{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T07:15:31Z","timestamp":1772694931138,"version":"3.50.1"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2014,11,4]],"date-time":"2014-11-04T00:00:00Z","timestamp":1415059200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1007\/s12095-014-0116-3","type":"journal-article","created":{"date-parts":[[2014,11,3]],"date-time":"2014-11-03T12:09:06Z","timestamp":1415016546000},"page":"257-287","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":34,"title":["Cryptographically significant MDS matrices based on circulant and circulant-like matrices for lightweight applications"],"prefix":"10.1007","volume":"7","author":[{"given":"Kishan Chand","family":"Gupta","sequence":"first","affiliation":[]},{"given":"Indranil Ghosh","family":"Ray","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,11,4]]},"reference":[{"key":"116_CR1","doi-asserted-by":"crossref","unstructured":"Augot, D., Finiasz, M.: Direct construction of recursive MDS diffusion layers using shortened BCH codes. In: FSE (2014)","DOI":"10.1007\/978-3-662-46706-0_1"},{"key":"116_CR2","unstructured":"Barreto, P., Rijmen, V.: The Khazad legacy-level block cipher. Submission to the NESSIE Project. Available at http:\/\/cryptonessie.org (2000)"},{"key":"116_CR3","unstructured":"Barreto, P.S., Rijmen, V.: The Anubis block cipher. NESSIE Algorithm Submission. Available at http:\/\/cryptonessie.org (2000)"},{"key":"116_CR4","doi-asserted-by":"crossref","unstructured":"Barreto, P.S.L.M., Rijmen, V.: Whirlpool In: Encyclopedia of Cryptography and Security. 2nd edn, pp. 1384\u20131385 (2011)","DOI":"10.1007\/978-1-4419-5906-5_626"},{"issue":"3\u20134","key":"116_CR5","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1006\/jsco.1996.0125","volume":"24","author":"W Bosma","year":"1997","unstructured":"Bosma, W., Cannon, J., Playoust, C.: The magma algebra system I: The User Language. J. Symbolic Comput. 24 (3\u20134), 235\u2013265 (1997). Computational algebra and number theory (London, 1993)","journal-title":"J. Symbolic Comput."},{"key":"116_CR6","doi-asserted-by":"crossref","unstructured":"Choy, J., Yap, H., Khoo, K., Guo, J., Peyrin, T., Poschmann, A., Tan, C.H.: SPN-Hash: Improving the provable resistance against differential collision attacks. In: AFRICACRYPT 2012 (2012)","DOI":"10.1007\/978-3-642-31410-0_17"},{"key":"116_CR7","doi-asserted-by":"crossref","unstructured":"Daemen, J., Knudsen, L.R., Rijmen, V.: The block cipher SQUARE. In: 4th Fast Software Encryption Workshop. LNCS 1267, pp. 149\u2013165. Springer (1997)","DOI":"10.1007\/BFb0052343"},{"key":"116_CR8","doi-asserted-by":"crossref","unstructured":"Daemen, J., Rijmen, V.: The Design of Rijndael:AES - The Advanced Encryption Standard. Springer (2002)","DOI":"10.1007\/978-3-662-04722-4"},{"key":"116_CR9","unstructured":"Filho, G.D., Barreto, P., Rijmen, V.: The maelstrom-0 hash function. In: Proceedings of the 6th Brazilian Symposium on Information and Computer Systems Security (2006)"},{"key":"116_CR10","unstructured":"Gauravaram, P., Knudsen, L.R., Matusiewicz, K., Mendel, F., Rechberger, C., Schlaffer, M., Thomsen, S.: Gr \u03d5stl a SHA-3 Candidate. Submission to NIST (2008). Available at http:\/\/www.groestl.info"},{"key":"116_CR11","doi-asserted-by":"crossref","unstructured":"Hirschfeld, J.W.P.: The main conjecture for MDS codes, cryptography and coding. In:Proceeding of the 5th IMA Conference, pp. 44\u201352. Cirencester (1995)","DOI":"10.1007\/3-540-60693-9_7"},{"key":"116_CR12","doi-asserted-by":"crossref","unstructured":"Guo, J., Peyrin, T., Poschmann, A.: The PHOTON family of lightweight hash functions. In: CRYPTO 2011, pp. 222\u2013239. Springer (2011)","DOI":"10.1007\/978-3-642-22792-9_13"},{"key":"116_CR13","doi-asserted-by":"crossref","unstructured":"Gupta, K.C., Ray, I.G.: On constructions of involutory MDS matrices. In: AFRICACRYPT 2013, pp. 43\u201360. Springer (2013)","DOI":"10.1007\/978-3-642-38553-7_3"},{"key":"116_CR14","doi-asserted-by":"crossref","unstructured":"Gupta, K.C., Ray, I.G.: On constructions of MDS matrices from companion matrices for lightweight cryptography. In: CD-ARES 2013 Workshops: MoCrySEn, pp. 29\u201343. Springer (2013)","DOI":"10.1007\/978-3-642-40588-4_3"},{"key":"116_CR15","doi-asserted-by":"crossref","unstructured":"Gupta, K.C., Ray, I.G.: On constructions of circulant MDS matrices for lightweight cryptography. In: ISPEC 2014, pp. 564\u2013576. Springer (2014)","DOI":"10.1007\/978-3-319-06320-1_41"},{"issue":"2","key":"116_CR16","first-page":"109","volume":"9","author":"E Abrahao","year":"2009","unstructured":"Nakahara J. Jr, Abrahao, E.: A new involutory mds matrix for the AES. Int. J. Netw. Secur. 9 (2), 109\u2013116 (2009)","journal-title":"Int. J. Netw. Secur."},{"key":"116_CR17","doi-asserted-by":"crossref","unstructured":"Junod, P., Vaudenay, S.: Perfect diffusion primitives for block ciphers building efficient MDS matrices. Selected Areas in Cryptography 2004. Lecture Notes in Computer Science. Springer, Waterloo, Canada. Revisited papers,","DOI":"10.1007\/978-3-540-30564-4_6"},{"key":"116_CR18","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1007\/978-3-540-30564-4_8","volume-title":"FOX: a new family of block ciphers. Selected Areas in Cryptography, SAC.","author":"P Junod","year":"2004","unstructured":"Junod, P., Vaudenay, S.: FOX: a new family of block ciphers. Selected Areas in Cryptography, SAC. pp. 114\u2013119. Springer, LNCS (2004)"},{"key":"116_CR19","doi-asserted-by":"crossref","unstructured":"Junod, P., Macchetti, M.: Revisiting the IDEA philosophy In: 16th International Workshop (FSE), Fast Software Encryption. Lecture Notes in Computer Science, 5665, pp. 277\u2013295. Springer (2009)","DOI":"10.1007\/978-3-642-03317-9_17"},{"issue":"9","key":"116_CR20","first-page":"570572","volume":"8","author":"J Lacan","year":"2004","unstructured":"Lacan, J., Fimes, J.: Systematic MDS erasure codes based on vandermonde matrices. IEEE Trans. Commun. Lett. 8 (9), 570572 (2004). CrossRef","journal-title":"IEEE Trans. Commun. Lett."},{"key":"116_CR21","first-page":"917","volume-title":"An efficient key assignment scheme for access control in a large leaf class hierarchy. In: Journal of Information Sciences: An International Journal Archive, vol. 181, no. 4","author":"JW Lo","year":"2011","unstructured":"Lo, J.W., Hwang, M.S., Liu, C.H.: An efficient key assignment scheme for access control in a large leaf class hierarchy. In: Journal of Information Sciences: An International Journal Archive, vol. 181, no. 4, pp. 917\u2013925. Elsevier, New York (2011)"},{"key":"116_CR22","unstructured":"MacWilliams, F.J., Sloane, N.J.A: The Theory of Error Correcting Codes. North Holland (1986)"},{"key":"116_CR23","unstructured":"Rao, A.R., Bhimasankaram, P.: Linear Algebra, 2nd edn. Hindustan Book Agency"},{"key":"116_CR24","doi-asserted-by":"crossref","unstructured":"Rijmen, V., Daemen, J., Preneel, B., Bosselaers, A., Win, E.D.: The cipher SHARK. In: 3rd Fast Software Encryption Workshop, LNCS 1039. pp. 99\u2013112. Springer (1996)","DOI":"10.1007\/3-540-60865-6_47"},{"key":"116_CR25","doi-asserted-by":"crossref","unstructured":"Sajadieh, M., Dakhilalian, M., Mala, H., Omoomi, B.: On construction of involutory MDS matrices from Vandermonde matrices in G F(2 q ). In: Design, Codes Cryptography (2012)","DOI":"10.1007\/s10623-011-9578-x"},{"key":"116_CR26","doi-asserted-by":"crossref","unstructured":"Sajadieh, M., Dakhilalian, M., Mala, H., Sepehrdad, P.: Recursive diffusion layers for block ciphers and hash functions. In: FSE 2012, pp. 385\u2013401. Springer (2012)","DOI":"10.1007\/978-3-642-34047-5_22"},{"key":"116_CR27","unstructured":"Schneier, B., Kelsey, J., Whiting, D., Wagner, D., Hall, C., Ferguson, N.: Twofish: A 128-bit block cipher. In: The First AES Candidate Conference. National Institute for Standards and Technology (1998)"},{"key":"116_CR28","unstructured":"Schneier, B., Kelsey, J., Whiting, D., Wagner, D., Hall, C., Ferguson, N.: The Twofish Encryption Algorithm. Wiley (1999)"},{"key":"116_CR29","doi-asserted-by":"crossref","unstructured":"Schnorr, C., Vaudenay, S.: Black box cryptanalysis of hash networks based on multipermutations. In: De Santis, A. (ed.) Proceedings of LNCS Advances in Cryptology - EUROCRYPT 94, vol. 950, pp. 47\u201357. Springer (1995)","DOI":"10.1007\/BFb0053423"},{"key":"116_CR30","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon, C.E: Communication theory of secrecy systems. Bell Syst. Technical J. 28, 656\u2013715 (1949)","journal-title":"Bell Syst. Technical J."},{"key":"116_CR31","unstructured":"Shiraj, T., Shibutani, K.: On the diffusion matrix employed in the Whirlpool hashing function. Available at http:\/\/www.cosic.esat.kuleuven.be\/nessie\/reports\/...\/whirlpool-20030311.pdf."},{"key":"116_CR32","unstructured":"Sony Corporation: The 128-bit block cipher CLEFIA algorithm specification (2007). Available at http:\/\/www.sony.co.jp\/Products\/cryptography\/clefia\/download\/data\/clefia-spec-1.0.pdf."},{"key":"116_CR33","doi-asserted-by":"crossref","unstructured":"S. Vaudenay: On the need for multipermutations: Cryptanalysis of MD4 and SAFER. In: Preneel, B. (ed.) Proceedings of LNCS Fast Software Encryption, vol. 1008, pp. 286\u2013297. Springer (1995)","DOI":"10.1007\/3-540-60590-8_22"},{"key":"116_CR34","first-page":"179","volume-title":"A new keystream generator MUGI. In: FSE 2002.","author":"D Watanabe","year":"2002","unstructured":"Watanabe, D., Furuya, S., Yoshida, H., Takaragi, K., Preneel, B.: A new keystream generator MUGI. In: FSE 2002. pp. 179\u2013194. Springer, Berlin\/Heidelberg (2002)"},{"key":"116_CR35","first-page":"355","volume-title":"Recursive diffusion layers for (Lightweight) block ciphers and hash functions. In: SAC 2012, LNCS 7707","author":"S Wu","year":"2013","unstructured":"Wu, S., Wang, M., Wu, W.: Recursive diffusion layers for (Lightweight) block ciphers and hash functions. In: SAC 2012, LNCS 7707, pp. 355\u2013371. Springer, Berlin Heidelberg (2013)"},{"key":"116_CR36","unstructured":"Youssef, A.M., Tavares, S.E., Heys, H.M.: A new class of substitution permutation networks. In: Workshop on Selected Areas in Cryptography, SAC \u201996. Workshop Record (1996)"},{"key":"116_CR37","unstructured":"Youssef, A.M., Mister, S., Tavares, S.E.: On the design of linear transformations for substitution permutation encryption networks. In: Workshop On Selected Areas in Cryptography, SAC 97. pp. 40\u201348 (1997)"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-014-0116-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12095-014-0116-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-014-0116-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,16]],"date-time":"2019-08-16T23:37:57Z","timestamp":1565998677000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12095-014-0116-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11,4]]},"references-count":37,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2015,6]]}},"alternative-id":["116"],"URL":"https:\/\/doi.org\/10.1007\/s12095-014-0116-3","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"value":"1936-2447","type":"print"},{"value":"1936-2455","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,11,4]]}}}