timestamp":1604408604000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Secure key-alternating Feistel ciphers without key schedule"],"prefix":"10.1007","volume":"64","author":[{"given":"Yaobin","family":"Shen","sequence":"first","affiliation":[]},{"given":"Hailun","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xuejia","family":"Lai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,27]]},"reference":[{"key":"9938_CR1","volume-title":"The Design of Rijndael: AES-the Advanced Encryption Standard","author":"J Daemen","year":"2013","unstructured":"Daemen J, Rijmen V. The Design of Rijndael: AES-the Advanced Encryption Standard. Berlin: Springer, 2013"},{"key":"9938_CR2","doi-asserted-by":"crossref","unstructured":"Chen S, Lampe R, Lee J, et al. Minimizing the two-round Even-Mansour cipher. In: Proceedings of Annual Cryptology Conference, 2014. 39\u201356","DOI":"10.1007\/978-3-662-44371-2_3"},{"key":"9938_CR3","doi-asserted-by":"crossref","unstructured":"Guo C, Wang L. Revisiting key-alternating Feistel ciphers for shorter keys and multi-user security. In: Proceedings of International Conference on the Theory and Application of Cryptology and Information Security, 2018. 213\u2013243","DOI":"10.1007\/978-3-030-03326-2_8"},{"key":"9938_CR4","doi-asserted-by":"crossref","unstructured":"Bogdanov A, Knudsen L R, Leander G, et al. PRESENT: an ultra-lightweight block cipher. In: Proceedings of International Workshop on Cryptographic Hardware and Embedded Systems, 2007. 450\u2013466","DOI":"10.1007\/978-3-540-74735-2_31"},{"key":"9938_CR5","doi-asserted-by":"crossref","unstructured":"Wu W L, Zhang L. LBlock: a lightweight block cipher. In: Proceedings of International Conference on Applied Cryptography and Network Security, 2011. 327\u2013344","DOI":"10.1007\/978-3-642-21554-4_19"},{"key":"9938_CR6","doi-asserted-by":"crossref","unstructured":"Hong D, Sung J, Hong S, et al. HIGHT: a new block cipher suitable for low-resource device. In: Proceedings of International Workshop on Cryptographic Hardware and Embedded Systems, 2006. 46\u201359","DOI":"10.1007\/11894063_4"},{"key":"9938_CR7","doi-asserted-by":"crossref","unstructured":"Guo J, Peyrin T, Poschmann A, et al. The LED block cipher. In: Proceedings of International Workshop on Cryptographic Hardware and Embedded Systems, 2011. 326\u2013341","DOI":"10.1007\/978-3-642-23951-9_22"},{"key":"9938_CR8","doi-asserted-by":"crossref","unstructured":"Knudsen L, Leander G, Poschmann A, et al. PRINTcipher: a block cipher for IC-printing. In: Proceedings of International Workshop on Cryptographic Hardware and Embedded Systems, 2010. 16\u201332","DOI":"10.1007\/978-3-642-15031-9_2"},{"key":"9938_CR9","doi-asserted-by":"crossref","unstructured":"Nandi M. The characterization of Luby-Rackoff and its optimum single-key variants. In: Proceedings of International Conference on Cryptology in India, 2010. 82\u201397","DOI":"10.1007\/978-3-642-17401-8_7"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-019-9938-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11432-019-9938-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-019-9938-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,27]],"date-time":"2021-10-27T00:04:09Z","timestamp":1635293049000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11432-019-9938-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,27]]},"references-count":9,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["9938"],"URL":"https:\/\/doi.org\/10.1007\/s11432-019-9938-0","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,10,27]]},"assertion":[{"value":"23 April 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 July 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 October 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"119103"}}