{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T04:18:45Z","timestamp":1745381925172,"version":"3.40.4"},"reference-count":13,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T00:00:00Z","timestamp":1742860800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T00:00:00Z","timestamp":1742860800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cryptogr Eng"],"published-print":{"date-parts":[[2025,4]]},"DOI":"10.1007\/s13389-025-00374-8","type":"journal-article","created":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T18:26:20Z","timestamp":1743099980000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Optimization of the algorithm to compute the guaranteed number of activations in $$\\textsf{XS}$$-circuits and its application to the analysis of block ciphers"],"prefix":"10.1007","volume":"15","author":[{"given":"Denis","family":"Parfenov","sequence":"first","affiliation":[]},{"given":"Aleksandr","family":"Bakharev","sequence":"additional","affiliation":[]},{"given":"Aleksandr","family":"Kutsenko","sequence":"additional","affiliation":[]},{"given":"Aleksandr","family":"Belov","sequence":"additional","affiliation":[]},{"given":"Natalia","family":"Atutova","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,25]]},"reference":[{"key":"374_CR1","doi-asserted-by":"publisher","first-page":"7","DOI":"10.4213\/mvk281","volume":"10","author":"SV Agievich","year":"2019","unstructured":"Agievich, S.V.: XS-circuits in block ciphers. Mat. Vopr. Kriptogr. 10, 7\u201330 (2019)","journal-title":"Mat. Vopr. Kriptogr."},{"doi-asserted-by":"crossref","unstructured":"Berger, T.P., Minier, M., Thomas, G.: Extended generalized Feistel networks using matrix representation. In Lange, T., Lauter, K. & Lisonek, P. (eds.) SAC 2013, vol. 8282 of LNCS, 289\u2013305 (Springer, Heidelberg), (2014)","key":"374_CR2","DOI":"10.1007\/978-3-662-43414-7_15"},{"doi-asserted-by":"crossref","unstructured":"Blondeau, C., Bogdanov, A., Wang, M.: On the (in)equivalence of impossible differential and zero-correlation distinguishers for Feistel- and Skipjack-type ciphers. In Boureanu, I., Owesarski, P. & Vaudenay, S. (eds.) ACNS 14, vol. 8479 of LNCS, 271\u2013288 (Springer, Heidelberg), (2014)","key":"374_CR3","DOI":"10.1007\/978-3-319-07536-5_17"},{"doi-asserted-by":"crossref","unstructured":"Blondeau, C., Minier, M.: Analysis of impossible, integral and zero-correlation attacks on type-II generalized Feistel networks using the matrix method. In Leander, G. (ed.) FSE\u00a02015, vol. 9054 of LNCS, 92\u2013113 (Springer, Heidelberg), (2015)","key":"374_CR4","DOI":"10.1007\/978-3-662-48116-5_5"},{"key":"374_CR5","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E Biham","year":"1991","unstructured":"Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. Journal of Cryptology 4, 3\u201372 (1991)","journal-title":"Journal of Cryptology"},{"key":"374_CR6","doi-asserted-by":"publisher","first-page":"7","DOI":"10.4213\/mvk353","volume":"12","author":"SV Agievich","year":"2021","unstructured":"Agievich, S.V.: On the guaranteed number of activations in XS-circuits. Mat. Vopr. Kriptogr. 12, 7\u201320 (2021)","journal-title":"Mat. Vopr. Kriptogr."},{"doi-asserted-by":"crossref","unstructured":"Matsui, M.: Linear cryptanalysis method for DES cipher. In Helleseth, T. (ed.) EUROCRYPT\u201993, vol. 765 of LNCS, 386\u2013397 (Springer, Heidelberg), (1994)","key":"374_CR7","DOI":"10.1007\/3-540-48285-7_33"},{"key":"374_CR8","doi-asserted-by":"crossref","first-page":"35","DOI":"10.4213\/mvk128","volume":"5","author":"F Malyshev","year":"2014","unstructured":"Malyshev, F.: The duality of differential and linear methods in cryptography. Mat. Vopr. Kriptogr. 5, 35\u201347 (2014)","journal-title":"Mat. Vopr. Kriptogr."},{"doi-asserted-by":"crossref","unstructured":"Sun, S. et\u00a0al.: Automatic security evaluation and (related-key) differential characteristic search: Application to SIMON, PRESENT, LBlock, DES(L) and other bit-oriented block ciphers. In Sarkar, P. & Iwata, T. (eds.) ASIACRYPT\u00a02014, Part\u00a0I, vol. 8873 of LNCS, 158\u2013178 (Springer, Heidelberg), (2014)","key":"374_CR9","DOI":"10.1007\/978-3-662-45611-8_9"},{"key":"374_CR10","doi-asserted-by":"publisher","first-page":"972","DOI":"10.1287\/opre.11.6.972","volume":"11","author":"JDC Little","year":"1963","unstructured":"Little, J.D.C., Murty, K.G., Sweeney, D.W., Karel, C.: An algorithm for the traveling salesman problem. Operations Research 11, 972\u2013989 (1963)","journal-title":"Operations Research"},{"unstructured":"Python implementation of algorithm for calculating the guaranteed number of activations in a given cascade. https:\/\/github.com\/agievich\/xs","key":"374_CR11"},{"unstructured":"Stb 34.101.31-2011. information technology and security. data encryption and integrity algorithms. (2011). http:\/\/apmi.bsu.by\/assets\/files\/std\/belt-spec27.pdf","key":"374_CR12"},{"unstructured":"Su, B., Wu, W., Zhang, W.: Differential cryptanalysis of SMS4 block cipher. Cryptology ePrint Archive, Report 2010\/062 (2010). https:\/\/eprint.iacr.org\/2010\/062","key":"374_CR13"}],"container-title":["Journal of Cryptographic Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-025-00374-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13389-025-00374-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-025-00374-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T18:09:50Z","timestamp":1745345390000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13389-025-00374-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,25]]},"references-count":13,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,4]]}},"alternative-id":["374"],"URL":"https:\/\/doi.org\/10.1007\/s13389-025-00374-8","relation":{},"ISSN":["2190-8508","2190-8516"],"issn-type":[{"type":"print","value":"2190-8508"},{"type":"electronic","value":"2190-8516"}],"subject":[],"published":{"date-parts":[[2025,3,25]]},"assertion":[{"value":"31 December 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 March 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 March 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"4"}}