{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T18:23:26Z","timestamp":1740162206739,"version":"3.37.3"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2022,9,6]],"date-time":"2022-09-06T00:00:00Z","timestamp":1662422400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,9,6]],"date-time":"2022-09-06T00:00:00Z","timestamp":1662422400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"the National Cryptography Development Fund of China","award":["MMJJ20180204","MMJJ20170103"],"award-info":[{"award-number":["MMJJ20180204","MMJJ20170103"]}]},{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["No.61872383","No.61802430"],"award-info":[{"award-number":["No.61872383","No.61802430"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cryptogr Eng"],"published-print":{"date-parts":[[2023,6]]},"DOI":"10.1007\/s13389-022-00298-7","type":"journal-article","created":{"date-parts":[[2022,9,6]],"date-time":"2022-09-06T20:05:31Z","timestamp":1662494731000},"page":"223-234","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Construction of equivalent linear trails and multiple linear attack on reduced-round GIFT-64"],"prefix":"10.1007","volume":"13","author":[{"given":"Yaxin","family":"Cui","sequence":"first","affiliation":[]},{"given":"Hong","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Lin","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Huajin","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Wenfeng","family":"Qi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,6]]},"reference":[{"key":"298_CR1","doi-asserted-by":"crossref","unstructured":"Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y., Vikkelsoe, C.: PRESENT: an ultra-lightweight block cipher. In: Cryptographic hardware and embedded systems\u2014CHES 2007, LNCS, 4727, pp. 450\u2013466. Springer (2007)","DOI":"10.1007\/978-3-540-74735-2_31"},{"key":"298_CR2","doi-asserted-by":"crossref","unstructured":"Wu, W., Zhang, L.: LBlock: A Lightweight Block Cipher. In: Applied cryptography and network security\u20149th international conference, ACNS 2011, LNCS, 6715, pp. 327\u2013344. Springer (2011)","DOI":"10.1007\/978-3-642-21554-4_19"},{"key":"298_CR3","unstructured":"Beaulieu, R., Shors, D., Smith, J., et al.: The SIMON and SPECK families of lightweight block ciphers. IACR Cryptol. ePrint Arch, 404 (2013)"},{"key":"298_CR4","unstructured":"Zhang, W., Bao, Z., et al.: RECTANGLE: a bit-slice ultra-lightweight block cipher suitable for multiple platforms, IACR Cryptol. ePrint Arch, 84 (2014)"},{"key":"298_CR5","doi-asserted-by":"crossref","unstructured":"Beierle, C., Jean, J., K\u00f6lbl, S., et al.: The skinny family of block ciphers and its low-latency variant MANTIS. In: Advances in cryptology\u2014CRYPTO 2016\u201436th annual international cryptology conference, LNCS, 9815, pp. 123\u2013153. Springer (2016)","DOI":"10.1007\/978-3-662-53008-5_5"},{"key":"298_CR6","doi-asserted-by":"crossref","unstructured":"Banik, S., Pandey, S., Peyrin, T., Sasaki, Y., Sim, S., Todo, Y.: GIFT: a small present - towards reaching the limit of lightweight encryption. In: Cryptographic hardware and embedded systems\u2014CHES 2017, LNCS, 10529, pp. 321\u2013345. Springer (2017)","DOI":"10.1007\/978-3-319-66787-4_16"},{"key":"298_CR7","unstructured":"Banik, S., Chakraborti, A., Iwata, T., Minematsu, K., Nandi, M., et al.: \u201cGIFT-COFB\u201d, IACR Cryptol. ePrint Arch, 738 (2020)"},{"key":"298_CR8","unstructured":"The specilcation of SUNDAE-GIFT, Last accessed 29 March 2019, https:\/\/csrc.nist.gov\/CSRC\/media\/Projects\/lightweight-cryptography\/documents\/round-2\/spec-doc-rnd2\/SUNDAE-GIFT-spec-round2.pdf"},{"key":"298_CR9","unstructured":"The specilcation of HYENA, Last accessed 29 March 2019, https:\/\/csrc.nist.gov\/CSRC\/media\/Projects\/lightweight-cryptography\/documents\/round-2\/spec-doc-rnd2\/hyena-spec-round2.pdf"},{"issue":"1","key":"298_CR10","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E Biham","year":"1991","unstructured":"Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. J. Cryptol. 4(1), 3\u201371 (1991)","journal-title":"J. Cryptol."},{"key":"298_CR11","doi-asserted-by":"crossref","unstructured":"Matsui, M.: Linear cryptanalysis method for DES cipher. In: Advances in cryptology\u2014EUROCRYPT \u201993, LNCS, 765, pp. 386\u2013397. Springer (1993)","DOI":"10.1007\/3-540-48285-7_33"},{"key":"298_CR12","doi-asserted-by":"crossref","unstructured":"Kaliski, B.S., Robshaw, M.J.B.: Linear cryptanalysis using multiple approximations. In: Advances in cryptology\u2014CRYPTO \u201994, LNCS, 839, pp. 26\u201339. Springer (1994)","DOI":"10.1007\/3-540-48658-5_4"},{"key":"298_CR13","doi-asserted-by":"crossref","unstructured":"Biryukov, A., De Canni\u00e8re, C., Quisquater, M.: On multiple linear approximations. In: Advances in cryptology\u2014CRYPTO 2004, LNCS, 3152, pp. 1\u201322. Springer (2004)","DOI":"10.1007\/978-3-540-28628-8_1"},{"key":"298_CR14","doi-asserted-by":"crossref","unstructured":"Hermelin, M., Cho, J.Y., Nyberg, k.: Multidimensional Linear cryptanalysis of reduced round serpent. In: Information security and privacy, 13th Australasian conference, ACISP, LNCS, 5107, pp. 203\u2013215. Springer (2008)","DOI":"10.1007\/978-3-540-70500-0_15"},{"key":"298_CR15","doi-asserted-by":"crossref","unstructured":"Hermelin, M., Cho, J.Y., Nyberg, K.: Multidimensional extension of matsui\u2019s algorithm 2. In: Fast software encryption, 16th international workshop, FSE, LNCS, 5665, pp. 209\u2013227. Springer (2009)","DOI":"10.1007\/978-3-642-03317-9_13"},{"key":"298_CR16","doi-asserted-by":"crossref","unstructured":"Fl\u00f3rez-Guti\u00e9rrez, A., Naya-Plasencia, M.: Improving key-recovery in linear attacks: application to 28-round PRESENT. In: Advances in cryptology\u2014EUROCRYPT 2020, LNCS, 12105, pp. 221\u2013249. Springer (2020)","DOI":"10.1007\/978-3-030-45721-1_9"},{"key":"298_CR17","doi-asserted-by":"crossref","unstructured":"Mouha, N., Wang, Q., Gu, D., Preneel, B.: Differential and linear cryptanalysis using mixed-integer linear programming. In: Information security and cryptology\u20147th international conference, Inscrypt 2011, LNCS, 7537, pp. 57\u201376. Springer (2011)","DOI":"10.1007\/978-3-642-34704-7_5"},{"key":"298_CR18","doi-asserted-by":"crossref","unstructured":"Sun, S., Hu, L., Wang, P., Qiao, K., Ma, X., Song, L.: Automatic security evaluation and (Related-key) differential characteristic search: application to SIMON, PRESENT, LBlock, DES(L) and other bit-oriented block ciphers. In: Advances in Cryptology\u2014ASIACRYPT 2014, LNCS, 8873, pp. 158\u2013178. Springer (2014)","DOI":"10.1007\/978-3-662-45611-8_9"},{"key":"298_CR19","doi-asserted-by":"crossref","unstructured":"Fu, K., Wang, M., Guo, Y., Sun, S., Hu, L.: MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck. In: Fast software encryption\u201423rd international conference, FSE 2016, LNCS, 9783, pp. 268\u2013288. Springer (2016)","DOI":"10.1007\/978-3-662-52993-5_14"},{"issue":"4","key":"298_CR20","first-page":"438","volume":"2019","author":"C Zhou","year":"2019","unstructured":"Zhou, C., Zhang, W., Ding, T., Xiang, Z.: Improving the MILP-based security evaluation algorithm against differential\/linear cryptanalysis using a divide-and-conquer approach. IACR Trans. Symmetric Cryptol. 2019(4), 438\u2013469 (2019)","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"298_CR21","doi-asserted-by":"crossref","unstructured":"K\u00f6lbl, S., Leander,G., Tiessen, T.: Observations on the SIMON block cipher family. In: Advances in cryptology\u2014CRYPTO 2015, LNCS, 9215, pp. 161\u2013185. Springer (2015)","DOI":"10.1007\/978-3-662-47989-6_8"},{"key":"298_CR22","doi-asserted-by":"crossref","unstructured":"Liu, Y., Wang, Q., Rijmen, V.: Automatic search of linear trails in ARX with applications to SPECK and Chaskey. In: Applied cryptography and networks security\u2014ACNS 2016, LNCS, 9696, pp. 485\u2013499. Springer (2016)","DOI":"10.1007\/978-3-319-39555-5_26"},{"issue":"3","key":"298_CR23","doi-asserted-by":"publisher","first-page":"93","DOI":"10.46586\/tosc.v2018.i3.93-123","volume":"2018","author":"L Sun","year":"2018","unstructured":"Sun, L., Wang, W., Wang, M.: More accurate differential properties of LED64 and Midori64. IACR Trans. Symmetric Cryptol. 2018(3), 93\u2013123 (2018)","journal-title":"IACR Trans. Symmetric Cryptol."},{"issue":"1","key":"298_CR24","doi-asserted-by":"publisher","first-page":"269","DOI":"10.46586\/tosc.v2021.i1.269-315","volume":"2021","author":"L Sun","year":"2021","unstructured":"Sun, L., Wang, W., Wang, W.: Accelerating the Search of Differential and Linear Characteristics with the SAT Method. IACR Trans. Symmetric Cryptol. 2021(1), 269\u2013315 (2021)","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"298_CR25","doi-asserted-by":"publisher","DOI":"10.1049\/cje.2020.00.113","author":"Y Cui","year":"2020","unstructured":"Cui, Y., Xu, H., Qi, W.: MILP-based linear attacks on round-reduced GIFT. Chin. J. Electron. (2020). https:\/\/doi.org\/10.1049\/cje.2020.00.113","journal-title":"Chin. J. Electron."},{"key":"298_CR26","doi-asserted-by":"crossref","unstructured":"Sun, L., Wang, W., Wang, M.: Improved atacks on GIFT-64. In: Selected areas in cryptography\u201428th international conference, SAC 2021, LNCS, 3203, pp.246\u2013265 Springer (2021)","DOI":"10.1007\/978-3-030-99277-4_12"},{"key":"298_CR27","doi-asserted-by":"crossref","unstructured":"Zhu, B., Dong, X., Yu, H.: MILP-based differential attack on round-reduced GIFT. Topics in Cryptology \u2014CT-RSA 2019, LNCS, 11405, pp. 372\u2013390. Springer (2019)","DOI":"10.1007\/978-3-030-12612-4_19"},{"key":"298_CR28","doi-asserted-by":"crossref","unstructured":"Chen, H., Zong, R., Dong, X.: Improved differential attacks on GIFT-64. In: Information and communications security\u201421st international conference, LNCS, 11999, pp. 447\u2013462. Springer (2019)","DOI":"10.1007\/978-3-030-41579-2_26"},{"issue":"1\u20132","key":"298_CR29","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/s10623-016-0268-6","volume":"82","author":"C Blondeau","year":"2017","unstructured":"Blondeau, C., Nyberg, K.: Joint data and key distribution of simple, multiple, and multidimensional linear cryptanalysis test statistic and its impact to data complexity. Des. Codes Cryptogr. 82(1\u20132), 319\u2013349 (2017)","journal-title":"Des. Codes Cryptogr."}],"container-title":["Journal of Cryptographic Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-022-00298-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13389-022-00298-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-022-00298-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,23]],"date-time":"2023-05-23T04:21:16Z","timestamp":1684815676000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13389-022-00298-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,6]]},"references-count":29,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,6]]}},"alternative-id":["298"],"URL":"https:\/\/doi.org\/10.1007\/s13389-022-00298-7","relation":{},"ISSN":["2190-8508","2190-8516"],"issn-type":[{"type":"print","value":"2190-8508"},{"type":"electronic","value":"2190-8516"}],"subject":[],"published":{"date-parts":[[2022,9,6]]},"assertion":[{"value":"10 February 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 July 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 September 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}