{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:56:35Z","timestamp":1771700195199,"version":"3.50.1"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319162942","type":"print"},{"value":"9783319162959","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-16295-9_17","type":"book-chapter","created":{"date-parts":[[2015,3,29]],"date-time":"2015-03-29T07:06:51Z","timestamp":1427612811000},"page":"306-324","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Analysis of NORX: Investigating Differential and Rotational Properties"],"prefix":"10.1007","author":[{"given":"Jean-Philippe","family":"Aumasson","sequence":"first","affiliation":[]},{"given":"Philipp","family":"Jovanovic","sequence":"additional","affiliation":[]},{"given":"Samuel","family":"Neves","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,29]]},"reference":[{"key":"17_CR1","unstructured":"CAESAR \u2013 Competition for Authenticated Encryption: Security, Applicability, and Robustness (2014). http:\/\/competitions.cr.yp.to\/caesar.html"},{"key":"17_CR2","unstructured":"NODE \u2013 The NORX Differential Search Engine (2014). https:\/\/github.com\/norx\/NODE"},{"key":"17_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"470","DOI":"10.1007\/978-3-540-71039-4_30","volume-title":"Fast Software Encryption","author":"J-P Aumasson","year":"2008","unstructured":"Aumasson, J.-P., Fischer, S., Khazaei, S., Meier, W., Rechberger, C.: New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 470\u2013488. Springer, Heidelberg (2008)"},{"key":"17_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-319-11212-1_2","volume-title":"Computer Security - ESORICS 2014","author":"J-P Aumasson","year":"2014","unstructured":"Aumasson, J.-P., Jovanovic, P., Neves, S.: NORX: Parallel and Scalable AEAD. In: Kuty\u0142owski, M., Vaidya, J. (eds.) ESORICS 2014, Part II. LNCS, vol. 8713, pp. 19\u201336. Springer, Heidelberg (2014)"},{"key":"17_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/978-3-642-38980-1_8","volume-title":"Applied Cryptography and Network Security","author":"J-P Aumasson","year":"2013","unstructured":"Aumasson, J.-P., Neves, S., Wilcox-O\u2019Hearn, Z., Winnerlein, C.: BLAKE2: Simpler, Smaller, Fast as MD5. In: Jacobson, M., Locasto, M., Mohassel, P., Safavi-Naini, R. (eds.) ACNS 2013. LNCS, vol. 7954, pp. 119\u2013135. Springer, Heidelberg (2013)"},{"key":"17_CR6","unstructured":"Bernstein, D.J.: ChaCha, a Variant of Salsa20. In: Workshop Record of SASC 2008: The State of the Art of Stream Ciphers (2008). http:\/\/cr.yp.to\/chacha.html"},{"key":"17_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/978-3-540-68351-3_8","volume-title":"New Stream Cipher Designs","author":"DJ Bernstein","year":"2008","unstructured":"Bernstein, D.J.: The Salsa20 Family of Stream Ciphers. In: Robshaw, M., Billet, O. (eds.) New Stream Cipher Designs. LNCS, vol. 4986, pp. 84\u201397. Springer, Heidelberg (2008)"},{"key":"17_CR8","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Assche, G.V.: On Alignment in Keccak. In: ECRYPT II Hash Workshop, May 2011"},{"key":"17_CR9","unstructured":"Bertoni, G., Daemen, J., Peeters, M.,Assche, G.V.: Permutation-based Encryption, Authentication and Authenticated Encryption, presented at DIAC, Stockholm, Sweden, 05\u201306 July 2012"},{"key":"17_CR10","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Assche, G.V.: Cryptographic Sponge Functions, January 2011. http:\/\/sponge.noekeon.org\/CSF-0.1.pdf"},{"key":"17_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1007\/978-3-642-28496-0_19","volume-title":"Selected Areas in Cryptography","author":"G Bertoni","year":"2012","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Duplexing the Sponge: Single-pass Authenticated Encryption and Other Applications. In: Miri, A., Vaudenay, S. (eds.) SAC 2011. LNCS, vol. 7118, pp. 320\u2013337. Springer, Heidelberg (2012)"},{"key":"17_CR12","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Assche, G.V.: The Keccak Reference, January 2011. http:\/\/keccak.noekeon.org\/"},{"issue":"1","key":"17_CR13","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E Biham","year":"1991","unstructured":"Biham, E., Shamir, A.: Differential Cryptanalysis of DES-like Cryptosystems. J. Cryptol. 4(1), 3\u201372 (1991)","journal-title":"J. Cryptol."},{"key":"17_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1007\/978-3-642-00768-2_16","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"R Brummayer","year":"2009","unstructured":"Brummayer, R., Biere, A.: Boolector: An Efficient SMT Solver for Bit-vectors and Arrays. In: Kowalewski, S., Philippou, A. (eds.) TACAS 2009. LNCS, vol. 5505, pp. 174\u2013177. Springer, Heidelberg (2009)"},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Daemen, J., Peeters, M., Assche, G.V., Rijmen, V.: Nessie Proposal: the Block Cipher Noekeon. Nessie submission (2000). http:\/\/gro.noekeon.org\/","DOI":"10.1007\/10721064_22"},{"key":"17_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1007\/3-540-45325-3_20","volume-title":"Cryptography and Coding","author":"J Daemen","year":"2001","unstructured":"Daemen, J., Rijmen, V.: The Wide Trail Design Strategy. In: Honary, B. (ed.) Cryptography and Coding 2001. LNCS, vol. 2260, pp. 222\u2013238. Springer, Heidelberg (2001)"},{"key":"17_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1007\/978-3-642-34047-5_24","volume-title":"Fast Software Encryption","author":"J Daemen","year":"2012","unstructured":"Daemen, J., Van Assche, G.: Differential Propagation Analysis of Keccak. In: Canteaut, A. (ed.) FSE 2012. LNCS, vol. 7549, pp. 422\u2013441. Springer, Heidelberg (2012)"},{"key":"17_CR18","unstructured":"Ganesh, V., Govostes, R., Phang, K.Y., Soos, M., Schwartz, E.: STP \u2013 A Simple Theorem Prover (2006\u20132013). http:\/\/stp.github.io\/stp"},{"key":"17_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1007\/978-3-319-04852-9_21","volume-title":"Topics in Cryptology \u2013 CT-RSA 2014","author":"J Guo","year":"2014","unstructured":"Guo, J., Karpman, P., Nikoli\u0107, I., Wang, L., Wu, S.: Analysis of BLAKE2. In: Benaloh, J. (ed.) CT-RSA 2014. LNCS, vol. 8366, pp. 402\u2013423. Springer, Heidelberg (2014)"},{"key":"17_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/978-3-642-13858-4_19","volume-title":"Fast Software Encryption","author":"D Khovratovich","year":"2010","unstructured":"Khovratovich, D., Nikoli\u0107, I.: Rotational Cryptanalysis of ARX. In: Hong, S., Iwata, T. (eds.) FSE 2010. LNCS, vol. 6147, pp. 333\u2013346. Springer, Heidelberg (2010)"},{"key":"17_CR21","unstructured":"Knuth, D.E.: The Art of Computer Programming, Volume 4A: Combinatorial Algorithms, Part 1, vol. 4A. Addison-Wesley, Upper Saddle River (2011). http:\/\/www-cs-faculty.stanford.edu\/~uno\/taocp.html"},{"key":"17_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1007\/3-540-45473-X_28","volume-title":"Fast Software Encryption","author":"H Lipmaa","year":"2002","unstructured":"Lipmaa, H., Moriai, S.: Efficient Algorithms for Computing Differential Properties of Addition. In: Matsui, M. (ed.) FSE 2001. LNCS, vol. 2355, pp. 336\u2013350. Springer, Heidelberg (2002)"},{"key":"17_CR23","unstructured":"Mate Soos: CryptoMinisat (2009\u20132014). http:\/\/www.msoos.org\/cryptominisat2"},{"key":"17_CR24","unstructured":"Mouha, N., Preneel, B.: Towards Finding Optimal Differential Characteristics for ARX: Application to Salsa20. Cryptology ePrint Archive, Report 2013\/328 (2013)"},{"key":"17_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/978-3-642-37682-5_24","volume-title":"Information Security and Cryptology \u2013 ICISC 2012","author":"Z Shi","year":"2013","unstructured":"Shi, Z., Zhang, B., Feng, D., Wu, W.: Improved Key Recovery Attacks on Reduced-round Salsa20 and ChaCha. In: Kwon, T., Lee, M.-K., Kwon, D. (eds.) ICISC 2012. LNCS, vol. 7839, pp. 337\u2013351. Springer, Heidelberg (2013)"},{"key":"17_CR26","volume-title":"Computational Introduction to Number Theory and Algebra","author":"V Shoup","year":"2009","unstructured":"Shoup, V.: Computational Introduction to Number Theory and Algebra, 2nd edn. Cambridge University Press, Cambridge (2009). http:\/\/shoup.net\/ntb","edition":"2"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology - LATINCRYPT 2014"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-16295-9_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,15]],"date-time":"2023-02-15T06:45:06Z","timestamp":1676443506000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-16295-9_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319162942","9783319162959"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-16295-9_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"29 March 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}