{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:42:03Z","timestamp":1740148923546,"version":"3.37.3"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2018,3,3]],"date-time":"2018-03-03T00:00:00Z","timestamp":1520035200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572293"],"award-info":[{"award-number":["61572293"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61502276"],"award-info":[{"award-number":["61502276"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61692276"],"award-info":[{"award-number":["61692276"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Cryptography Development Fund","award":["MMJJ20170102"],"award-info":[{"award-number":["MMJJ20170102"]}]},{"name":"National Natural Science Foundation of Shandong Province, China","award":["ZR2016FM22"],"award-info":[{"award-number":["ZR2016FM22"]}]},{"name":"Fundamental Research Fund of Shandong Academy of Sciences","award":["2018:12-16"],"award-info":[{"award-number":["2018:12-16"]}]},{"name":"Major Scientific and Technological Innovation Projects of Shandong Province, China","award":["2017CXGC0704"],"award-info":[{"award-number":["2017CXGC0704"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1007\/s12095-018-0286-5","type":"journal-article","created":{"date-parts":[[2018,3,3]],"date-time":"2018-03-03T05:45:06Z","timestamp":1520055906000},"page":"755-776","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Statistical integral distinguisher with multi-structure and its application on AES-like ciphers"],"prefix":"10.1007","volume":"10","author":[{"given":"Tingting","family":"Cui","sequence":"first","affiliation":[]},{"given":"Huaifeng","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Sihem","family":"Mesnager","sequence":"additional","affiliation":[]},{"given":"Ling","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Meiqin","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,3,3]]},"reference":[{"key":"286_CR1","unstructured":"Aoki, K.: A middletext distinguisher for full CLEFIA-128. In: Proceedings of the international symposium on information theory and its applications, ISITA 2012, Honolulu, October 28-31, 2012, pp 521\u2013525. IEEE, Piscataway (2012)"},{"key":"286_CR2","unstructured":"Aumasson, J.-P., Meier, W.: Zero-sum distinguishers for reduced keccak-f and for the core functions of luffa and hamsi 01 (2018)"},{"key":"286_CR3","doi-asserted-by":"crossref","unstructured":"Barreto, P.S.L.M., Rijmen, V.: Whirlpool. In: van Tilborg, H.C.A., Jajodia, S. (eds.) Encyclopedia of cryptography and security. 2nd edn., pp 1384\u20131385. Springer, Berlin (2011)","DOI":"10.1007\/978-1-4419-5906-5_626"},{"key":"286_CR4","doi-asserted-by":"crossref","unstructured":"Biryukov, A. , Khovratovich, D., Nikolic, I.: Distinguisher and related-key attack on the full AES-256. In: Halevi, S. (ed.) Advances in cryptology - CRYPTO 2009, 29th annual international cryptology conference, Santa Barbara, August 16-20, 2009, Proceedings, vol. 5677 of Lecture Notes in Computer Science, pp 231\u2013249. Springer, Berlin (2009)","DOI":"10.1007\/978-3-642-03356-8_14"},{"key":"286_CR5","doi-asserted-by":"crossref","unstructured":"Blondeau, C., Peyrin, T., Wang, L.: Known-key distinguisher on full PRESENT. In: Gennaro, R., Robshaw, M. (eds.): Advances in cryptology - CRYPTO 2015 - 35th annual cryptology conference, Santa Barbara, August 16-20, 2015, Proceedings, Part I, vol. 9215 of lecture notes in computer science, pp. 455\u2013474. Springer, Berlin (2015)","DOI":"10.1007\/978-3-662-47989-6_22"},{"key":"286_CR6","doi-asserted-by":"crossref","unstructured":"Cui, T., Sun, L., Chen, H., Wang, M.: Statistical integral distinguisher with multi-structure and its application on AES. In: Pieprzyk, J., Suriadi, S. (eds.) Information security and privacy - 22nd Australasian conference, ACISP 2017, Auckland, July 3-5, 2017, Proceedings, Part I, vol. 10342 of lecture notes in computer science, pp 402\u2013420. Springer, Berlin (2017)","DOI":"10.1007\/978-3-319-60055-0_21"},{"key":"286_CR7","doi-asserted-by":"crossref","unstructured":"Daemen, J., Knudsen, L. R., Rijmen, V.: The block cipher square. In: Biham, E. (ed.) Fast software encryption, 4th international workshop, FSE \u201997, Haifa, Israel, January 20-22, 2017 proceedings, vol. 1267 of lecture notes in computer science, pp 149\u2013165. Springer, Berlin (1997)","DOI":"10.1007\/BFb0052343"},{"key":"286_CR8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The design of Rijndael: AES - the advanced encryption standard. Information Security and Cryptography","author":"J Daemen","year":"2002","unstructured":"Daemen, J., Rijmen, V.: The design of Rijndael: AES - the advanced encryption standard. Information Security and Cryptography. Springer, Berlin (2002)"},{"key":"286_CR9","unstructured":"Gauravaram, P., Knudsen, L.R., Matusiewicz, K., Mendel, F., Rechberger, C., Schl\u00e4ffer, M., Thomsen, S.S.: Gr\u00f8stl - a SHA-3 candidate. In: Handschuh, H., Lucks, S., Preneel, B., Rogaway, P. (eds.) Symmetric Cryptography, 11.01. \u2013 16.01.2009, vol. 09031 of Dagstuhl seminar proceedings. Schloss Dagstuhl - Leibniz-Zentrum f\u00fcr Informatik, Germany (2009)"},{"key":"286_CR10","doi-asserted-by":"crossref","unstructured":"Gilbert, H.: A simplified representation of AES. In: Sarkar, P., Iwata, T. (eds.) Advances in cryptology - ASIACRYPT 2014 - 20th international conference on the theory and application of cryptology and information security, Kaoshiung, R.O.C., December 7-11, 2014, Proceedings, Part I, vol. 8873 of lecture notes in computer science, pp 200\u2013222. Springer, Berlin (2014)","DOI":"10.1007\/978-3-662-45611-8_11"},{"key":"286_CR11","doi-asserted-by":"crossref","unstructured":"Gilbert, H. , Peyrin, T.: Super-sbox cryptanalysis: Improved attacks for aes-like permutations. In: Hong, S., Iwata, T. (eds.) Fast software encryption, 17th international workshop, FSE 2010, Seoul, February 7-10, 2010, Revised Selected Papers, vol. 6147 of lecture notes in computer science, pp 365\u2013383. Springer, Berlin (2010)","DOI":"10.1007\/978-3-642-13858-4_21"},{"issue":"2","key":"286_CR12","first-page":"192","volume":"2016","author":"L Grassi","year":"2016","unstructured":"Grassi, L., Rechberger, C., R\u00f8njom, S.: Subspace trail cryptanalysis and its applications to AES. IACR Trans Symmetric Cryptol 2016(2), 192\u2013225 (2016)","journal-title":"IACR Trans Symmetric Cryptol"},{"key":"286_CR13","doi-asserted-by":"crossref","unstructured":"Grassi, L., Rechberger, C., R\u00f8njom, S.: A new structural-differential property of 5-round AES. In: Coron, J., Nielsen, J.B. (eds.) Advances in cryptology - EUROCRYPT 2017 - 36th annual international conference on the theory and applications of cryptographic techniques, Paris, April 30 - May 4, 2017, Proceedings, Part II, volume 10211 of lecture notes in computer science, pp 289\u2013317 (2017)","DOI":"10.1007\/978-3-319-56614-6_10"},{"key":"286_CR14","doi-asserted-by":"crossref","unstructured":"Guo, J., Peyrin, T., Poschmann, A.: The PHOTON family of lightweight hash functions. In: Rogaway, P. (ed.) Advances in cryptology - CRYPTO 2011 - 31st annual cryptology conference, Santa Barbara, August 14-18, 2011 proceedings, vol. 6841 of lecture notes in computer science, pp 222\u2013239. Springer, Berlin (2011)","DOI":"10.1007\/978-3-642-22792-9_13"},{"key":"286_CR15","doi-asserted-by":"crossref","unstructured":"Jean, J., Naya-Plasencia, M., Peyrin, T.: Improved rebound attack on the finalist gr\u00f8stl. In: Canteaut, A. (ed.) Fast software encryption - 19th international workshop, FSE 2012, Washington, March 19-21, 2012, Revised Selected papers, vol. 7549 of lecture notes in computer science, pp 110\u2013126. Springer, Berlin (2012)","DOI":"10.1007\/978-3-642-34047-5_7"},{"key":"286_CR16","doi-asserted-by":"crossref","unstructured":"Jean, J., Naya-Plasencia, M., Peyrin, T.: Multiple limited-birthday distinguishers and applications. In: Lange, T., Lauter, K.E., Lisonek, P. (eds.) Selected areas in cryptography - SAC 2013 - 20th international conference, Burnaby, August 14-16, 2013, Revised Selected papers, vol. 8282 of lecture notes in computer science, pp 533\u2013550. Springer, Berlin (2013)","DOI":"10.1007\/978-3-662-43414-7_27"},{"key":"286_CR17","doi-asserted-by":"crossref","unstructured":"Knudsen, L.R., Rijmen, V.: Known-key distinguishers for some block ciphers. In: Kurosawa, K. (ed.) Advances in cryptology - ASIACRYPT 2007, 13th international conference on the theory and application of cryptology and information security, Kuching, December 2-6, 2007, Proceedings, vol. 4833 of lecture notes in computer science, pp 315\u2013324. Springer, Berlin (2007)","DOI":"10.1007\/978-3-540-76900-2_19"},{"key":"286_CR18","doi-asserted-by":"crossref","unstructured":"Knudsen, L.R., Wagner, D.A.: Integral cryptanalysis. In: Daemen, J., Rijmen, V. (eds.) Fast software encryption, 9th international workshop, FSE 2002, Leuven, February 4-6, 2002, revised papers, vol. 2365 of lecture notes in computer science, pp 112\u2013127. Springer, Berlin (2002)","DOI":"10.1007\/3-540-45661-9_9"},{"key":"286_CR19","doi-asserted-by":"crossref","unstructured":"Lamberger, M., Mendel, F., Rechberger, C., Rijmen, V., Schl\u00e4ffer, M.: Rebound distinguishers: Results on the full whirlpool compression function. In: Matsui, M. (ed.) Advances in cryptology - ASIACRYPT 2009, 15th international conference on the theory and application of cryptology and information security, Tokyo, December 6-10, 2009. Proceedings, vol. 5912 of lecture notes in computer science, pp 126\u2013143. Springer, Berlin (2009)","DOI":"10.1007\/978-3-642-10366-7_8"},{"issue":"2","key":"286_CR20","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/s00145-013-9166-5","volume":"28","author":"M Lamberger","year":"2015","unstructured":"Lamberger, M., Mendel, F., Schl\u00e4ffer, M., Rechberger, C., Rijmen, V.: The rebound attack and subspace distinguishers: Application to whirlpool. J. Cryptology 28(2), 257\u2013296 (2015)","journal-title":"J. Cryptology"},{"key":"286_CR21","doi-asserted-by":"crossref","unstructured":"Mendel, F., Peyrin, T., Rechberger, C., Schl\u00e4ffer, M.: Improved cryptanalysis of the reduced gr\u00f8stl compression function, ECHO permutation and AES block cipher. In: Rijmen, JrM.J.J.V., Safavi-Naini, R. (eds.) Selected areas in cryptography, 16th annual international workshop, SAC 2009, Calgary, August 13-14, 2009, revised selected papers, vol. 5867 of lecture notes in computer science, pp 16\u201335. Springer, Berlin (2009)","DOI":"10.1007\/978-3-642-05445-7_2"},{"key":"286_CR22","doi-asserted-by":"crossref","unstructured":"Minier, M., Phan, R.C., Pousse, B.: Distinguishers for ciphers and known key attack against rijndael with large blocks. In: Preneel, B. (ed.) Progress in cryptology - AFRICACRYPT 2009, Second international conference on cryptology in Africa, Gammarth, June 21-25, 2009, Proceedings, vol. 5580 of lecture notes in computer science, pp 60\u201376. Springer, Berlin (2009)","DOI":"10.1007\/978-3-642-02384-2_5"},{"key":"286_CR23","doi-asserted-by":"crossref","unstructured":"Sun, B., Liu, M., Guo, J., Qu, L., Rijmen, V.: New insights on aes-like SPN ciphers. In: Robshaw, M., Katz, J. (eds.) Advances in cryptology - CRYPTO 2016 - 36th annual international cryptology conference, Santa Barbara, August 14-18, 2016, Proceedings, Part I, vol. 9814 of lecture notes in computer science, pp 605\u2013624. Springer, Berlin (2016)","DOI":"10.1007\/978-3-662-53018-4_22"},{"key":"286_CR24","doi-asserted-by":"crossref","unstructured":"Sun, B. , Liu, Z., Rijmen, V., Li, R., Cheng, L., Wang, Q., AlKhzaimi, H., Li, C.: Links among impossible differential, integral and zero correlation linear cryptanalysis. In: Gennaro, R., Robshaw, M. (eds.): Advances in cryptology - CRYPTO 2015 - 35th annual cryptology conference, Santa Barbara, August 16-20, 2015, Proceedings, Part I, vol. 9215 of lecture notes in computer science, pp. 95\u2013115. Springer, Berlin (2015)","DOI":"10.1007\/978-3-662-47989-6_5"},{"key":"286_CR25","doi-asserted-by":"crossref","unstructured":"Wang, M., Cui, T., Chen, H., Sun, L., Wen, L., Bogdanov, A.: Integrals go statistical: Cryptanalysis of full skipjack variants. In: Peyrin, T. (ed.) Fast software encryption - 23rd international conference, FSE 2016, Bochum, March 20-23, 2016, revised selected papers, vol. 9783 of lecture notes in computer science, pp 399\u2013415. Springer, Berlin (2016)","DOI":"10.1007\/978-3-662-52993-5_20"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12095-018-0286-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-018-0286-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-018-0286-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,15]],"date-time":"2022-08-15T05:08:49Z","timestamp":1660540129000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12095-018-0286-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,3]]},"references-count":25,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2018,9]]}},"alternative-id":["286"],"URL":"https:\/\/doi.org\/10.1007\/s12095-018-0286-5","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"type":"print","value":"1936-2447"},{"type":"electronic","value":"1936-2455"}],"subject":[],"published":{"date-parts":[[2018,3,3]]},"assertion":[{"value":"29 June 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 February 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 March 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}