{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T16:35:09Z","timestamp":1774370109638,"version":"3.50.1"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2025,1,15]],"date-time":"2025-01-15T00:00:00Z","timestamp":1736899200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,15]],"date-time":"2025-01-15T00:00:00Z","timestamp":1736899200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Mathematical Center in Akademgorodok","award":["075-15-2022-282"],"award-info":[{"award-number":["075-15-2022-282"]}]},{"name":"Mathematical Center in Akademgorodok","award":["075-15-2022-282"],"award-info":[{"award-number":["075-15-2022-282"]}]},{"name":"Mathematical Center in Akademgorodok","award":["075-15-2022-282"],"award-info":[{"award-number":["075-15-2022-282"]}]},{"name":"Mathematical Center in Akademgorodok","award":["075-15-2022-282"],"award-info":[{"award-number":["075-15-2022-282"]}]},{"name":"Mathematical Center in Akademgorodok","award":["075-15-2022-282"],"award-info":[{"award-number":["075-15-2022-282"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2025,3]]},"DOI":"10.1007\/s12095-025-00773-y","type":"journal-article","created":{"date-parts":[[2025,1,15]],"date-time":"2025-01-15T04:40:30Z","timestamp":1736916030000},"page":"541-570","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["On additive differential probabilities of the composition of bitwise exclusive-or and a bit rotation"],"prefix":"10.1007","volume":"17","author":[{"given":"Nikolay","family":"Kolomeec","sequence":"first","affiliation":[]},{"given":"Ivan","family":"Sutormin","sequence":"additional","affiliation":[]},{"given":"Denis","family":"Bykov","sequence":"additional","affiliation":[]},{"given":"Matvey","family":"Panferov","sequence":"additional","affiliation":[]},{"given":"Tatyana","family":"Bonich","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,15]]},"reference":[{"key":"773_CR1","doi-asserted-by":"crossref","unstructured":"Shimizu, A., Miyaguchi, S.: Fast data encipherment algorithm FEAL. In: Chaum, D., Price, W.L. (eds.) EUROCRYPT 1987. LNCS, vol. 304, pp. 267\u2013278. Springer, Berlin, Heidelberg (1988). https:\/\/doi.org\/10.1007\/3-540-39118-5_24","DOI":"10.1007\/3-540-39118-5_24"},{"key":"773_CR2","unstructured":"Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., Wingers, L.: The SIMON and SPECK Families of Lightweight Block Ciphers. Cryptology ePrint Archive, Report 2013\/404. https:\/\/eprint.iacr.org\/2013\/404 (2013)"},{"key":"773_CR3","unstructured":"Bernstein, D.J.: Salsa20 specification. https:\/\/cr.yp.to\/snuffle\/spec.pdf (2005)"},{"key":"773_CR4","unstructured":"Bernstein, D.J.: ChaCha, a variant of Salsa20. https:\/\/cr.yp.to\/chacha\/ chacha-20080128.pdf (2008)"},{"key":"773_CR5","doi-asserted-by":"publisher","unstructured":"Aumasson, J., Meier, W., Phan, R.C.-, Henzen, L.: The Hash Function BLAKE. Information Security and Cryptography. Springer, Berlin, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-44757-4","DOI":"10.1007\/978-3-662-44757-4"},{"key":"773_CR6","unstructured":"Ferguson, N., Lucks, S., Schneier, B., Whiting, D., Bellare, M., Kohno, T., Callas, J., Walker, J.: The Skein Hash Function Family (2009). http:\/\/www.skein-hash.info"},{"key":"773_CR7","doi-asserted-by":"publisher","unstructured":"Mouha, N., Mennink, B., Herrewege, A., Watanabe, D., Preneel, B., Verbauwhede, I.: Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers, pp. 306\u2013323 (2014). https:\/\/doi.org\/10.1007\/978-3-319-13051-4_19","DOI":"10.1007\/978-3-319-13051-4_19"},{"issue":"1","key":"773_CR8","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E Biham","year":"1991","unstructured":"Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. J. Cryptol. 4(1), 3\u201372 (1991). https:\/\/doi.org\/10.1007\/BF00630563","journal-title":"J. Cryptol."},{"key":"773_CR9","doi-asserted-by":"crossref","unstructured":"Biryukov, A., Velichkov, V.: Automatic search for differential trails in ARX ciphers. In: CT-RSA 2014. LNCS, vol. 8366, pp. 227\u2013250. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-04852-9_12","DOI":"10.1007\/978-3-319-04852-9_12"},{"key":"773_CR10","unstructured":"Leurent, G.: Analysis of Differential Attacks in ARX Constructions. In: Wang, X., Sako, K. (eds.) Advances in Cryptology \u2013 ASIACRYPT 2012. LNCS, vol. 7658, pp. 226\u2013243. Springer, Berlin, Heidelberg (2012). https:\/\/doi.org\/10.1007\/ 978-3-642-34961-4_15"},{"key":"773_CR11","doi-asserted-by":"crossref","unstructured":"Leurent, G.: Construction of Differential Characteristics in ARX Designs Application to Skein. In: Canetti, R., Garay, J.A. (eds.) Advances in Cryptology - CRYPTO 2013. LNCS, vol. 8042, pp. 241\u2013258. Springer, Berlin, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40041-4_14","DOI":"10.1007\/978-3-642-40041-4_14"},{"key":"773_CR12","doi-asserted-by":"crossref","unstructured":"Berson, T.A.: Differential cryptanalysis mod 2\u02c632 with applications to MD5. In: EUROCRYPT 1992. LNCS, vol. 658, pp. 71\u201380. Springer, Berlin, Heidelberg (1992). https:\/\/doi.org\/10.1007\/3-540-47555-9_6","DOI":"10.1007\/3-540-47555-9_6"},{"key":"773_CR13","unstructured":"Daum, M.: Cryptanalysis of Hash Functions of the MD4-Family. PhD thesis, Ruhr-Universit\u00e4t Bochum (2005)"},{"key":"773_CR14","unstructured":"Lipmaa, H., Wall\u00e9n, J., Dumas, P.: On the Additive Differential Probability of Exclusive-Or. In: Roy, B.K., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 317\u2013331. Springer, Berlin, Heidelberg (2004). https:\/\/doi.org\/10.1007\/ 978-3-540-25937-4_20"},{"key":"773_CR15","doi-asserted-by":"crossref","unstructured":"Mouha, N., Velichkov, V., De Canni\u2018ere, C., Preneel, B.: The differential analysis of S-functions. In: Biryukov, A., Gong, G., Stinson, D.R. (eds.) SAC 2010. LNCS, vol. 6544, pp. 36\u201356. Springer, Berlin, Heidelberg (2011). https:\/\/doi.org\/ 10.1007\/978-3-642-19574-7_3","DOI":"10.1007\/978-3-642-19574-7_3"},{"key":"773_CR16","doi-asserted-by":"publisher","unstructured":"Mouha, N., Kolomeec, N., Akhtiamov, D., Sutormin, I., Panferov, M., Titova, K., Bonich, T., Ishchukova, E., Tokareva, N., Zhantulikov, B.: Maximums of the Additive Differential Probability of Exclusive-Or. IACR Transactions on Symmetric Cryptology 2021, 292\u2013313 (2021) https:\/\/doi.org\/10.46586\/tosc.v2021.i2.292-313","DOI":"10.46586\/tosc.v2021.i2.292-313"},{"key":"773_CR17","doi-asserted-by":"crossref","unstructured":"Velichkov, V., Mouha, N., De Canni\u2018ere, C., Preneel, B.: The additive differential probability of ARX. In: FSE 2011. LNCS, vol. 6733, pp. 342\u2013358. Springer, Berlin, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-21702-9_20","DOI":"10.1007\/978-3-642-21702-9_20"},{"key":"773_CR18","doi-asserted-by":"crossref","unstructured":"Hong, S., Hong, D., Ko, Y., Chang, D., Lee, W., Lee, S.: Differential cryptanalysis of TEA and XTEA. In: ICISC 2003. LNCS, vol. 2971, pp. 402\u2013417. Springer, Berlin, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-24691-6_30","DOI":"10.1007\/978-3-540-24691-6_30"},{"key":"773_CR19","unstructured":"Koo, B., Roh, D., Kim, H., Jung, Y., Lee, D., Kwon, D.: CHAM: A Family of Lightweight Block Ciphers for Resource-Constrained Devices. In: ICISC 2017. LNCS, vol. 10779, pp. 3\u201325. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/ 978-3-319-78556-1_1"},{"key":"773_CR20","doi-asserted-by":"crossref","unstructured":"Roh, D., Koo, B., Jung, Y., Jeong, I., Lee, D., Kwon, D., Kim, W.: Revised Version of Block Cipher CHAM. In: ICISC 2019. LNCS, vol. 11975, pp. 1\u201319. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-40921-0_1","DOI":"10.1007\/978-3-030-40921-0_1"},{"key":"773_CR21","unstructured":"Gueron, S., Jha, A., Nandi, M.: COMET: COunter Mode Encryption with authentication Tag. Submission to the NIST Lightweight Cryptography Project (Round 2) (2019)"},{"key":"773_CR22","doi-asserted-by":"crossref","unstructured":"Beierle, C., Biryukov, A., Santos, L., Gro\u00dfsch\u00e4dl, J., Perrin, L., Udovenko, A., Velichkov, V., Wang, Q.: Alzette: A 64-bit ARX-box - (feat. CRAX and TRAX). In: CRYPTO 2020. LNCS, vol. 12172, pp. 419\u2013448. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-56877-1_15","DOI":"10.1007\/978-3-030-56877-1_15"},{"key":"773_CR23","doi-asserted-by":"publisher","unstructured":"Beierle, C., Biryukov, A., Santos, L., Gro\u00dfsch\u00e4dl, J., Perrin, L., Udovenko, A., Velichkov, V., Wang, Q.: Lightweight AEAD and Hashing using the Sparkle Permutation Family. IACR Trans. Symmetric Cryptol. 2020(S1), 208\u2013261 (2020) https:\/\/doi.org\/10.13154\/tosc.v2020.iS1.208-261","DOI":"10.13154\/tosc.v2020.iS1.208-261"},{"key":"773_CR24","unstructured":"Knudsen, L.: DEAL-A 128-bit block cipher. Technical report, Department of Informatics, University of Bergen, Bergen, Norway (1998)"},{"key":"773_CR25","doi-asserted-by":"crossref","unstructured":"Biham, E., Biryukov, A., Shamir, A.: Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials. In: Stern, J. (ed.) Advances in Cryptology - EUROCRYPT \u201999. LNCS, vol. 1592, pp. 12\u201323. Springer, Berlin, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48910-X_2","DOI":"10.1007\/3-540-48910-X_2"},{"key":"773_CR26","doi-asserted-by":"crossref","unstructured":"Kim, J., Hong, S., Sung, J., Lee, S., Lim, J., Sung, S.: Impossible Differential Cryptanalysis for Block Cipher Structures. In: Johansson, T., Maitra, S. (eds.) Progress in Cryptology - INDOCRYPT 2003. LNCS, vol. 2904, pp. 82\u201396. Springer, Berlin, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-24582-7_6","DOI":"10.1007\/978-3-540-24582-7_6"},{"key":"773_CR27","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/j.ins.2013.08.051","volume":"263","author":"Y Luo","year":"2014","unstructured":"Luo, Y., Lai, X., Wu, Z., Gong, G.: A unified method for finding impossible differentials of block cipher structures. Inf. Sci. 263, 211\u2013220 (2014). https:\/\/doi.org\/10.1016\/j.ins.2013.08.051","journal-title":"Inf. Sci."},{"key":"773_CR28","doi-asserted-by":"crossref","unstructured":"Chen, J., Wang, M., Preneel, B.: Impossible Differential Cryptanalysis of the Lightweight Block Ciphers TEA, XTEA and HIGHT. In: Mitrokotsa, A., Vaudenay, S. (eds.) Progress in Cryptology - AFRICACRYPT 2012. LNCS, vol. 7374, pp. 117\u2013137. Springer, Berlin, Heidelberg (2012). https:\/\/doi.org\/10.1007\/ 978-3-642-31410-0_8","DOI":"10.1007\/978-3-642-31410-0_8"},{"issue":"2","key":"773_CR29","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/CC.2018.8300272","volume":"15","author":"K Zhang","year":"2018","unstructured":"Zhang, K., Guan, J., Hu, B.: Automatic search of impossible differentials and zerocorrelation linear hulls for ARX ciphers. China Communications 15(2), 54\u201366 (2018). https:\/\/doi.org\/10.1109\/CC.2018.8300272","journal-title":"China Communications"},{"key":"773_CR30","doi-asserted-by":"publisher","first-page":"1797","DOI":"10.1007\/s10623-022-01074-8","volume":"90","author":"SA Azimi","year":"2022","unstructured":"Azimi, S.A., Ranea, A., Salmasizadeh, M., Mohajeri, J., Aref, M.R., Rijmen, V.: A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis. Des. Codes Cryptogr. 90, 1797\u20131855 (2022). https:\/\/doi.org\/10.1007\/s10623-022-01074-8","journal-title":"Des. Codes Cryptogr."},{"key":"773_CR31","doi-asserted-by":"publisher","unstructured":"Gorodilova, A.A., Tokareva, N.N., Agievich, S.V., Beterov, I.I., Beyne, T., Budaghyan, L., Carlet, C., Dhooghe, S., Idrisova, V.A., Kolomeec, N.A., Kutsenko, A.V., Malygina, E.S., Mouha, N., Pudovkina, M.A., Sica, F., Udovenko, A.N.: An overview of the eight international olympiad in cryptography \u201cNonStop University Crypto\u201d. Siberian Electronic Mathematical Reports. 19(1), 9\u201337 (2022) https:\/\/doi.org\/10.33048\/semi.2022.19.023","DOI":"10.33048\/semi.2022.19.023"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-025-00773-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12095-025-00773-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-025-00773-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,20]],"date-time":"2025-03-20T13:40:14Z","timestamp":1742478014000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12095-025-00773-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,15]]},"references-count":31,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,3]]}},"alternative-id":["773"],"URL":"https:\/\/doi.org\/10.1007\/s12095-025-00773-y","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"value":"1936-2447","type":"print"},{"value":"1936-2455","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1,15]]},"assertion":[{"value":"30 March 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 January 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 January 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}