{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,2,10]],"date-time":"2023-02-10T08:16:32Z","timestamp":1676016992978},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2014,3,6]],"date-time":"2014-03-06T00:00:00Z","timestamp":1394064000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Front. Comput. Sci."],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1007\/s11704-014-2412-7","type":"journal-article","created":{"date-parts":[[2014,3,6]],"date-time":"2014-03-06T07:49:48Z","timestamp":1394092188000},"page":"513-525","source":"Crossref","is-referenced-by-count":4,"title":["Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes"],"prefix":"10.1007","volume":"8","author":[{"given":"Le","family":"Dong","sequence":"first","affiliation":[]},{"given":"Wenling","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Shuang","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Zou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,3,6]]},"reference":[{"key":"2412_CR1","first-page":"315","volume-title":"Proceedings of the 13th International Conference on the Theory and Application of Cryptology and Information Security","author":"L R Knudsen","year":"2007","unstructured":"Knudsen L R, Rijmen V. Known-key distinguishers for some blockciphers. In: Proceedings of the 13th International Conference on the Theory and Application of Cryptology and Information Security. 2007, 315\u2013324"},{"issue":"5","key":"2412_CR2","doi-asserted-by":"crossref","first-page":"550","DOI":"10.1109\/5.4441","volume":"76","author":"M E Smid","year":"1988","unstructured":"Smid M E, Branstad D K. Data encryption standard: past and future. Proceedings of the IEEE, 1988, 76(5): 550\u2013559","journal-title":"Proceedings of the IEEE"},{"key":"2412_CR3","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1007\/3-540-58108-1_24","volume":"809","author":"B Schneier","year":"1994","unstructured":"Schneier B. Description of a new variable-length key, 64-bit block cipher (blowfish). Lecture Notes in Computer Science, 1994, 809: 191\u2013204","journal-title":"Lecture Notes in Computer Science"},{"key":"2412_CR4","first-page":"39","volume-title":"Proceedings of the 7th Annual International Workshop Selected Areas in Cryptography","author":"A Kazumaro","year":"2001","unstructured":"Kazumaro A, Tetsuya I, Masayuki K, Mitsuru M, Shiho M, Junko N, Toshio T. Camellia: a 128-bit block cipher suitable for multiple platforms design and analysis. In: Proceedings of the 7th Annual International Workshop Selected Areas in Cryptography. 2001, 39\u201356"},{"key":"2412_CR5","volume-title":"Design principles of the kasumi block cipher","author":"J Wallen","year":"2000","unstructured":"Wallen J. Design principles of the kasumi block cipher. Proceedings of the Helsinki University of Technology Seminar on Network Security, 2000"},{"key":"2412_CR6","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1007\/3-540-60590-8_7","volume-title":"Proceedings of the 2nd International Workshop on Fast Software Encryption","author":"R L Rivest","year":"1995","unstructured":"Rivest R L. The RC5 encryption algorithm. In: Proceedings of the 2nd International Workshop on Fast Software Encryption.1995, 86\u201396"},{"key":"2412_CR7","doi-asserted-by":"crossref","first-page":"327","DOI":"10.1007\/978-3-642-21554-4_19","volume-title":"Proceedings of the 9th International Conference on Applied Cryptography and Network Security","author":"W Wu","year":"2011","unstructured":"Wu W, Zhang L. Lblock: a lightweight block cipher. In: Proceedings of the 9th International Conference on Applied Cryptography and Network Security. 2011, 327\u2013344"},{"key":"2412_CR8","doi-asserted-by":"crossref","first-page":"260","DOI":"10.1007\/978-3-642-03317-9_16","volume-title":"Proceedings of the 16th International Workshop on Fast Software Encryption","author":"F Mendel","year":"2009","unstructured":"Mendel F, Rechberger C, Schl\u00e4ffer M, Thomsen S S. The rebound attack: Cryptanalysis of reduced Whirlpool and Gr\u00f8stl. In: Proceedings of the 16th International Workshop on Fast Software Encryption. 2009, 260\u2013276"},{"key":"2412_CR9","doi-asserted-by":"crossref","first-page":"397","DOI":"10.1007\/978-3-642-21702-9_23","volume-title":"Proceedings of the 18th International Workshop on Fast Software Encryption","author":"Y Sasaki","year":"2011","unstructured":"Sasaki Y, Yasuda K. Known-key distinguishers on 11-round feistel and collision attacks on its hashing modes. In: Proceedings of the 18th International Workshop on Fast Software Encryption. 2011, 397\u2013415"},{"key":"2412_CR10","first-page":"87","volume-title":"Proceedings of the 17th Australasian Conference Conference on Information Security and Privacy","author":"Y Sasaki","year":"2012","unstructured":"Sasaki Y, Emami S, Hong D, Kumar A. Improved known-key distinguishers on Feistel-SP ciphers and application to camellia. In: Proceedings of the 17th Australasian Conference Conference on Information Security and Privacy. 2012, 87\u2013100"},{"key":"2412_CR11","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1007\/978-3-642-02384-2_5","volume":"5580","author":"M Minier","year":"2009","unstructured":"Minier M, Phan R C W, Pousse B. Distinguishers for ciphers and known key attack against rijndael with large blocks. Lecture Notes in Computer Science, 2009, 5580: 60\u201376","journal-title":"Lecture Notes in Computer Science"},{"key":"2412_CR12","first-page":"126","volume-title":"Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security","author":"M Lamberger","year":"2009","unstructured":"Lamberger M, Mendel F, Rechberger C, Rijmen V, Schl\u00e4ffer M. Rebound distinguishers: Results on the full Whirlpool compression function. In: Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security. 2009, 126\u2013143"},{"key":"2412_CR13","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1007\/978-3-642-05445-7_8","volume-title":"Proceedings of the 16th Annual International Workshop on Selected Areas in Cryptography","author":"S Wu","year":"2009","unstructured":"Wu S, Feng D, Wu W. Cryptanalysis of the LANE hash function. In: Proceedings of the 16th Annual International Workshop on Selected Areas in Cryptography. 2009, 126\u2013140"},{"key":"2412_CR14","doi-asserted-by":"crossref","first-page":"365","DOI":"10.1007\/978-3-642-13858-4_21","volume-title":"Proceedings of the 17th International Workshop on Fast Soft Encryption","author":"H Gilbert","year":"2010","unstructured":"Gilbert H, Peyrin T. Super-sbox cryptanalysis: Improved attacks for AES-like permutations. In: Proceedings of the 17th International Workshop on Fast Soft Encryption. 2010, 365\u2013383"},{"key":"2412_CR15","first-page":"55","volume-title":"Proceedings of the 12th International Workshop on Information Security Applications","author":"L Dong","year":"2011","unstructured":"Dong L, Wu W, Wu S, Zou J. Known-key distinguisher on round reduced 3D block cipher. In: Proceedings of the 12th International Workshop on Information Security Applications. 2011, 55\u201369"},{"key":"2412_CR16","doi-asserted-by":"crossref","first-page":"461","DOI":"10.1007\/0-387-34805-0_42","volume":"435","author":"Y Zheng","year":"1989","unstructured":"Zheng Y, Matsumoto T, Imai H. On the construction of block ciphers provably secure and not relying on any unproved hypotheses. Lecture Notes in Computer Science, 1989, 435: 461\u2013480","journal-title":"Lecture Notes in Computer Science"},{"key":"2412_CR17","volume-title":"The CAST-256 encryption algorithm. Submission to AES competition","author":"C Adams","year":"1998","unstructured":"Adams C, Tavares S, Heys H, Wiener M. The CAST-256 encryption algorithm. Submission to AES competition, 1998"},{"key":"2412_CR18","first-page":"148","volume-title":"Proceedings of the 9th International Workshop Workshop on Cryptographic Hardware and Embedded Systems","author":"H Yoshida","year":"2007","unstructured":"Yoshida H, Watanabe D, Okeya K, Kitahara J, Wu H, K\u00fc\u00e7\u00fck \u00d6, Preneel B. Mame: A compression function with reduced hardware requirements. In: Proceedings of the 9th International Workshop Workshop on Cryptographic Hardware and Embedded Systems. 2007, 148\u2013165"},{"key":"2412_CR19","volume-title":"SHA-3 proposal: Lesamnta","author":"S Hirose","year":"2008","unstructured":"Hirose S, Kuwakado H, Yoshida H. SHA-3 proposal: Lesamnta. Submission to NIST, 2008"},{"key":"2412_CR20","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1007\/978-3-642-19574-7_2","volume":"6544","author":"C Bouillaguet","year":"2010","unstructured":"Bouillaguet C, Dunkelman O, Leurent G, Fouque P A. Lecture Notes in Computer Science, 2010, 6544: 18\u201335","journal-title":"Lecture Notes in Computer Science"},{"key":"2412_CR21","first-page":"1","volume-title":"Proceedings of the 14th International Conference on Information Security and Cryptology","author":"Y Sasaki","year":"2011","unstructured":"Sasaki Y, Aoki K. Improved integral analysis on tweaked lesamnta. In: Proceedings of the 14th International Conference on Information Security and Cryptology. 2011, 1\u201317"},{"key":"2412_CR22","doi-asserted-by":"crossref","unstructured":"Peyrin T. Improved differential attacks for ECHO and Gr\u00f8stl. In: Proceedings of the 30th Annual Cryptology Conference. 2010, 370\u2013392","DOI":"10.1007\/978-3-642-14623-7_20"},{"key":"2412_CR23","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1007\/978-3-642-05445-7_2","volume":"5867","author":"F Mendel","year":"2009","unstructured":"Mendel F, Peyrin T, Rechberger C, Schl\u00e4ffer M. Improved cryptanalysis of the reduced Gr\u00f8stl compression function, ECHO permutation and aes block cipher. Lecture Notes in Computer Science, 2009, 5867: 16\u201335","journal-title":"Lecture Notes in Computer Science"},{"key":"2412_CR24","first-page":"106","volume-title":"Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security","author":"K Matusiewicz","year":"2009","unstructured":"Matusiewicz K, Naya-Plasencia M, Nikolic I, Sasaki Y, Schl\u00e4ffer M. Rebound attack on the full LANE compression function. In: Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security. 2009, 106\u2013125"},{"key":"2412_CR25","doi-asserted-by":"crossref","first-page":"342","DOI":"10.1007\/978-3-642-01957-9_21","volume-title":"Proceedings of the 7th International Conference on Applied Cryptography and Network Security","author":"F Mendel","year":"2009","unstructured":"Mendel F, Rechberger C, Schl\u00e4ffer M. Cryptanalysis of twister. In: Proceedings of the 7th International Conference on Applied Cryptography and Network Security. 2009, 342\u2013353"},{"key":"2412_CR26","doi-asserted-by":"crossref","first-page":"286","DOI":"10.1007\/978-3-642-13858-4_16","volume-title":"Proceedings of the 17th International Workshop on Fast Soft Encryption","author":"V Rijmen","year":"2010","unstructured":"Rijmen V, Toz D, Varici K. Rebound attack on reduced-round versions of JH. In: Proceedings of the 17th International Workshop on Fast Soft Encryption. 2010, 286\u2013303"},{"key":"2412_CR27","first-page":"252","volume-title":"Proceedings of the 17th International Conference on the Theory and Application of Cryptology and Information Security","author":"M Naya-Plasencia","year":"2011","unstructured":"Naya-Plasencia M, Toz D, Varici K. Rebound attack on JH42. In: Proceedings of the 17th International Conference on the Theory and Application of Cryptology and Information Security. 2011, 252\u2013269"},{"key":"2412_CR28","first-page":"300","volume-title":"Proceedings of the 12th International Conference Annual International Conference on Information Security and Cryptology","author":"S Wu","year":"2009","unstructured":"Wu S, Feng D, Wu W. Practical rebound attack on 12-round Cheetah-256. In: Proceedings of the 12th International Conference Annual International Conference on Information Security and Cryptology. 2009, 300\u2013314"},{"key":"2412_CR29","first-page":"388","volume-title":"Proceedings of the 17th International Workshop on Selected Areas in Cryptography","author":"D Khovratovich","year":"2010","unstructured":"Khovratovich D, Naya-Plasencia M, R\u00f6ck A, Schl\u00e4ffer M. Cryptanalysis of Luffa v2 components. In: Proceedings of the 17th International Workshop on Selected Areas in Cryptography. 2010, 388\u2013409"},{"key":"2412_CR30","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1007\/BFb0052343","volume-title":"Proceedings of the 4th International Workshop on Fast Soft Encryption","author":"J Daemen","year":"1997","unstructured":"Daemen J, Knudsen L R, Rijmen V. The block cipher square. In: Proceedings of the 4th International Workshop on Fast Soft Encryption. 1997, 149\u2013165"},{"key":"2412_CR31","first-page":"213","volume-title":"Proceedings of the 7th International Workshop on Fast Soft Encryption","author":"N Ferguson","year":"2000","unstructured":"Ferguson N, Kelsey J, Lucks S, Schneier B, Stay M, Wagner D, Whiting D. Improved cryptanalysis of Rijndael. In: Proceedings of the 7th International Workshop on Fast Soft Encryption. 2000, 213\u2013230"},{"key":"2412_CR32","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-540-68164-9_1","volume":"5023","author":"S Galice","year":"2008","unstructured":"Galice S, Minier M. Improving integral attacks against Rijndael-256 up to 9 rounds. Lecture Notes in Computer Science, 2008, 5023: 1\u201315","journal-title":"Lecture Notes in Computer Science"},{"key":"2412_CR33","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1007\/3-540-45661-9_9","volume-title":"Proceedings of the 9th International Workshop on Fast Soft Encryption","author":"L R Knudsen","year":"2002","unstructured":"Knudsen L R, Wagner D. Integral cryptanalysis. In: Proceedings of the 9th International Workshop on Fast Soft Encryption. 2002, 112\u2013127"},{"key":"2412_CR34","doi-asserted-by":"crossref","first-page":"368","DOI":"10.1007\/3-540-48329-2_31","volume":"773","author":"B Preneel","year":"1993","unstructured":"Preneel B, Govaerts R, Vandewalle J. Hash functions based on block ciphers: A synthetic approach. Lecture Notes in Computer Science, 1993, 773: 368\u2013378","journal-title":"Lecture Notes in Computer Science"},{"key":"2412_CR35","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1007\/3-540-45708-9_21","volume":"2442","author":"J Black","year":"2002","unstructured":"Black J, Rogaway P, Shrimpton T. Black-box analysis of the blockcipher-based hash-function constructions from PGV. Lecture Notes in Computer Science, 2002, 2442: 320\u2013335","journal-title":"Lecture Notes in Computer Science"},{"key":"2412_CR36","first-page":"602","volume":"5","author":"X Yu","year":"2010","unstructured":"Yu X, Wenling W. Cryptanalysis of MAME compression function. In: Proceedings of the 2010 International Conference on Computer Design and Applications. 2010, 5: 602\u2013605","journal-title":"Proceedings of the 2010 International Conference on Computer Design and Applications"}],"container-title":["Frontiers of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-014-2412-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11704-014-2412-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-014-2412-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,8]],"date-time":"2019-08-08T05:34:54Z","timestamp":1565242494000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11704-014-2412-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,3,6]]},"references-count":36,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2014,6]]}},"alternative-id":["2412"],"URL":"https:\/\/doi.org\/10.1007\/s11704-014-2412-7","relation":{},"ISSN":["2095-2228","2095-2236"],"issn-type":[{"value":"2095-2228","type":"print"},{"value":"2095-2236","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,3,6]]}}}