{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,20]],"date-time":"2025-09-20T09:45:49Z","timestamp":1758361549798,"version":"3.44.0"},"reference-count":3,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,4,8]],"date-time":"2024-04-08T00:00:00Z","timestamp":1712534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,4,8]],"date-time":"2024-04-08T00:00:00Z","timestamp":1712534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Front. Comput. Sci."],"published-print":{"date-parts":[[2024,8]]},"DOI":"10.1007\/s11704-024-3480-y","type":"journal-article","created":{"date-parts":[[2024,4,7]],"date-time":"2024-04-07T22:05:37Z","timestamp":1712527537000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Cryptanalysis of DBST, a lightweight block cipher"],"prefix":"10.1007","volume":"18","author":[{"given":"Sadegh","family":"Sadeghi","sequence":"first","affiliation":[]},{"given":"Nasour","family":"Bagheri","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,8]]},"reference":[{"issue":"3","key":"3480_CR1","doi-asserted-by":"publisher","first-page":"173805","DOI":"10.1007\/s11704-022-1677-5","volume":"17","author":"L Yan","year":"2023","unstructured":"Yan L, Li L, Guo Y. DBST: a lightweight block cipher based on dynamic S-box. Frontiers of Computer Science, 2023, 17(3): 173805","journal-title":"Frontiers of Computer Science"},{"issue":"1","key":"3480_CR2","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E Biham","year":"1991","unstructured":"Biham E, Shamir A. Differential cryptanalysis of DES-like cryptosystems. Journal of Cryptology, 1991, 4(1): 3\u201372","journal-title":"Journal of Cryptology"},{"issue":"2","key":"3480_CR3","first-page":"216","volume":"258","author":"L Knudsen","year":"1998","unstructured":"Knudsen L. DEAL-a 128-bit block cipher. Complexity, 1998, 258(2): 216","journal-title":"Complexity"}],"container-title":["Frontiers of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-024-3480-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11704-024-3480-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-024-3480-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T19:40:11Z","timestamp":1758310811000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11704-024-3480-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,8]]},"references-count":3,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,8]]}},"alternative-id":["3480"],"URL":"https:\/\/doi.org\/10.1007\/s11704-024-3480-y","relation":{},"ISSN":["2095-2228","2095-2236"],"issn-type":[{"type":"print","value":"2095-2228"},{"type":"electronic","value":"2095-2236"}],"subject":[],"published":{"date-parts":[[2024,4,8]]},"assertion":[{"value":"20 June 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 February 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 April 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Competing interests The authors declare that they have no competing interests or financial conflicts to disclose.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics"}}],"article-number":"184819"}}