{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,6]],"date-time":"2024-11-06T05:25:25Z","timestamp":1730870725778,"version":"3.28.0"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2024,8,13]],"date-time":"2024-08-13T00:00:00Z","timestamp":1723507200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,8,13]],"date-time":"2024-08-13T00:00:00Z","timestamp":1723507200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2024,9]]},"DOI":"10.1007\/s11432-023-3901-0","type":"journal-article","created":{"date-parts":[[2024,11,5]],"date-time":"2024-11-05T11:08:11Z","timestamp":1730804891000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["LOL: a highly flexible framework for designing stream ciphers"],"prefix":"10.1007","volume":"67","author":[{"given":"Dengguo","family":"Feng","sequence":"first","affiliation":[]},{"given":"Lin","family":"Jiao","sequence":"additional","affiliation":[]},{"given":"Yonglin","family":"Hao","sequence":"additional","affiliation":[]},{"given":"Qunxiong","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Wenling","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Wenfeng","family":"Qi","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Liting","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Siwei","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Tian","family":"Tian","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,13]]},"reference":[{"key":"3901_CR1","volume-title":"From GSM to LTE-Advanced: An Introduction to Mobile Networks and Mobile Broadband","author":"S Martin","year":"2014","unstructured":"Martin S. Global system for mobile communications (GSM). In: From GSM to LTE-Advanced: An Introduction to Mobile Networks and Mobile Broadband. Hoboken: Wiley, 2014"},{"key":"3901_CR2","volume-title":"Specification of the 3GPP confidentiality and integrity algorithms UEA2 & UIA2. Document 1: UEA2 and UIA2 specification","author":"ETSI\/SAGE Specification","year":"2009","unstructured":"ETSI\/SAGE Specification. Specification of the 3GPP confidentiality and integrity algorithms UEA2 & UIA2. Document 1: UEA2 and UIA2 specification. 2009. https:\/\/www.gsma.com\/about-us\/wp-content\/uploads\/2014\/12\/uea2uia2d1v21.pdf"},{"key":"3901_CR3","volume-title":"Specification of the 3GPP confidentiality and integrity algorithms 128-EEA3 & 128-EIA3. Document 3: implementor\u2019s test data","author":"ETSI\/SAGE Specification","year":"2011","unstructured":"ETSI\/SAGE Specification. Specification of the 3GPP confidentiality and integrity algorithms 128-EEA3 & 128-EIA3. Document 3: implementor\u2019s test data. 2011. https:\/\/www.gsma.com\/about-us\/wp-content\/uploads\/2014\/12\/eea3eia3testdatav11.pdf"},{"key":"3901_CR4","series-title":"Report ITU-R M.2410-0(11\/2017)","volume-title":"Minimum Requirements Related to Technical Performance for IMT-2020 Radio Interface(s)","author":"ITU","year":"2017","unstructured":"ITU. Minimum Requirements Related to Technical Performance for IMT-2020 Radio Interface(s). Mobile, Radiodetermination, Amateur and Related Satellite Services, Report ITU-R M.2410-0(11\/2017), 2017"},{"key":"3901_CR5","volume-title":"Key Drivers and Research Challenges for 6G Ubiquitous Wireless Intelligence (White Paper)","author":"B Aazhang","year":"2019","unstructured":"Aazhang B, Ahokangas P, Alves H, et al. Key Drivers and Research Challenges for 6G Ubiquitous Wireless Intelligence (White Paper). Oulu: 6G Flagship, 2019"},{"key":"3901_CR6","first-page":"79","volume-title":"Proceedings of the 7th International Workshop","author":"E E Targhi","year":"2016","unstructured":"Targhi E E, Tabia G N, Unruh D. Quantum collision-resistance of non-uniformly distributed functions. In: Proceedings of the 7th International Workshop, 2016. 79\u201385"},{"key":"3901_CR7","first-page":"207","volume-title":"Proceedings of Annual International Cryptology Conference","author":"M Kaplan","year":"2016","unstructured":"Kaplan M, Leurent G, Leverrier A, et al. Breaking symmetric cryptosystems using quantum period finding. In: Proceedings of Annual International Cryptology Conference, 2016. 207\u2013237"},{"key":"3901_CR8","first-page":"211","volume-title":"Proceedings of Annual International Cryptology Conference","author":"A Chailloux","year":"2017","unstructured":"Chailloux A, Naya-Plasencia M, Schrottenloher A. An efficient quantum collision search algorithm and implications on symmetric cryptography. In: Proceedings of Annual International Cryptology Conference, 2017. 211\u2013240"},{"key":"3901_CR9","doi-asserted-by":"publisher","first-page":"1179","DOI":"10.1007\/s10623-020-00741-y","volume":"88","author":"X Dong","year":"2020","unstructured":"Dong X, Dong B, Wang X. Quantum attacks on some Feistel block ciphers. Des Codes Cryptogr, 2020, 88: 1179\u20131203","journal-title":"Des Codes Cryptogr"},{"key":"3901_CR10","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1007\/978-3-319-79063-3_22","volume-title":"Proceedings of the 9th International Conference on Post-Quantum Cryptography","author":"M Balogh","year":"2018","unstructured":"Balogh M, Eaton E, Song F. Quantum collision-finding in non-uniform random functions. In: Proceedings of the 9th International Conference on Post-Quantum Cryptography, 2018. 467\u2013486"},{"key":"3901_CR11","first-page":"433","volume-title":"Proceedings of on Cryptology in India","author":"B Ni","year":"2019","unstructured":"Ni B, Ito G, Dong X, et al. Quantum attacks against type-1 generalized Feistel ciphers and applications to CAST-256. In: Proceedings of on Cryptology in India, 2019. 433\u2013455"},{"key":"3901_CR12","first-page":"189","volume-title":"Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques","author":"Q Liu","year":"2019","unstructured":"Liu Q, Zhandry M. On finding quantum multi-collisions. In: Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2019. 189\u2013218"},{"key":"3901_CR13","first-page":"727","volume-title":"Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques","author":"X Dong","year":"2020","unstructured":"Dong X, Sun S, Shi D, et al. Quantum collision attacks on AES-like hashing with low quantum random access memories. In: Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2020. 727\u2013757"},{"key":"3901_CR14","first-page":"616","volume-title":"Proceedings of Annual International Cryptology Conference","author":"A Hosoyamada","year":"2021","unstructured":"Hosoyamada A, Sasaki Y. Quantum collision attacks on reduced SHA-256 and SHA-512. In: Proceedings of Annual International Cryptology Conference, 2021. 616\u2013646"},{"key":"3901_CR15","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/978-3-030-92641-0_8","volume-title":"Proceedings of the 18th IMA International Conference on Cryptography and Coding","author":"S Hirose","year":"2021","unstructured":"Hirose S, Kuwakado H. A note on quantum collision resistance of double-block-length compression functions. In: Proceedings of the 18th IMA International Conference on Cryptography and Coding, 2021. 161\u2013175"},{"key":"3901_CR16","first-page":"315","volume-title":"Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques","author":"X Bonnetain","year":"2022","unstructured":"Bonnetain X, Schrottenloher A, Sibleyras F. Beyond quadratic speedups in quantum attacks on symmetric schemes. In: Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2022. 315\u2013344"},{"key":"3901_CR17","first-page":"717","volume-title":"Proceedings of Annual International Cryptology Conference","author":"A Schrottenloher","year":"2022","unstructured":"Schrottenloher A, Stevens M. Simplified MITM modeling for permutations: new (quantum) attacks. In: Proceedings of Annual International Cryptology Conference, 2022. 717\u2013747"},{"key":"3901_CR18","volume-title":"ARM architecture reference manual for ARMv8-A (64-bit)","author":"ARM","year":"2013","unstructured":"ARM. ARM architecture reference manual for ARMv8-A (64-bit). 2013. https:\/\/community.arm.com\/arm-community-blogs\/b\/architectures-and-processors-blog\/posts\/arm-architecture-reference-manual-for-armv8-a-64-bit-publicly-released"},{"key":"3901_CR19","first-page":"185","volume-title":"Proceedings of International Conference on Selected Areas in Cryptography","author":"H Wu","year":"2014","unstructured":"Wu H, Preneel B. AEGIS: a fast authenticated encryption algorithm. In: Proceedings of International Conference on Selected Areas in Cryptography, 2014. 185\u2013201"},{"key":"3901_CR20","volume-title":"CAESAR: competition for authenticated encryption: security, applicability, and robustness","author":"CAESAR","year":"2014","unstructured":"CAESAR. CAESAR: competition for authenticated encryption: security, applicability, and robustness. 2014. https:\/\/competitions.cr.yp.to\/caesar.html"},{"key":"3901_CR21","first-page":"716","volume":"6","author":"C Feng","year":"2020","unstructured":"Feng C. Support of 256-bit algorithm in 5G mobile communication system. J Inform Secur Res, 2020, 6: 716\u2013721","journal-title":"J Inform Secur Res"},{"key":"3901_CR22","volume-title":"The zuc-256 stream cipher","author":"Design team T Z","year":"2018","unstructured":"Design team T Z. The zuc-256 stream cipher. 2018. http:\/\/www.is.cas.cn\/ztzl2016\/zouchongzhi\/201801\/W020180416526664982687.pdf"},{"key":"3901_CR23","first-page":"1","volume":"2019","author":"P Ekdahl","year":"2019","unstructured":"Ekdahl P, Johansson T, Maximov A, et al. A new SNOW stream cipher called SNOW-V. IACR Trans Symm Cryptol, 2019, 2019: 1\u201342","journal-title":"IACR Trans Symm Cryptol"},{"key":"3901_CR24","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1145\/3448300.3467829","volume-title":"Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks","author":"P Ekdahl","year":"2021","unstructured":"Ekdahl P, Maximov A, Johansson T, et al. SNOW-Vi: an extreme performance variant of SNOW-V for lower grade CPUs. In: Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2021. 261\u2013272"},{"key":"3901_CR25","first-page":"1","volume":"2021","author":"K Sakamoto","year":"2021","unstructured":"Sakamoto K, Liu F, Nakano Y, et al. Rocca: an efficient AES-based encryption scheme for beyond 5G. IACR Trans Symm Cryptol, 2021, 2021: 1\u201330","journal-title":"IACR Trans Symm Cryptol"},{"key":"3901_CR26","first-page":"348","volume":"2019","author":"M Eichlseder","year":"2019","unstructured":"Eichlseder M, Nageler M, Primas R. Analyzing the linear keystream biases in AEGIS. IACR Trans Symm Cryptol, 2019, 2019: 348\u2013368","journal-title":"IACR Trans Symm Cryptol"},{"key":"3901_CR27","doi-asserted-by":"publisher","first-page":"104","DOI":"10.46586\/tosc.v2021.i2.104-139","volume":"2021","author":"F Liu","year":"2021","unstructured":"Liu F, Isobe T, Meier W, et al. Weak keys in reduced AEGIS and Tiaoxin. IACR Trans Symm Cryptol, 2021, 2021: 104\u2013139","journal-title":"IACR Trans Symm Cryptol"},{"key":"3901_CR28","first-page":"34","volume-title":"Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques","author":"Z Shi","year":"2022","unstructured":"Shi Z, Jin C, Zhang J, et al. A correlation attack on full SNOW-V and SNOW-vi. In: Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2022. 34\u201356"},{"key":"3901_CR29","doi-asserted-by":"publisher","first-page":"2449","DOI":"10.1007\/s10623-022-01090-8","volume":"90","author":"Z Zhou","year":"2022","unstructured":"Zhou Z, Feng D, Zhang B. Efficient and extensive search for precise linear approximations with high correlations of full SNOW-V. Des Codes Cryptogr, 2022, 90: 2449\u20132479","journal-title":"Des Codes Cryptogr"},{"key":"3901_CR30","doi-asserted-by":"publisher","first-page":"123","DOI":"10.46586\/tosc.v2022.i3.123-151","volume":"2022","author":"A Hosoyamada","year":"2022","unstructured":"Hosoyamada A, Inoue A, Ito R, et al. Cryptanalysis of Rocca and feasibility of its security claim. IACR Trans Symm Cryptol, 2022, 2022: 123\u2013151","journal-title":"IACR Trans Symm Cryptol"},{"key":"3901_CR31","first-page":"116","volume":"2022","author":"K Sakamoto","year":"2022","unstructured":"Sakamoto K, Liu F, Nakano Y, et al. Rocca: an efficient aes-based encryption scheme for beyond 5G (full version). IACR Cryptol, 2022, 2022: 116","journal-title":"IACR Cryptol"},{"key":"3901_CR32","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/11799313_10","volume-title":"Proceedings of International Workshop on Fast Software Encryption","author":"K Nyberg","year":"2006","unstructured":"Nyberg K, Wall\u00e9n J. Improved linear distinguishers for SNOW 2.0. In: Proceedings of International Workshop on Fast Software Encryption, 2006. 144\u2013162"},{"key":"3901_CR33","first-page":"643","volume-title":"Proceedings of Annual Cryptology Conference","author":"B Zhang","year":"2015","unstructured":"Zhang B, Xu C, Meier W. Fast correlation attacks over extension fields, large-unit linear approximation and cryptanalysis of SNOW 2.0. In: Proceedings of Annual Cryptology Conference, 2015. 643\u2013662"},{"key":"3901_CR34","doi-asserted-by":"publisher","first-page":"71","DOI":"10.46586\/tosc.v2021.i2.71-103","volume":"2021","author":"X Gong","year":"2021","unstructured":"Gong X, Zhang B. Comparing large-unit and bitwise linear approximations of SNOW 2.0 and SNOW 3G and related attacks. IACR Trans Symm Cryptol, 2021, 2021: 71\u2013103","journal-title":"IACR Trans Symm Cryptol"},{"key":"3901_CR35","series-title":"NIST SP 800-38D","volume-title":"Recommendation for Block Cipher Modes of Operation: Galois\/counter Mode (GCM) and GMAC","author":"M Dworkin","year":"2007","unstructured":"Dworkin M. Recommendation for Block Cipher Modes of Operation: Galois\/counter Mode (GCM) and GMAC. NIST SP 800-38D, 2007"},{"key":"3901_CR36","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1007\/BFb0052345","volume-title":"Proceedings of International Workshop on Fast Software Encryption","author":"S Halevi","year":"1997","unstructured":"Halevi S, Krawczyk H. MMH: software message authentication in the Gbit\/second rates. In: Proceedings of International Workshop on Fast Software Encryption, 1997. 172\u2013189"},{"key":"3901_CR37","doi-asserted-by":"publisher","first-page":"959","DOI":"10.1007\/s12095-018-0294-5","volume":"10","author":"M Hamann","year":"2018","unstructured":"Hamann M, Krause M. On stream ciphers with provable beyond-the-birthday-bound security against time-memory-data tradeoff attacks. Cryptogr Commun, 2018, 10: 959\u20131012","journal-title":"Cryptogr Commun"},{"key":"3901_CR38","first-page":"95","volume-title":"Proceedings of Annual Cryptology Conference","author":"B Sun","year":"2015","unstructured":"Sun B, Liu Z, Rijmen V, et al. Links among impossible differential, integral and zero correlation linear cryptanalysis. In: Proceedings of Annual Cryptology Conference, 2015. 95\u2013115"},{"key":"3901_CR39","volume-title":"Proceedings of European Convention on Security and Detection","author":"S Babbage","year":"1995","unstructured":"Babbage S. Improved \u201cexhaustive search\u201d attacks on stream ciphers. In: Proceedings of European Convention on Security and Detection, 1995"},{"key":"3901_CR40","volume-title":"Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques","author":"J D Golic","year":"1997","unstructured":"Golic J D. Cryptanalysis of alleged A5 stream cipher. In: Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques, 1997"},{"key":"3901_CR41","volume-title":"Proceedings of International Conference on the Theory and Application of Cryptology and Information Security","author":"A Biryukov","year":"2000","unstructured":"Biryukov A, Shamir A. Cryptanalytic time\/memory\/data tradeoffs for stream ciphers. In: Proceedings of International Conference on the Theory and Application of Cryptology and Information Security, 2000"},{"key":"3901_CR42","first-page":"267","volume-title":"Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown","author":"N T Courtois","year":"2002","unstructured":"Courtois N T, Pieprzyk J. Cryptanalysis of block ciphers with overdefined systems of equations. In: Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, 2002. 267\u2013287"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-023-3901-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11432-023-3901-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-023-3901-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,5]],"date-time":"2024-11-05T12:17:33Z","timestamp":1730809053000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11432-023-3901-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,13]]},"references-count":42,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2024,9]]}},"alternative-id":["3901"],"URL":"https:\/\/doi.org\/10.1007\/s11432-023-3901-0","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,8,13]]},"assertion":[{"value":"28 August 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 October 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 November 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 August 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"192101"}}