{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T21:39:12Z","timestamp":1767994752243,"version":"3.49.0"},"reference-count":11,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2014,12,3]],"date-time":"2014-12-03T00:00:00Z","timestamp":1417564800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1007\/s12095-014-0118-1","type":"journal-article","created":{"date-parts":[[2014,12,2]],"date-time":"2014-12-02T12:53:11Z","timestamp":1417524791000},"page":"331-345","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["The parallel-cut meet-in-the-middle attack"],"prefix":"10.1007","volume":"7","author":[{"given":"Ivica","family":"Nikoli\u0107","sequence":"first","affiliation":[]},{"given":"Lei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Shuang","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,12,3]]},"reference":[{"key":"118_CR1","doi-asserted-by":"crossref","unstructured":"Aumasson, J.-P., Naya-Plasencia, M., Saarinen, M.-J.: Practical attack on 8 rounds of the lightweight block cipher KLEIN. In: Bernstein, D., Chatterjee, S. (eds.) Progress in Cryptology INDOCRYPT 2011, Lecture Notes in Computer Science, vol. 7107, pp. 134\u2013145. Springer, Berlin \/ Heidelberg (2011)","DOI":"10.1007\/978-3-642-25578-6_11"},{"key":"118_CR2","doi-asserted-by":"crossref","unstructured":"Biham, E., Chen, R: Near-collisions of SHA-0. In: Franklin, M. (ed.) Advances in Cryptology - CRYPTO 2004, Lecture Notes in Computer Science, vol. 3152, pp. 199\u2013214. Springer, Berlin \/ Heidelberg (2004)","DOI":"10.1007\/978-3-540-28628-8_18"},{"issue":"11","key":"118_CR3","doi-asserted-by":"crossref","first-page":"7002","DOI":"10.1109\/TIT.2012.2207880","volume":"58","author":"C Bouillaguet","year":"2012","unstructured":"Bouillaguet, C., Derbez, P., Dunkelman, O., Fouque, P.-A., Keller, N., Rijmen, V.: Low-data complexity attacks on AES. IEEE Trans. Inf. Theory 58(11), 7002\u20137017 (2012)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"6","key":"118_CR4","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/C-M.1977.217750","volume":"10","author":"W Diffie","year":"1977","unstructured":"Diffie, W., Hellman, M.E.: Special feature exhaustive cryptanalysis of the NBS data encryption standard. Comput. 10(6), 74\u201384 (1977)","journal-title":"Comput."},{"key":"118_CR5","doi-asserted-by":"crossref","unstructured":"Dinur, I., Dunkelman, O., Shamir, A.: Improved attacks on full GOST. In: Canteaut, A. (ed.) FSE, Lecture Notes in Computer Science, vol. 7549, pp. 9\u201328. Springer (2012)","DOI":"10.1007\/978-3-642-34047-5_2"},{"key":"118_CR6","doi-asserted-by":"crossref","unstructured":"Dunkelman, O., Sekar, G., Preneel, B.: Improved meet-in-the-middle attacks on reduced-round DES. In: Srinathan, K., Rangan, C.P., Yung, M. (eds.) INDOCRYPT, Lecture Notes in Computer Science, vol. 4859, pp. 86\u2013100. Springer (2007)","DOI":"10.1007\/978-3-540-77026-8_8"},{"key":"118_CR7","doi-asserted-by":"crossref","unstructured":"Gong, Z., Nikova, S., Law, Y.: KLEIN: A new family of lightweight block ciphers. In: Juels, A., Paar, C. (eds.) RFID. Security and Privacy, Lecture Notes in Computer Science, vol. 7055, pp. 1\u201318. Springer, Berlin \/ Heidelberg (2012)","DOI":"10.1007\/978-3-642-25286-0_1"},{"key":"118_CR8","doi-asserted-by":"crossref","unstructured":"Lallemand, V., Naya-Plasencia, M.: Cryptanalysis of KLEIN FSE. To appear (2014)","DOI":"10.1007\/978-3-662-46706-0_23"},{"key":"118_CR9","doi-asserted-by":"crossref","unstructured":"Leurent, G. In: S. Moriai (ed.) : Cryptanalysis of WIDEA. Springer (2013)","DOI":"10.1007\/978-3-662-43933-3_3"},{"key":"118_CR10","doi-asserted-by":"crossref","unstructured":"Morita, H., Ohta, K., Miyaguchi, S.: A switching closure test to analyze cryptosystems. In: Feigenbaum, J. (ed.) Advances in Cryptology \u2014 CRYPTO 1991, Lecture Notes in Computer Science, vol. 576, pp. 183\u2013193. Springer, Berlin \/ Heidelberg (1992)","DOI":"10.1007\/3-540-46766-1_13"},{"key":"118_CR11","doi-asserted-by":"crossref","unstructured":"Yu, X., Wu, W., Li, Y., Zhang, L.: Cryptanalysis of reduced-round KLEIN block cipher. In: Wu, C., Yung, M., Lin, D. (eds.) Inscrypt, Lecture Notes in Computer Science, vol. 7537, pp. 237\u2013250 Springer (2011)","DOI":"10.1007\/978-3-642-34704-7_18"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-014-0118-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12095-014-0118-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-014-0118-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,18]],"date-time":"2019-08-18T01:49:19Z","timestamp":1566092959000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12095-014-0118-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12,3]]},"references-count":11,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2015,9]]}},"alternative-id":["118"],"URL":"https:\/\/doi.org\/10.1007\/s12095-014-0118-1","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"value":"1936-2447","type":"print"},{"value":"1936-2455","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,12,3]]}}}