{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:42:01Z","timestamp":1740148921005,"version":"3.37.3"},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2017,8,4]],"date-time":"2017-08-04T00:00:00Z","timestamp":1501804800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100012166","name":"973 Program","doi-asserted-by":"crossref","award":["2013CB834205"],"award-info":[{"award-number":["2013CB834205"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61133013"],"award-info":[{"award-number":["61133013"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572293"],"award-info":[{"award-number":["61572293"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004602","name":"Program for New Century Excellent Talents in University","doi-asserted-by":"publisher","award":["NCET-13-0350"],"award-info":[{"award-number":["NCET-13-0350"]}],"id":[{"id":"10.13039\/501100004602","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Program from Science and Technology on Commu- nication Security Laboratory of China","award":["9140c110207150c11050"],"award-info":[{"award-number":["9140c110207150c11050"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2018,1]]},"DOI":"10.1007\/s12095-017-0245-6","type":"journal-article","created":{"date-parts":[[2017,8,4]],"date-time":"2017-08-04T01:27:25Z","timestamp":1501810045000},"page":"195-209","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Statistical integral attack on CAST-256 and IDEA"],"prefix":"10.1007","volume":"10","author":[{"given":"Tingting","family":"Cui","sequence":"first","affiliation":[]},{"given":"Huaifeng","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Long","family":"Wen","sequence":"additional","affiliation":[]},{"given":"Meiqin","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,4]]},"reference":[{"key":"245_CR1","first-page":"71","volume-title":"SAC 1997","author":"CM Adams","year":"1997","unstructured":"Adams, C.M.: Constructing symmetric ciphers using the CAST design procedure. In: Kranakis, E., Oorschot, P. (eds.) SAC 1997, pp 71\u2013104. Springer, US (1997)"},{"key":"245_CR2","doi-asserted-by":"crossref","unstructured":"Adams, C.M.: The CAST-256 encryption algorithm. In: AES Proposal (1998)","DOI":"10.17487\/rfc2612"},{"key":"245_CR3","unstructured":"Aumasson, J. -P., Meier, W.: Zero-sum distinguishers for reduced Keccak-f and for the core functions of Luffa and Hamsi. Presented at the rump session of cryptographic hardware and embedded systems-CHES 2009 (2009)"},{"key":"245_CR4","unstructured":"Blondeau, C., Nyberg, K.: Joint data and key distribution of simple, multiple, and multidimensional linear cryptanalysis test statistic and its impact to data complexity. Cryptology ePrint Archive: Report 2015\/935. \n                    https:\/\/eprint.iacr.org\/2015\/935"},{"key":"245_CR5","first-page":"244","volume-title":"ASIACRYPT 2012, LNCS, vol. 7658","author":"A Bogdanov","year":"2012","unstructured":"Bogdanov, A., Leander, G., Nyberg, K., Wang, M.: Integral and multidimensional linear distinguishers with correlation zero. In: Wang, X., Sako, K (eds.) ASIACRYPT 2012, LNCS, vol. 7658, pp 244\u2013261. Springer, Heidelberg (2012)"},{"key":"245_CR6","first-page":"1","volume-title":"Designs, Codes and Cryptography","author":"H Chen","year":"2016","unstructured":"Chen, H., Cui, T., Wang, M.: Improving algorithm 2 in multidimensional (zero-correlation) linear cryptanalysis using \u03c7\n                    2-method Designs, Codes and Cryptography, pp 1\u201318. Springer, Heidelberg (2016)"},{"key":"245_CR7","first-page":"149","volume-title":"FSE 1997. LNCS, vol. 1267","author":"J Daemen","year":"1997","unstructured":"Daemen, J., Knudsen, L.R., Rijmen, V.: The block cipher square FSE 1997. LNCS, vol. 1267, pp 149\u2013165. Springer, Heidelberg (1997)"},{"key":"245_CR8","first-page":"147","volume-title":"SAC 2002, LNCS, vol. 2595","author":"H Demirci","year":"2003","unstructured":"Demirci, H.: Square-like attacks on reduced rounds of IDEA. In: Nyberg, K., Heys, H (eds.) SAC 2002, LNCS, vol. 2595, pp 147\u2013159. Springer, Heidelberg (2003)"},{"key":"245_CR9","first-page":"112","volume-title":"FSE 2002. LNCS, vol. 2365","author":"LR Knudsen","year":"2002","unstructured":"Knudsen, L.R., Wagner, D.: Integral cryptanalysis. In: Daemen, J., Rijmen, V (eds.) FSE 2002. LNCS, vol. 2365, pp 112\u2013127. Springer, Heidelberg (2002)"},{"key":"245_CR10","first-page":"389","volume-title":"Eurocrypt 1990, LNCS, vol. 473","author":"X Lai","year":"1990","unstructured":"Lai, X., Massey, J.L.: A proposal for a new block encryption standard. In: Damgrd, I.B. (ed.) Eurocrypt 1990, LNCS, vol. 473, pp 389\u2013404. Springer, Heidelberg (1990)"},{"key":"245_CR11","unstructured":"Nakahara, J. Jr., Barreto, P.S.L.M., Preneel, B., Vandewalle, J., Kim, H.Y.: Square attacks against reduced-round PES and IDEA block ciphers. IACR Cryptology ePrint Archive Report 2001\/068 (2001)"},{"key":"245_CR12","first-page":"45","volume":"2007","author":"JJr Nakahara","year":"2007","unstructured":"Nakahara, J. Jr., Rasmussen, M.: Linear analysis of reduced-round CAST-128 and CAST-256. SBSEG 2007, 45\u201355 (2007)","journal-title":"SBSEG"},{"key":"245_CR13","unstructured":"Seki, H., Kaneko, T.: Differential cryptanalysis of CAST-256 reduced to nine quad-rounds. IEICE transactions on fundamentals of electronics communications and computer sciences, (E84-A)4, pp. 913\u2013918 (2001)"},{"key":"245_CR14","first-page":"95","volume-title":"CRYPTO 2015, LNCS, vol. 9215","author":"B Sun","year":"2015","unstructured":"Sun, B., Liu, Z., Rijmen, V., Li, R., Cheng, L., Wang, Q., Alkhzaimi, H., Li, C.: Links among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis. In: Gennaro, R., Robshaw, M (eds.) CRYPTO 2015, LNCS, vol. 9215, pp 95\u2013115. Springer, Heidelberg (2015)"},{"key":"245_CR15","first-page":"156","volume-title":"FSE 1999, LNCS, vol. 1636","author":"D Wagner","year":"1999","unstructured":"Wagner, D.: The boomerang attack. In: Knudsen, L (ed.) FSE 1999, LNCS, vol. 1636, pp 156\u2013170. Springer, Heidelberg (1999)"},{"key":"245_CR16","first-page":"161","volume-title":"INDOCRYPT 2014, LNCS, vol. 8885","author":"L Wen","year":"2014","unstructured":"Wen, L., Wang, M., Bogdanov, A., Chen, H.: General application of FFT in cryptanalysis and improved attack on CAST-256. In: Meier, W., Mukhopadhyay, D (eds.) INDOCRYPT 2014, LNCS, vol. 8885, pp 161\u2013176. Springer, Heidelberg (2014)"},{"key":"245_CR17","first-page":"399","volume-title":"FSE 2016, LNCS, vol. 9783","author":"M Wang","year":"2016","unstructured":"Wang, M., Cui, T., Chen, H., Sun, L., Wen, L., Bogdanov, A.: Integrals go statistical: Improved cryptanalysis of skipjack variants. In: Peyrin, T. (ed.) FSE 2016, LNCS, vol. 9783, pp 399\u2013415. Springer, Heidelberg (2016)"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12095-017-0245-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-017-0245-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-017-0245-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,3]],"date-time":"2020-03-03T07:30:53Z","timestamp":1583220653000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12095-017-0245-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,4]]},"references-count":17,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,1]]}},"alternative-id":["245"],"URL":"https:\/\/doi.org\/10.1007\/s12095-017-0245-6","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"type":"print","value":"1936-2447"},{"type":"electronic","value":"1936-2455"}],"subject":[],"published":{"date-parts":[[2017,8,4]]},"assertion":[{"value":"23 November 2016","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 July 2017","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 August 2017","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}