{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T12:12:14Z","timestamp":1773231134024,"version":"3.50.1"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2008,4,25]],"date-time":"2008-04-25T00:00:00Z","timestamp":1209081600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2009,4]]},"DOI":"10.1007\/s12095-008-0003-x","type":"journal-article","created":{"date-parts":[[2008,4,24]],"date-time":"2008-04-24T05:44:56Z","timestamp":1209015896000},"page":"47-69","source":"Crossref","is-referenced-by-count":7,"title":["New criteria for linear maps in AES-like ciphers"],"prefix":"10.1007","volume":"1","author":[{"given":"Joan","family":"Daemen","sequence":"first","affiliation":[]},{"given":"Vincent","family":"Rijmen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2008,4,25]]},"reference":[{"key":"3_CR1","unstructured":"Specification for the Advanced Encryption Standard (AES). Federal Information Processing Standards Publication 197 (2001)"},{"key":"3_CR2","unstructured":"American Mathematical Society. Algebra, ISBN 0821816462 (1999)"},{"key":"3_CR3","unstructured":"Anderson, R.A., Biham, E., Knudsen, L.R.: Serpent. Proc. of the 1st AES candidate conference, CD-1: Documentation, August 20\u201322, Ventura (1998)"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Aoki, K.: Maximum non-averaged differential probability. Selected Areas in Cryptography SAC \u201998, LNCS 1556, pp.\u00a0118\u2013130. Springer-Verlag (1998)","DOI":"10.1007\/3-540-48892-8_10"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Aoki, K., Ichikawa, T., Kanda, M., Matsui, M., Moriai, S., Nakajima, J., Tokita, T.: Camellia: a 128-bit block cipher suitable for multiple platforms\u2014Design and analysis. In: Stinson, D., Tavares, S. (eds.) Selected Areas in Cryptography 2000, LNCS 2012, pp.\u00a039\u201356. Springer-Verlag (2000)","DOI":"10.1007\/3-540-44983-3_4"},{"key":"3_CR6","unstructured":"Barreto, P., Rijmen, V.: The Anubis block cipher. First open NESSIE Workshop, Leuven, November 13\u201314, http:\/\/paginas.terra.com.br\/informatica\/paulobarreto\/AnubisPage.html (2000)"},{"issue":"1","key":"3_CR7","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E. Biham","year":"1991","unstructured":"Biham, E., Shamir, A.: Differential cryptanalysis of DES-like Cryptosystems. J. Cryptol. 4(1), 3\u201372 (1991)","journal-title":"J. Cryptol."},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Ben-Aroya, I., Biham, E.: Differential cryptanalysis of Lucifer. In: Stinson, D. (ed.) Advances in Cryptology, Proc. Crypto\u201993, LNCS\u00a0773, pp.\u00a0187\u2013199. Springer-Verlag (1994)","DOI":"10.1007\/3-540-48329-2_17"},{"key":"3_CR9","unstructured":"Canteaut, A.: Differential cryptanalysis of Feistel ciphers and differentially \u03b4-uniform mappings. Workshop record of Selected Areas in Cryptography SAC \u201997, pp.\u00a0172\u2013184 (1997)"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Daemen, J., Govaerts, R., Vandewalle, J.: Weak keys of IDEA. In: Stinson, D. (ed.) Advances in Cryptology, Proc. Crypto\u201993, LNCS\u00a0773, pp.\u00a0224\u2013231. Springer-Verlag (1994)","DOI":"10.1007\/3-540-48329-2_20"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Daemen, J., Govaerts, R., Vandewalle, J.: A new approach to block cipher design. In: Anderson, R. (ed.) Proc. of Fast Software Encryption 1993, LNCS 809, pp.\u00a018\u201332. Springer-Verlag (1994)","DOI":"10.1007\/3-540-58108-1_2"},{"key":"3_CR12","unstructured":"Daemen, J.: Cipher and hash function design. Strategies based on linear and differential cryptanalysis. Ph.D. thesis, Katholieke Universiteit Leuven (1995)"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Daemen, J., Knudsen, L.R. Rijmen, V.: The block cipher square. In: Biham, E. (ed.) Fast Software Encryption \u201997, LNCS\u00a01267, pp.\u00a0149\u2013165. Springer-Verlag (1997)","DOI":"10.1007\/BFb0052343"},{"key":"3_CR14","unstructured":"Daemen, J., Peeters, M., Van Assche G., Rijmen, V.: Nessie proposal: the block cipher Noekeon. (Submitted to Nessie)"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Daemen, J., Rijmen, V.: The Design of Rijndael\u2014AES, The Advanced Encryption Standard. Springer-Verlag (2002)","DOI":"10.1007\/978-3-662-04722-4"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Daemen, J., Rijmen, V.: Understanding two-round differentials in AES. Security and Cryptography for Networks 2006 (SCN 2006), LNCS 4116, pp.\u00a078\u201394. Springer-Verlag (2006)","DOI":"10.1007\/11832072_6"},{"issue":"1","key":"3_CR17","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1049\/iet-ifs:20060099","volume":"1","author":"J. Daemen","year":"2007","unstructured":"Daemen, J., Rijmen, V.: Plateau characteristics. IET Inf. Secur. 1(1), 11\u201318 (2007)","journal-title":"IET Inf. Secur."},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"Keliher, L.: Refined analysis of bounds related to linear and differential cryptanalysis for the AES. Advanced Encryption Standard\u2014AES, 4th international conference (AES 2004), LNCS 3373, pp.\u00a042\u201357. Springer-Verlag (2005)","DOI":"10.1007\/11506447_5"},{"issue":"2","key":"3_CR19","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1049\/iet-ifs:20060161","volume":"1","author":"L. Keliher","year":"2007","unstructured":"Keliher, L., Sui, J.: Exact maximum expected differential and linear probability for 2-round advanced encryption standard (AES). IET Inf. Secur. 1(2), 53\u201357 (2007)","journal-title":"IET Inf. Secur."},{"key":"3_CR20","doi-asserted-by":"crossref","unstructured":"Knudsen, L.R.: Iterative characteristics of DES and s2-DES. In: Brickell, E.F. (ed.) Advances in Cryptology, Proc. CRYPTO\u201992, LNCS 746, pp.\u00a0497\u2013511. Springer-Verlag (1993)","DOI":"10.1007\/3-540-48071-4_35"},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"Knudsen, L.R.: Truncated and higher order differentials. In: Preneel, B. (ed.) Fast Software Encryption \u201994, LNCS\u00a01008, pp.\u00a0196\u2013211. Springer-Verlag (1995)","DOI":"10.1007\/3-540-60590-8_16"},{"key":"3_CR22","doi-asserted-by":"crossref","unstructured":"Knudsen, L.R., Mathiassen, J.E.: On the role of key schedules in attacks on iterated ciphers. ESORICS 2004, LNCS\u00a03193, pp.\u00a0322\u2013334. Springer-Verlag (2004)","DOI":"10.1007\/978-3-540-30108-0_20"},{"key":"3_CR23","doi-asserted-by":"crossref","unstructured":"Lai, X., Massey, J.L., Murphy, S.: Markov ciphers and differential cryptanalysis. In: Davies, D.W. (ed.) Advances in Cryptology, Proc. Eurocrypt\u201991, LNCS\u00a0547, pp.\u00a017\u201338. Springer-Verlag (1991)","DOI":"10.1007\/3-540-46416-6_2"},{"key":"3_CR24","unstructured":"Lidl, R., Niederreiter, H.: Introduction to Finite Fields and Their Applications. Cambridge University Press, 1986 (Reprinted 1988)"},{"key":"3_CR25","doi-asserted-by":"crossref","unstructured":"Matsui, M.: New block encryption algorithm misty. In: Biham, E. (ed.) Fast Software Encryp tion \u201997, LNCS\u00a01267, pp.\u00a064\u201374. Springer-Verlag (1997)","DOI":"10.1007\/BFb0052334"},{"key":"3_CR26","doi-asserted-by":"crossref","unstructured":"Nyberg, K.: Differentially uniform mappings for cryptography. In: Helleseth, T. (ed.) Advances in Cryptology, Proc. Eurocrypt\u201993, LNCS\u00a0765, pp.\u00a055-64. Springer-Verlag (1993)","DOI":"10.1007\/3-540-48285-7_6"},{"issue":"1","key":"3_CR27","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1007\/BF00204800","volume":"8","author":"K. Nyberg","year":"1995","unstructured":"Nyberg, K., Knudsen, L.R.: Provable security against a differential attack. J. Cryptol. 8(1), 27\u201338 (1995)","journal-title":"J. Cryptol."},{"key":"3_CR28","doi-asserted-by":"crossref","unstructured":"Park, S., Sung, S.H., Chee, S., E-J. Yoon, Lim, J.: On the security of Rijndael-like structures against differential and linear cryptanalysis. In: Zheng, Y. (ed.) Advances in Cryptology, Proceedings of Asiacrypt \u201902, LNCS\u00a02501, pp.\u00a0176\u2013191. Springer-Verlag (2002)","DOI":"10.1007\/3-540-36178-2_11"},{"key":"3_CR29","doi-asserted-by":"crossref","unstructured":"Park, S., Sung, S.H., Lee, S., Lim, J.: Improving the upper bound on the maximum differential and the maximum linear hull probability for SPN structures and AES. In: Johansson, T. (ed.) Fast Software Encryption \u201903, LNCS\u00a02887, pp.\u00a0247\u2013260. Springer-Verlag (2003)","DOI":"10.1007\/978-3-540-39887-5_19"},{"key":"3_CR30","unstructured":"Rijmen, V.: Cryptanalysis and design of iterated block ciphers. Doctoral Dissertation, October 1997, K.U. Leuven"},{"key":"3_CR31","doi-asserted-by":"crossref","unstructured":"Rijmen, V., Daemen, J., Preneel, B., Bosselaers, A., De Win E.: The cipher SHARK. In: Gollmann, D. (ed.) Fast Software Encryption \u201996, LNCS\u00a01039, pp.\u00a099\u2013111. Springer-Verlag (1996)","DOI":"10.1007\/3-540-60865-6_47"},{"key":"3_CR32","doi-asserted-by":"crossref","unstructured":"Vaudenay, S.: On the need for multipermutations: cryptanalysis of MD4 and SAFER. In: Preneel, B. (ed.) Fast Software Encryption \u201994, LNCS\u00a01008, pp.\u00a0286\u2013297. Springer-Verlag (1995)","DOI":"10.1007\/3-540-60590-8_22"},{"key":"3_CR33","doi-asserted-by":"crossref","unstructured":"Zheng, Y., Zhang, X.M.: Plateaued functions. Advances in Cryptology, ICICS \u201999, LNCS 1726, pp.\u00a0284\u2013300. Springer-Verlag (1999)","DOI":"10.1007\/978-3-540-47942-0_24"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-008-0003-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12095-008-0003-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-008-0003-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T23:51:50Z","timestamp":1559433110000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12095-008-0003-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,4,25]]},"references-count":33,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2009,4]]}},"alternative-id":["3"],"URL":"https:\/\/doi.org\/10.1007\/s12095-008-0003-x","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"value":"1936-2447","type":"print"},{"value":"1936-2455","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,4,25]]}}}