{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,26]],"date-time":"2024-08-26T07:10:47Z","timestamp":1724656247563},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2024,9]]},"DOI":"10.1007\/s12095-024-00708-z","type":"journal-article","created":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T09:12:37Z","timestamp":1711962757000},"page":"921-947","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["New linear approximation of modular addition and improved differential-linear cryptanalysis of SPARX-64\/128"],"prefix":"10.1007","volume":"16","author":[{"given":"Zhichao","family":"Xu","sequence":"first","affiliation":[]},{"given":"Hong","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Lin","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Wenfeng","family":"Qi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,1]]},"reference":[{"key":"708_CR1","doi-asserted-by":"publisher","unstructured":"Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. In: Menezes, A., Vanstone, S.A. (eds.) Advances in Cryptology - CRYPTO \u201990, 10th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11\u201315, 1990, Proceedings. Lecture Notes in Computer Science, vol. 537, pp. 2\u201321. Springer, Berlin, Heidelberg (1990). https:\/\/doi.org\/10.1007\/3-540-38424-3_1","DOI":"10.1007\/3-540-38424-3_1"},{"key":"708_CR2","doi-asserted-by":"publisher","unstructured":"Matsui, M.: Linear cryptanalysis method for DES cipher. In: Helleseth, T. (ed.) Advances in Cryptology - EUROCRYPT \u201993, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings. Lecture Notes in Computer Science, vol. 765, pp. 386\u2013397. Springer, Berlin, Heidelberg (1993). https:\/\/doi.org\/10.1007\/3-540-48285-7_33","DOI":"10.1007\/3-540-48285-7_33"},{"key":"708_CR3","doi-asserted-by":"publisher","unstructured":"Langford, S.K., Hellman, M.E.: Differential-linear cryptanalysis. In: Desmedt, Y. (ed.) Advances in Cryptology - CRYPTO \u201994, 14th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21\u201325, 1994, Proceedings. Lecture Notes in Computer Science, vol. 839, pp. 17\u201325. Springer, Berlin, Heidelberg (1994). https:\/\/doi.org\/10.1007\/3-540-48658-5_3","DOI":"10.1007\/3-540-48658-5_3"},{"key":"708_CR4","doi-asserted-by":"publisher","unstructured":"Biham, E., Dunkelman, O., Keller, N.: Enhancing differential-linear cryptanalysis. In: Zheng, Y. (ed.) Advances in Cryptology - ASIACRYPT 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings. Lecture Notes in Computer Science, vol. 2501, pp. 254\u2013266. Springer, Berlin, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-36178-2_16","DOI":"10.1007\/3-540-36178-2_16"},{"key":"708_CR5","doi-asserted-by":"publisher","unstructured":"Huang, T., Tjuawinata, I., Wu, H.: Differential-linear cryptanalysis of ICEPOLE. In: Leander, G. (ed.) Fast Software Encryption - 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers. Lecture Notes in Computer Science, vol. 9054, pp. 243\u2013263. Springer, Berlin, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-48116-5_12","DOI":"10.1007\/978-3-662-48116-5_12"},{"key":"708_CR6","doi-asserted-by":"publisher","unstructured":"Lu, J.: A methodology for differential-linear cryptanalysis and its applications - (extended abstract). In: Canteaut, A. (ed.) Fast Software Encryption - 19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers. Lecture Notes in Computer Science, vol. 7549, pp. 69\u201389. Springer, Berlin, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-34047-5_5","DOI":"10.1007\/978-3-642-34047-5_5"},{"key":"708_CR7","doi-asserted-by":"publisher","unstructured":"Bar-On, A., Dunkelman, O., Keller, N., Weizman, A.: DLCT: A new tool for differential-linear cryptanalysis. In: Ishai, Y., Rijmen, V. (eds.) Advances in Cryptology \u2013 EUROCRYPT 2019, pp. 313\u2013342. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-17653-2_11","DOI":"10.1007\/978-3-030-17653-2_11"},{"key":"708_CR8","doi-asserted-by":"publisher","unstructured":"Liu, M., Lu, X., Lin, D.: Differential-linear cryptanalysis from an algebraic perspective. In: Malkin, T., Peikert, C. (eds.) Advances in Cryptology \u2013 CRYPTO 2021, pp. 247\u2013277. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-84252-9_9","DOI":"10.1007\/978-3-030-84252-9_9"},{"key":"708_CR9","doi-asserted-by":"publisher","unstructured":"Lipmaa, H., Moriai, S.: Efficient algorithms for computing differential properties of addition. In: Matsui, M. (ed.) Fast Software Encryption, 8th International Workshop, FSE 2001, Yokohama, Japan, April 2-4, 2001, Revised Papers. Lecture Notes in Computer Science, vol. 2355, pp. 336\u2013350. Springer, Berlin, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-45473-X_28","DOI":"10.1007\/3-540-45473-X_28"},{"key":"708_CR10","doi-asserted-by":"publisher","unstructured":"Wall\u00e9n, J.: Linear approximations of addition modulo 2$$^{n}$$. In: Johansson, T. (ed.) Fast Software Encryption, 10th International Workshop, FSE 2003, Lund, Sweden, February 24-26, 2003, Revised Papers. Lecture Notes in Computer Science, vol. 2887, pp. 261\u2013273. Springer, Berlin, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-39887-5_20","DOI":"10.1007\/978-3-540-39887-5_20"},{"issue":"1\u20133","key":"708_CR11","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/s10623-012-9668-4","volume":"66","author":"E Schulte-Geers","year":"2013","unstructured":"Schulte-Geers, E.: On ccz-equivalence of addition mod 2$$^{n}$$. Des. Codes Cryptogr. 66(1\u20133), 111\u2013127 (2013). https:\/\/doi.org\/10.1007\/s10623-012-9668-4","journal-title":"Des. Codes Cryptogr."},{"key":"708_CR12","doi-asserted-by":"publisher","unstructured":"Fu, K., Wang, M., Guo, Y., Sun, S., Hu, L.: MILP-based automatic search algorithms for differential and linear trails for speck. In: Peyrin, T. (ed.) Fast Software Encryption - 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers. Lecture Notes in Computer Science, vol. 9783, pp. 268\u2013288. Springer, Berlin, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-52993-5_14","DOI":"10.1007\/978-3-662-52993-5_14"},{"key":"708_CR13","doi-asserted-by":"publisher","unstructured":"Liu, Y., Wang, Q., Rijmen, V.: Automatic search of linear trails in ARX with applications to SPECK and chaskey. In: Manulis, M., Sadeghi, A., Schneider, S.A. (eds.) Applied Cryptography and Network Security - 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings. Lecture Notes in Computer Science, vol. 9696, pp. 485\u2013499. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-39555-5_26","DOI":"10.1007\/978-3-319-39555-5_26"},{"key":"708_CR14","doi-asserted-by":"publisher","unstructured":"Leurent, G.: Improved differential-linear cryptanalysis of 7-round chaskey with partitioning. In: Fischlin, M., Coron, J. (eds.) Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I. Lecture Notes in Computer Science, vol. 9665, pp. 344\u2013371. Springer, Berlin, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-49890-3_14","DOI":"10.1007\/978-3-662-49890-3_14"},{"key":"708_CR15","doi-asserted-by":"publisher","unstructured":"Biham, E., Carmeli, Y.: An improvement of linear cryptanalysis with addition operations with applications to FEAL-8X. In: Joux, A., Youssef, A.M. (eds.) Selected Areas in Cryptography - SAC 2014 - 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers. Lecture Notes in Computer Science, vol. 8781, pp. 59\u201376. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-13051-4_4","DOI":"10.1007\/978-3-319-13051-4_4"},{"key":"708_CR16","doi-asserted-by":"publisher","unstructured":"Beierle, C., Leander, G., Todo, Y.: Improved differential-linear attacks with applications to ARX ciphers. In: Micciancio, D., Ristenpart, T. (eds.) Advances in Cryptology \u2013 CRYPTO 2020, pp. 329\u2013358. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-56877-1_12","DOI":"10.1007\/978-3-030-56877-1_12"},{"issue":"4","key":"708_CR17","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/s00145-022-09437-z","volume":"35","author":"C Beierle","year":"2022","unstructured":"Beierle, C., Broll, M., Canale, F., David, N., Fl\u00f3rez-Guti\u00e9rrez, A., Leander, G., Naya-Plasencia, M., Todo, Y.: Improved differential-linear attacks with applications to ARX ciphers. J. Cryptol. 35(4), 29 (2022). https:\/\/doi.org\/10.1007\/s00145-022-09437-z","journal-title":"J. Cryptol."},{"key":"708_CR18","doi-asserted-by":"publisher","unstructured":"Dey, S., Garai, H.K., Sarkar, S., Sharma, N.K.: Revamped differential-linear cryptanalysis on reduced round ChaCha. In: Dunkelman, O., Dziembowski, S. (eds.) Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part III. Lecture Notes in Computer Science, vol. 13277, pp. 86\u2013114. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-07082-2_4","DOI":"10.1007\/978-3-031-07082-2_4"},{"key":"708_CR19","doi-asserted-by":"publisher","unstructured":"Wang, S., Liu, M., Hou, S., Lin, D.: Moving a step of ChaCha in syncopated rhythm. In: Handschuh, H., Lysyanskaya, A. (eds.) Advances in Cryptology - CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part III. Lecture Notes in Computer Science, vol. 14083, pp. 273\u2013304. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-38548-3_10","DOI":"10.1007\/978-3-031-38548-3_10"},{"key":"708_CR20","doi-asserted-by":"publisher","unstructured":"Liu, Y., Sun, S., Li, C.: Rotational cryptanalysis from a differential-linear perspective - practical distinguishers for round-reduced friet, xoodoo, and alzette. In: Canteaut, A., Standaert, F. (eds.) Advances in Cryptology - EUROCRYPT 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part I. Lecture Notes in Computer Science, vol. 12696, pp. 741\u2013770. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-77870-5_26","DOI":"10.1007\/978-3-030-77870-5_26"},{"issue":"1","key":"708_CR21","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s00145-022-09440-4","volume":"36","author":"Y Liu","year":"2023","unstructured":"Liu, Y., Niu, Z., Sun, S., Li, C., Hu, L.: Rotational differential-linear cryptanalysis revisited. J. Cryptol. 36(1), 3 (2023). https:\/\/doi.org\/10.1007\/s00145-022-09440-4","journal-title":"J. Cryptol."},{"key":"708_CR22","doi-asserted-by":"publisher","unstructured":"Niu, Z., Sun, S., Liu, Y., Li, C.: Rotational differential-linear distinguishers of ARX ciphers with arbitrary output linear masks. In: Dodis, Y., Shrimpton, T. (eds.) Advances in Cryptology - CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part I. Lecture Notes in Computer Science, vol. 13507, pp. 3\u201332. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-15802-5_1","DOI":"10.1007\/978-3-031-15802-5_1"},{"key":"708_CR23","doi-asserted-by":"publisher","unstructured":"Dinu, D., Perrin, L., Udovenko, A., Velichkov, V., Gro\u00dfsch\u00e4dl, J., Biryukov, A.: Design strategies for ARX with provable bounds: SPARX and LAX. In: Cheon, J.H., Takagi, T. (eds.) Advances in Cryptology \u2013 ASIACRYPT 2016, pp. 484\u2013513. Springer, Berlin, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53887-6_18","DOI":"10.1007\/978-3-662-53887-6_18"},{"key":"708_CR24","doi-asserted-by":"publisher","unstructured":"Abdelkhalek, A., Tolba, M., Youssef, A.M.: Impossible differential attack on reduced round SPARX-64\/128. In: Joye, M., Nitaj, A. (eds.) Progress in Cryptology - AFRICACRYPT 2017, pp. 135\u2013146. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-57339-7_8","DOI":"10.1007\/978-3-319-57339-7_8"},{"key":"708_CR25","doi-asserted-by":"publisher","unstructured":"Tolba, M., Abdelkhalek, A., Youssef, A.M.: Multidimensional zero-correlation linear cryptanalysis of reduced round SPARX-128. In: Adams, C., Camenisch, J. (eds.) Selected Areas in Cryptography - SAC 2017 - 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers. Lecture Notes in Computer Science, vol. 10719, pp. 423\u2013441. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-72565-9_22","DOI":"10.1007\/978-3-319-72565-9_22"},{"key":"708_CR26","doi-asserted-by":"publisher","unstructured":"Ankele, R., List, E.: Differential cryptanalysis of round-reduced SPARX-64\/128. In: Preneel, B., Vercauteren, F. (eds.) Applied Cryptography and Network Security - 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings. Lecture Notes in Computer Science, vol. 10892, pp. 459\u2013475. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-93387-0_24","DOI":"10.1007\/978-3-319-93387-0_24"},{"key":"708_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/2193543","volume":"2021","author":"D Zhou","year":"2021","unstructured":"Zhou, D., Chen, H., Zong, R., Song, N.: Zero-correlation linear cryptanalysis on SPARX-64. J. Sensors. 2021, 1\u201311 (2021). https:\/\/doi.org\/10.1155\/2021\/2193543","journal-title":"J. Sensors."},{"key":"708_CR28","doi-asserted-by":"publisher","unstructured":"Langford, S.K., Hellman, M.E.: Differential-linear cryptanalysis. In: Desmedt, Y.G. (ed.) Advances in Cryptology \u2014 CRYPTO \u201994, pp. 17\u201325. Springer, Berlin, Heidelberg (1994). https:\/\/doi.org\/10.1007\/3-540-48658-5_3","DOI":"10.1007\/3-540-48658-5_3"},{"issue":"1","key":"708_CR29","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/s00145-007-9013-7","volume":"21","author":"AA Sel\u00e7uk","year":"2008","unstructured":"Sel\u00e7uk, A.A.: On probability of success in linear and differential cryptanalysis. J. Cryptol. 21(1), 131\u2013147 (2008). https:\/\/doi.org\/10.1007\/s00145-007-9013-7","journal-title":"J. Cryptol."},{"issue":"1","key":"708_CR30","doi-asserted-by":"publisher","first-page":"269","DOI":"10.46586\/tosc.v2021.i1.269-315","volume":"2021","author":"L Sun","year":"2021","unstructured":"Sun, L., Wang, W., Wang, M.: Accelerating the search of differential and linear characteristics with the SAT method. IACR Trans. Symmetric Cryptol. 2021(1), 269\u2013315 (2021). https:\/\/doi.org\/10.46586\/tosc.v2021.i1.269-315","journal-title":"IACR Trans. Symmetric Cryptol."}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-024-00708-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12095-024-00708-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-024-00708-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,26]],"date-time":"2024-08-26T06:07:53Z","timestamp":1724652473000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12095-024-00708-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,1]]},"references-count":30,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2024,9]]}},"alternative-id":["708"],"URL":"https:\/\/doi.org\/10.1007\/s12095-024-00708-z","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"type":"print","value":"1936-2447"},{"type":"electronic","value":"1936-2455"}],"subject":[],"published":{"date-parts":[[2024,4,1]]},"assertion":[{"value":"4 October 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 March 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 April 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}