{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,18]],"date-time":"2024-07-18T06:39:13Z","timestamp":1721284753019},"reference-count":11,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2023,1,30]],"date-time":"2023-01-30T00:00:00Z","timestamp":1675036800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,30]],"date-time":"2023-01-30T00:00:00Z","timestamp":1675036800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2023,3]]},"DOI":"10.1007\/s11432-022-3466-x","type":"journal-article","created":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T06:43:10Z","timestamp":1675233790000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["A revisited security evaluation of Simeck family ciphers against impossible differential cryptanalysis"],"prefix":"10.1007","volume":"66","author":[{"given":"Kai","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Xuejia","family":"Lai","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Guan","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Hu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,30]]},"reference":[{"key":"3466_CR1","first-page":"307","volume-title":"The simeck family of lightweight block ciphers","author":"G Yang","year":"2015","unstructured":"Yang G, Zhu B, Suder V, et al. The simeck family of lightweight block ciphers. In: Proceedings of International Workshop on Cryptographic Hardware and Embedded Systems. Berlin: Springer, 2015. 307\u2013329"},{"key":"3466_CR2","first-page":"216","volume":"258","author":"L Knudsen","year":"1998","unstructured":"Knudsen L. DEAL-a 128-bit block cipher. Complexity, 1998, 258: 216","journal-title":"Complexity"},{"key":"3466_CR3","first-page":"12","volume-title":"Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials","author":"E Biham","year":"1999","unstructured":"Biham E, Biryukov A, Shamir A. Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. In: Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 1999. 12\u201323"},{"key":"3466_CR4","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1049\/iet-ifs.2016.0590","volume":"12","author":"S Sadeghi","year":"2018","unstructured":"Sadeghi S, Bagheri N. Improved zero-correlation and impossible differential cryptanalysis of reduced-round SIMECK block cipher. IET Inf Secur, 2018, 12: 314\u2013325","journal-title":"IET Inf Secur"},{"key":"3466_CR5","first-page":"116","volume-title":"Automatic search for related-key differential trails in SIMON-like block ciphers based on MILP","author":"X Wang","year":"2018","unstructured":"Wang X, Wu B, Hou L, et al. Automatic search for related-key differential trails in SIMON-like block ciphers based on MILP. In: Proceedings of International Conference on Information Security. Cham: Springer, 2018. 116\u2013131"},{"key":"3466_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s42400-021-00081-x","volume":"4","author":"X Wang","year":"2021","unstructured":"Wang X, Wu B, Hou L, et al. Searching for impossible subspace trails and improved impossible differential characteristics for SIMON-like block ciphers. Cybersecurity, 2021, 4: 1\u201314","journal-title":"Cybersecurity"},{"key":"3466_CR7","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/CC.2018.8300272","volume":"15","author":"K Zhang","year":"2018","unstructured":"Zhang K, Guan J, Hu B. Automatic search of impossible differentials and zero-correlation linear hulls for ARX ciphers. China Commun, 2018, 15: 54\u201366","journal-title":"China Commun"},{"key":"3466_CR8","first-page":"464","volume-title":"Generic key recovery attack on Feis-tel scheme","author":"T Isobe","year":"2013","unstructured":"Isobe T, Shibutani K. Generic key recovery attack on Feis-tel scheme. In: Proceedings of International Conference on the Theory and Application of Cryptology and Information Security. Berlin: Springer, 2013. 464\u2013485"},{"key":"3466_CR9","first-page":"125","volume-title":"Improved zero-correlation crypt-analysis on SIMON","author":"L Sun","year":"2015","unstructured":"Sun L, Fu K, Wang M. Improved zero-correlation crypt-analysis on SIMON. In: Proceedings of International Conference on Information Security and Cryptology. Cham: Springer, 2015. 125\u2013143"},{"key":"3466_CR10","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1049\/iet-ifs.2016.0503","volume":"12","author":"K Zhang","year":"2018","unstructured":"Zhang K, Guan J, Hu B, et al. Security evaluation on Simeck against zero-correlation linear cryptanalysis. IET Inf Security, 2018, 12: 87\u201393","journal-title":"IET Inf Security"},{"key":"3466_CR11","first-page":"179","volume":"8873","author":"C Boura","year":"2014","unstructured":"Boura C, Naya-Plasencia M, Suder V. Scrutinizing and improving impossible differential attacks: applications to CLEFIA, Camellia, LBlock and SIMON. In: Proceedings of International Conference on the Theory and Application of Cryptology and Information Security, 2014. 8873: 179\u2013199","journal-title":"Proceedings of International Conference on the Theory and Application of Cryptology and Information Security"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-022-3466-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11432-022-3466-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-022-3466-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,18]],"date-time":"2024-04-18T20:30:46Z","timestamp":1713472246000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11432-022-3466-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,30]]},"references-count":11,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,3]]}},"alternative-id":["3466"],"URL":"https:\/\/doi.org\/10.1007\/s11432-022-3466-x","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,1,30]]},"assertion":[{"value":"15 January 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 March 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 March 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 January 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"139106"}}