{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T10:20:41Z","timestamp":1755598841018,"version":"3.38.0"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T00:00:00Z","timestamp":1740441600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T00:00:00Z","timestamp":1740441600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-024-03620-8","type":"journal-article","created":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T16:34:43Z","timestamp":1740501283000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Partial Sum Attack on Round-Reduced AES Utilizing Parallel Computation Approaches"],"prefix":"10.1007","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2593-6679","authenticated-orcid":false,"given":"Debranjan","family":"Pal","sequence":"first","affiliation":[]},{"given":"Ankit","family":"Gupta","sequence":"additional","affiliation":[]},{"given":"Abhijit","family":"Das","sequence":"additional","affiliation":[]},{"given":"Dipanwita Roy","family":"Chowdhury","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,25]]},"reference":[{"key":"3620_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-04722-4","author":"J Daemen","year":"2002","unstructured":"Daemen J, Rijmen V. The design of Rijndael: AES\u2014the advanced encryption standard. Inf Secur Cryptogr. 2002. https:\/\/doi.org\/10.1007\/978-3-662-04722-4.","journal-title":"Inf Secur Cryptogr"},{"key":"3620_CR2","doi-asserted-by":"crossref","unstructured":"Banik S, Bogdanov A, Isobe T, Shibutani K, Hiwatari H, Akishita T, Regazzoni F. Midori: a block cipher for low energy. In: Iwata T, Cheon JH, editors. Advances in cryptology\u2014ASIACRYPT 2015. Berlin: Springer; 2015. p. 411\u201336.","DOI":"10.1007\/978-3-662-48800-3_17"},{"key":"3620_CR3","doi-asserted-by":"publisher","unstructured":"Beierle C, Jean J, K\u00f6lbl S, Leander G, Moradi A, Peyrin T, Sasaki Y, Sasdrich P, Sim SM. The SKINNY family of block ciphers and its low-latency variant MANTIS. In: Robshaw M, Katz J, editors. Advances in cryptology\u2014CRYPTO 2016\u201436th annual international cryptology conference, Santa Barbara, CA, USA, August 14\u201318, 2016, Proceedings, Part II. Lecture notes in computer science, vol. 9815. 2016. p. 123\u201353. https:\/\/doi.org\/10.1007\/978-3-662-53008-5_5","DOI":"10.1007\/978-3-662-53008-5_5"},{"key":"3620_CR4","doi-asserted-by":"crossref","unstructured":"Bogdanov A, Knudsen LR, Leander G, Paar C, Poschmann A, Robshaw MJB, Seurin Y, Vikkelsoe C. Present: an ultra-lightweight block cipher. In: Paillier P, Verbauwhede I, editors. Cryptographic hardware and embedded systems\u2014CHES 2007. Berlin: Springer; 2007. p. 450\u201366.","DOI":"10.1007\/978-3-540-74735-2_31"},{"key":"3620_CR5","unstructured":"Krawczyk H, Bellare M, Canetti R. RFC2104: HMAC: keyed-hashing for message authentication"},{"key":"3620_CR6","doi-asserted-by":"publisher","unstructured":"Rogaway P. Authenticated-encryption with associated-data. In: Proceedings of the 9th ACM conference on computer and communications security. CCS \u201902. New York: Association for Computing Machinery; 2002. p. 98\u2013107. https:\/\/doi.org\/10.1145\/586110.586125","DOI":"10.1145\/586110.586125"},{"issue":"Part","key":"3620_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.108426","volume":"104","author":"S Namasudra","year":"2022","unstructured":"Namasudra S. A secure cryptosystem using DNA cryptography and DNA steganography for the cloud-based iot infrastructure. Comput Electr Eng. 2022;104(Part): 108426.","journal-title":"Comput Electr Eng"},{"key":"3620_CR8","doi-asserted-by":"publisher","DOI":"10.37256\/ccds.4220233051","author":"T Taj","year":"2023","unstructured":"Taj T, Sarkar M. A survey on embedding iris biometric watermarking for user authentication. Cloud Comput Data Sci. 2023. https:\/\/doi.org\/10.37256\/ccds.4220233051.","journal-title":"Cloud Comput Data Sci"},{"key":"3620_CR9","unstructured":"Biham E, Keller N. Cryptanalysis of reduced variants of rijndael. In: 3rd AES conference 230 (2000)"},{"key":"3620_CR10","doi-asserted-by":"publisher","unstructured":"Daemen J, Knudsen LR, Rijmen V. The block cipher square. In: Biham E, editor. Fast software encryption, 4th International Workshop, FSE \u201997, Haifa, Israel, January 20\u201322, 1997, Proceedings. Lecture notes in computer science, vol. 1267; 1997. p. 149\u201365. https:\/\/doi.org\/10.1007\/BFb0052343.","DOI":"10.1007\/BFb0052343"},{"key":"3620_CR11","doi-asserted-by":"publisher","unstructured":"Biham E, Biryukov A, Shamir A. Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. In: Advances in cryptology\u2014EUROCRYPT \u201999, international conference on the theory and application of cryptographic techniques, Prague, Czech Republic, May 2\u20136, 1999, Proceeding; 1999. p. 12\u201323. https:\/\/doi.org\/10.1007\/3-540-48910-X_2.","DOI":"10.1007\/3-540-48910-X_2"},{"issue":"1","key":"3620_CR12","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.ipl.2004.02.018","volume":"91","author":"RC Phan","year":"2004","unstructured":"Phan RC. Impossible differential cryptanalysis of 7-round advanced encryption standard (AES). Inf Process Lett. 2004;91(1):33\u20138.","journal-title":"Inf Process Lett"},{"key":"3620_CR13","doi-asserted-by":"publisher","unstructured":"Mala H, Dakhilalian M, Rijmen V, Modarres-Hashemi M. Improved impossible differential cryptanalysis of 7-round AES-128. In: Progress in Cryptology\u2014INDOCRYPT 2010\u201411th international conference on cryptology in India, Hyderabad, India, December 12\u201315, 2010. Proceedings; 2010. p. 282\u201391. https:\/\/doi.org\/10.1007\/978-3-642-17401-8_20.","DOI":"10.1007\/978-3-642-17401-8_20"},{"key":"3620_CR14","doi-asserted-by":"publisher","unstructured":"Zhang W, Wu W, Feng D. New results on impossible differential cryptanalysis of reduced AES. In: Information security and cryptology\u2014ICISC 2007, 10th international conference, Seoul, Korea, November 29\u201330, 2007, Proceedings, 2007; p. 239\u201350. https:\/\/doi.org\/10.1007\/978-3-540-76788-6_19.","DOI":"10.1007\/978-3-540-76788-6_19"},{"key":"3620_CR15","doi-asserted-by":"publisher","unstructured":"Cheon JH, Kim M, Kim K, Lee J, Kang S. Improved impossible differential cryptanalysis of rijndael and crypton. In: Information security and cryptology\u2014ICISC 2001, 4th international conference Seoul, Korea, December 6-7, 2001, Proceedings; 2001. p. 39\u201349. https:\/\/doi.org\/10.1007\/3-540-45861-1_4.","DOI":"10.1007\/3-540-45861-1_4"},{"key":"3620_CR16","doi-asserted-by":"publisher","unstructured":"Biryukov A. The boomerang attack on 5 and 6-round reduced AES. In: Dobbertin H, Rijmen V, Sowa A, editors. Advanced encryption standard\u2014AES, 4th international conference, AES 2004, Bonn, Germany, May 10-12, 2004, revised selected and invited papers. Lecture notes in computer science, vol. 3373. 2004; p. 11\u201315. https:\/\/doi.org\/10.1007\/11506447_2.","DOI":"10.1007\/11506447_2"},{"key":"3620_CR17","doi-asserted-by":"publisher","unstructured":"Dunkelman O, Keller N, Ronen E, Shamir A. The retracing boomerang attack. In: Canteaut A, Ishai Y, editors. Advances in cryptology\u2014EUROCRYPT 2020\u201439th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, May 10\u201314, 2020, Proceedings, Part I. Lecture notes in computer science, vol. 12105; 2020. p. 280\u2013309. https:\/\/doi.org\/10.1007\/978-3-030-45721-1_11.","DOI":"10.1007\/978-3-030-45721-1_11"},{"issue":"3","key":"3620_CR18","doi-asserted-by":"publisher","first-page":"137","DOI":"10.46586\/tosc.v2021.i3.137-169","volume":"2021","author":"M Rahman","year":"2021","unstructured":"Rahman M, Saha D, Paul G. Boomeyong: embedding yoyo within boomerang and its applications to key recovery attacks on AES and pholkos. IACR Trans Symmetric Cryptol. 2021;2021(3):137\u201369.","journal-title":"IACR Trans Symmetric Cryptol"},{"key":"3620_CR19","unstructured":"Derbez P. Meet-in-the-middle attacks on AES. (attaques par rencontre par le milieu sur l\u2019aes). PhD thesis, \u00c9cole Normale Sup\u00e9rieure, Paris, France (2013). https:\/\/tel.archives-ouvertes.fr\/tel-00918146."},{"issue":"2","key":"3620_CR20","doi-asserted-by":"publisher","first-page":"133","DOI":"10.46586\/tosc.v2018.i2.133-160","volume":"2018","author":"L Grassi","year":"2018","unstructured":"Grassi L. Mixture differential cryptanalysis: a new approach to distinguishers and attacks on round-reduced AES. IACR Trans Symmetric Cryptol. 2018;2018(2):133\u201360.","journal-title":"IACR Trans Symmetric Cryptol"},{"key":"3620_CR21","doi-asserted-by":"publisher","unstructured":"Bar-On A, Dunkelman O, Keller N, Ronen E, Shamir A. Improved key recovery attacks on reduced-round AES with practical data and memory complexities. In: Advances in cryptology\u2014CRYPTO 2018\u201438th annual international cryptology conference, Santa Barbara, CA, USA, August 19\u201323, 2018, Proceedings, Part II; 2018. p. 185\u2013212. https:\/\/doi.org\/10.1007\/978-3-319-96881-0_7.","DOI":"10.1007\/978-3-319-96881-0_7"},{"key":"3620_CR22","doi-asserted-by":"publisher","unstructured":"Biham E, Biryukov A, Dunkelman O, Richardson E, Shamir A. Initial observations on skipjack: cryptanalysis of skipjack-3xor. In: Tavares SE, Meijer H, editors. Selected areas in cryptography \u201998, SAC\u201998, Kingston, Ontario, Canada, August 17\u201318, 1998, Proceedings. Lecture notes in computer science, vol. 1556; 1998. p. 362\u2013376. https:\/\/doi.org\/10.1007\/3-540-48892-8_27.","DOI":"10.1007\/3-540-48892-8_27"},{"key":"3620_CR23","doi-asserted-by":"publisher","unstructured":"Grassi L, Schofnegger M. Mixture integral attacks on reduced-round AES with a known\/secret s-box. In: Bhargavan K, Oswald E, Prabhakaran M, editors. Progress in cryptology\u2014INDOCRYPT 2020\u201421st international conference on cryptology in India, Bangalore, India, December 13\u201316, 2020, Proceedings. Lecture notes in computer science, vol. 12578; 2020. p. 312\u201331. https:\/\/doi.org\/10.1007\/978-3-030-65277-7_14.","DOI":"10.1007\/978-3-030-65277-7_14"},{"key":"3620_CR24","doi-asserted-by":"publisher","unstructured":"Ferguson N, Kelsey J, Lucks S, Schneier B, Stay M, Wagner DA, Whiting D. Improved cryptanalysis of rijndael. In: Fast Software encryption, 7th international workshop, FSE 2000, New York, NY, USA, April 10\u201312, 2000, Proceedings; 2000. p. 213\u201330. https:\/\/doi.org\/10.1007\/3-540-44706-7_15.","DOI":"10.1007\/3-540-44706-7_15"},{"key":"3620_CR25","doi-asserted-by":"crossref","unstructured":"Tunstall M. Improved \u201cpartial sums\u201d-based square attack on AES. In: Samarati P, Lou W, Zhou J, editors. SECRYPT 2012\u2014Proceedings of the international conference on security and cryptography, Rome, Italy, 24\u201327 July, 2012, SECRYPT Is Part of ICETE\u2014the international joint conference on e-business and telecommunications; 2012. p. 25\u201334.","DOI":"10.5220\/0003990300250034"},{"key":"3620_CR26","doi-asserted-by":"publisher","unstructured":"Ald\u00e0 F, Aragona R, Nicolodi L, Sala M. Implementation and improvement of the partial sum attack on 6-Round AES. In: Baldi M, Tomasin S, editors. Physical and data-link security techniques for future communication systems. Lecture Notes in Electrical Engineering, vol 358. Springer, Cham; 2016. https:\/\/doi.org\/10.1007\/978-3-319-23609-4_12.","DOI":"10.1007\/978-3-319-23609-4_12"},{"key":"3620_CR27","doi-asserted-by":"publisher","unstructured":"Tiessen T, Knudsen LR, K\u00f6lbl S, Lauridsen MM. Security of the AES with a secret s-box. In: Leander G, editors. Fast software encryption\u201422nd international workshop, FSE 2015, Istanbul, Turkey, March 8\u201311, 2015, revised selected papers. Lecture notes in computer science, vol. 9054; 2015. pp. 175\u2013189. https:\/\/doi.org\/10.1007\/978-3-662-48116-5_9","DOI":"10.1007\/978-3-662-48116-5_9"},{"key":"3620_CR28","doi-asserted-by":"publisher","unstructured":"R\u00f8njom S, Bardeh NG, Helleseth T. Yoyo tricks with AES. In: Takagi T, Peyrin T, editors. Advances in cryptology\u2014ASIACRYPT 2017\u201423rd international conference on the theory and applications of cryptology and information security, Hong Kong, China, December 3\u20137, 2017, Proceedings, part I. Lecture notes in computer science, vol. 10624; 2017. p. 217\u201343. https:\/\/doi.org\/10.1007\/978-3-319-70694-8_8.","DOI":"10.1007\/978-3-319-70694-8_8"},{"key":"3620_CR29","doi-asserted-by":"crossref","unstructured":"Bariant A, Leurent G. Truncated boomerang attacks and application to aes-based ciphers. IACR Cryptol. ePrint Arch., 2022;701.","DOI":"10.1007\/978-3-031-30634-1_1"},{"key":"3620_CR30","unstructured":"Gilbert H, Minier M. A collision attack on 7 rounds of rijndael. In: The third advanced encryption standard candidate conference, April 13\u201314, New York, USA; 2000. p. 230\u201341."},{"issue":"2","key":"3620_CR31","doi-asserted-by":"publisher","first-page":"43","DOI":"10.46586\/tosc.v2022.i2.43-62","volume":"2022","author":"NG Bardeh","year":"2022","unstructured":"Bardeh NG, Rijmen V. New key-recovery attack on reduced-round AES. IACR Trans Symmetric Cryptol. 2022;2022(2):43\u201362.","journal-title":"IACR Trans Symmetric Cryptol"},{"key":"3620_CR32","doi-asserted-by":"publisher","unstructured":"Demirci H, Sel\u00e7uk AA. A meet-in-the-middle attack on 8-round AES. In: Nyberg K, editors. Fast software encryption, 15th international workshop, FSE 2008, Lausanne, Switzerland, February 10\u201313, 2008, revised selected papers. Lecture notes in computer science, vol. 5086; 2008. p. 116\u201326. https:\/\/doi.org\/10.1007\/978-3-540-71039-4_7.","DOI":"10.1007\/978-3-540-71039-4_7"},{"key":"3620_CR33","doi-asserted-by":"publisher","unstructured":"Pal D, Agrawal D, Das A, Chowdhury DR. An efficient parallel implementation of impossible-differential cryptanalysis for five-round AES-128. In: Security, privacy, and applied cryptography engineering\u20149th international conference, SPACE 2019, Gandhinagar, India, December 3\u20137, 2019, Proceedings; 2019. p. 106\u201322. https:\/\/doi.org\/10.1007\/978-3-030-35869-3_9.","DOI":"10.1007\/978-3-030-35869-3_9"},{"key":"3620_CR34","doi-asserted-by":"publisher","unstructured":"Kakarla S, Mandava S, Saha D, Roy Chowdhury D. On the practical implementation of impossible differential cryptanalysis on reduced-round AES. In: Applications and techniques in information security\u20148th international conference, ATIS 2017, Auckland, New Zealand, July 6\u20137, 2017, Proceedings, 2017; p. 58\u201372. https:\/\/doi.org\/10.1007\/978-981-10-5421-1_6.","DOI":"10.1007\/978-981-10-5421-1_6"},{"key":"3620_CR35","doi-asserted-by":"publisher","unstructured":"Dunkelman O, Ghosh S, Keller N, Leurent G, Marmor A, Mollimard V. Partial sums meet FFT: improved attack on 6-round AES. In: Joye M, Leander G, editors. Advances in cryptology\u2014EUROCRYPT 2024\u201443rd annual international conference on the theory and applications of cryptographic techniques, Zurich, Switzerland, May 26\u201330, 2024. Lecture notes in computer science, vol. 14651; 2024. p. 128\u201357. https:\/\/doi.org\/10.1007\/978-3-031-58716-0_5.","DOI":"10.1007\/978-3-031-58716-0_5"},{"key":"3620_CR36","doi-asserted-by":"publisher","unstructured":"Daemen J, Knudsen LR, Rijmen V. The block cipher square. In: Biham E, editor. Fast software encryption, 4th international workshop, FSE \u201997, Haifa, Israel, January 20\u201322, 1997, Proceedings. Lecture notes in computer science, vol. 1267; 1997. p. 149\u2013165. https:\/\/doi.org\/10.1007\/BFb0052343.","DOI":"10.1007\/BFb0052343"},{"key":"3620_CR37","unstructured":"Knudsen L. Deal\u2014a 128-bit block cipher. In: NIST AES Proposal (1998)."},{"key":"3620_CR38","doi-asserted-by":"crossref","unstructured":"Boura C, Naya-Plasencia M, Suder V. Scrutinizing and improving impossible differential attacks: applications to clefia, camellia, lblock and simon. In: Sarkar P, Iwata T, editors. Advances in cryptology\u2014ASIACRYPT 2014. Berlin: Springer; 2014. p. 179\u201399.","DOI":"10.1007\/978-3-662-45611-8_10"},{"issue":"2","key":"3620_CR39","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1049\/iet-ifs:20070078","volume":"2","author":"B Bahrak","year":"2008","unstructured":"Bahrak B, Aref MR. Impossible differential attack on seven-round AES-128. IET Inf Secur. 2008;2(2):28\u201332.","journal-title":"IET Inf Secur"},{"key":"3620_CR40","doi-asserted-by":"publisher","unstructured":"Wagner DA. The boomerang attack. In: Knudsen LR, editor. Fast software encryption, 6th international workshop, FSE \u201999, Rome, Italy, March 24\u201326, 1999, Proceedings. Lecture notes in computer science, vol. 1636; 1999. p. 156\u2013170. https:\/\/doi.org\/10.1007\/3-540-48519-8_12.","DOI":"10.1007\/3-540-48519-8_12"},{"issue":"6","key":"3620_CR41","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/C-M.1977.217750","volume":"10","author":"W Diffie","year":"1977","unstructured":"Diffie W, Hellman ME. Special feature exhaustive cryptanalysis of the NBS data encryption standard. Computer. 1977;10(6):74\u201384.","journal-title":"Computer"},{"key":"3620_CR42","doi-asserted-by":"publisher","unstructured":"Knudsen LR, Wagner DA. Integral cryptanalysis. In: Daemen J, Rijmen V, editors. Fast software encryption, 9th international workshop, FSE 2002, Leuven, Belgium, February 4\u20136, 2002, Revised papers. Lecture notes in computer science, vol. 2365; 2002. p. 112\u201327. https:\/\/doi.org\/10.1007\/3-540-45661-9_9.","DOI":"10.1007\/3-540-45661-9_9"},{"key":"3620_CR43","unstructured":"Daemen J, Rijmen V. Rijndael for AES. In: The third advanced encryption standard candidate conference, April 13\u201314, New York, New York; 2000. p. 343\u201348."}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-024-03620-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-024-03620-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-024-03620-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T16:34:49Z","timestamp":1740501289000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-024-03620-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,25]]},"references-count":43,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025,3]]}},"alternative-id":["3620"],"URL":"https:\/\/doi.org\/10.1007\/s42979-024-03620-8","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,2,25]]},"assertion":[{"value":"12 February 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 December 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 February 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"On behalf of all authors, the corresponding author states that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Research involving human and\/or animals"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}],"article-number":"229"}}