{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T08:20:10Z","timestamp":1771489210870,"version":"3.50.1"},"reference-count":28,"publisher":"Institution of Engineering and Technology (IET)","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IET Inf. Secur."],"published-print":{"date-parts":[[2007,3,12]]},"DOI":"10.1049\/iet-ifs:20060099","type":"journal-article","created":{"date-parts":[[2007,4,2]],"date-time":"2007-04-02T23:24:59Z","timestamp":1175556299000},"page":"11-17","source":"Crossref","is-referenced-by-count":30,"title":["Plateau characteristics"],"prefix":"10.1049","volume":"1","author":[{"given":"J.","family":"Daemen","sequence":"first","affiliation":[{"name":"STMicroelectronics, Excelsiorlaan 44\u201346, B-1930 Zaventem, Belgium"}]},{"given":"V.","family":"Rijmen","sequence":"additional","affiliation":[{"name":"IAIK, Graz University of Technology, Inffeldgasse 16a, A-8010, Austria"}]}],"member":"265","reference":[{"key":"10.1049\/iet-ifs:20060099_r1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00630563"},{"key":"10.1049\/iet-ifs:20060099_r2","doi-asserted-by":"crossref","unstructured":"Ben-Aroya, I., and Biham, E.: \u2018Differential cryptanalysis of Lucifer\u2019, Stinson, D., Advances in Cryptology, Proc. Crypto 93, (Springer-Verlag 1994), p. 187\u2013199 LNCS,773","DOI":"10.1007\/3-540-48329-2_17"},{"key":"10.1049\/iet-ifs:20060099_r3","first-page":"172","author":"Canteaut","year":"1997","journal-title":"Workshop record of Selected Areas in Cryptography SAC'97"},{"key":"10.1049\/iet-ifs:20060099_r4","doi-asserted-by":"crossref","unstructured":"Aoki, K., \u2018Maximum non-averaged differential probability\u2019, Selected Areas in Cryptography SAC'98, (Springer-Verlag 1998), p. 118\u2013130 LNCS,1556","DOI":"10.1007\/3-540-48892-8_10"},{"key":"10.1049\/iet-ifs:20060099_r5","doi-asserted-by":"crossref","unstructured":"Daemen, J., and Rijmen, V.: \u2018The design of Rijndael \u2013 AES, the advanced encryption standard\u2019, (Springer-Verlag 2002)","DOI":"10.1007\/978-3-662-04722-4"},{"key":"10.1049\/iet-ifs:20060099_r6","doi-asserted-by":"crossref","unstructured":"Lai, X., Massey, J.L., and Murphy, S.: \u2018Markov ciphers and differential cryptanalysis\u2019, Davies, D.W., Advances in Cryptology, Proc. Eurocrypt'91, (Springer-Verlag 1991), p. 17\u201338 LNCS,547","DOI":"10.1007\/3-540-46416-6_2"},{"key":"10.1049\/iet-ifs:20060099_r7","unstructured":"\u2018Exact maximum expected differential and linear probability for 2-round advanced encryption standard (AES)\u2019, Cryptology ePrint archive, Report 2005\u2215321, 2005 http:\/\/eprint.iacr.org"},{"key":"10.1049\/iet-ifs:20060099_r8","doi-asserted-by":"crossref","unstructured":"Park, S., Sung, S.H., Chee, S., Yoon, E., and Lim, J.: \u2018On the security of Rijndael-like structures against differential and linear cryptanalysis\u2019, Zheng, Y., Asiacrypt 2002, LNCS,2501(Springer-Verlag 2002), p. 176\u2013191","DOI":"10.1007\/3-540-36178-2_11"},{"key":"10.1049\/iet-ifs:20060099_r9","doi-asserted-by":"crossref","unstructured":"Park, S., Sung, S.H., Lee, S., and Lim, J.: \u2018Improving the upper bound on the maximum differential and the maximum linear hull probability for SPN structures and AES\u2019, Johnsson, T., Fast Software Encryption'03, LNCS,2887(Springer-Verlag 2003), p. 247\u2013260","DOI":"10.1007\/978-3-540-39887-5_19"},{"key":"10.1049\/iet-ifs:20060099_r10","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1007\/BF00204800","volume":"8","author":"Nyberg","year":"1995","ISSN":"https:\/\/id.crossref.org\/issn\/0933-2790","issn-type":"print"},{"key":"10.1049\/iet-ifs:20060099_r11","doi-asserted-by":"crossref","unstructured":"Matsui, M.: \u2018New block encryption algorithm Misty\u2019, Biham, E., Fast Software Encryption'97, (Springer-Verlag 1997), p. 64\u201374 LNCS,1267","DOI":"10.1007\/BFb0052334"},{"key":"10.1049\/iet-ifs:20060099_r12","doi-asserted-by":"crossref","unstructured":"Knudsen, L.R., and Mathiassen, J.E.: \u2018On the role of key schedules in attacks on iterated ciphers\u2019, ESORICS 2004, (Springer-Verlag 2004), p. 322\u2013334 LNCS,3193","DOI":"10.1007\/978-3-540-30108-0_20"},{"key":"10.1049\/iet-ifs:20060099_r13","doi-asserted-by":"crossref","unstructured":"Knudsen, L.R.: \u2018Iterative characteristics of DES and s2-DES\u2019, Brickell, E.F., Advances in Cryptology, Proc. CRYPTO'92, (Springer-Verlag 1993), p. 497\u2013511 LNCS,746","DOI":"10.1007\/3-540-48071-4_35"},{"key":"10.1049\/iet-ifs:20060099_r14","doi-asserted-by":"crossref","unstructured":"Daemen, J., Govaerts, R., and Vandewalle, J.: \u2018Weak keys of IDEA\u2019, Stinson, D., Advances in Cryptology, Proc. Crypto'93, (Springer-Verlag 1994), p. 224\u2013231 LNCS,773","DOI":"10.1007\/3-540-48329-2_20"},{"key":"10.1049\/iet-ifs:20060099_r15","doi-asserted-by":"crossref","unstructured":"Dunkelman, O., and Keller, N.: \u2018A new criterion for nonlinearity of block ciphers\u2019, Pointcheval, D., CT-RSA 2006, LNCS,3860(Springer-Verlag 2006), p. 295\u2013312","DOI":"10.1007\/11605805_19"},{"key":"10.1049\/iet-ifs:20060099_r16","unstructured":"\u2018Algebra\u2019, 1999),ISBN 0821816462"},{"key":"10.1049\/iet-ifs:20060099_r17","doi-asserted-by":"crossref","unstructured":"Nyberg, K.: \u2018Differentially uniform mappings for cryptography\u2019, Helleseth, T., Advances in Cryptology, Proc. Eurocrypt'93, LNCS,765(Springer-Verlag 1993), p. 55\u201364","DOI":"10.1007\/3-540-48285-7_6"},{"key":"10.1049\/iet-ifs:20060099_r18","doi-asserted-by":"crossref","unstructured":"Daemen, J., Govaerts, R., and Vandewalle, J.: \u2018A new approach to block cipher design\u2019, Anderson, R., Proc. of Fast Software Encryption 1993, LNCS,809(Springer-Verlag 1994), p. 18\u201332","DOI":"10.1007\/3-540-58108-1_2"},{"key":"10.1049\/iet-ifs:20060099_r19","doi-asserted-by":"crossref","unstructured":"Rijmen, V., Daemen, J., Preneel, B., Bosselaers, A., and De Win, E.: \u2018The cipher SHARK\u2019, Gollmann, D., Fast Software Encryption'96, LNCS,1039(Springer-Verlag 1996), p. 99\u2013111","DOI":"10.1007\/3-540-60865-6_47"},{"key":"10.1049\/iet-ifs:20060099_r20","doi-asserted-by":"crossref","unstructured":"Daemen, J., Knudsen, L.R., and Rijmen, V.: \u2018The block cipher Square\u2019, Biham, E., Fast Software Encryption'97, LNCS,1267(Springer-Verlag 1997), p. 149\u2013165","DOI":"10.1007\/BFb0052343"},{"key":"10.1049\/iet-ifs:20060099_r21","doi-asserted-by":"crossref","unstructured":"Aoki, K., Ichikawa, T., Kanda, M., Matsui, M., Moriai, S., Nakajima, J., and Tokita, T.: \u2018Camellia: a 128-bit block cipher suitable for multiple platforms \u2013 Design and analysis\u2019, Stinson, D., Tavares, S., Selected Areas in Cryptography 2000, LNCS,2012(Springer-Verlag 2000), p. 39\u201356","DOI":"10.1007\/3-540-44983-3_4"},{"key":"10.1049\/iet-ifs:20060099_r22","author":"Anderson","year":"1998","journal-title":"Proc. 1st AES Candidate Conf, CD-1: Documentation"},{"key":"10.1049\/iet-ifs:20060099_r23","unstructured":"Daemen, J., Peeters, M., Van Assche, G., and Rijmen, V.: \u2018Nessie proposal: the block cipher Noekeon\u2019, submitted for publication"},{"key":"10.1049\/iet-ifs:20060099_r24","doi-asserted-by":"crossref","unstructured":"Zheng, Y.: \u2018Plateaued functions in Advances in Cryptology, ICICS'99\u2019, Zhang, X.M., (Springer-Verlag 1999), p. 284\u2013300","DOI":"10.1007\/978-3-540-47942-0_24"},{"key":"10.1049\/iet-ifs:20060099_r25","unstructured":"MacWilliams, F.J., and Sloane, N.J.A.: \u2018The theory of error-correcting codes\u2019, (North-Holland Publishing Company 1978)"},{"key":"10.1049\/iet-ifs:20060099_r26","unstructured":"Lidl, R., and Niederreiter, H.: \u2018Introduction to finite fields and their applications\u2019, (Cambridge University Press 1986),Reprinted 1988"},{"key":"10.1049\/iet-ifs:20060099_r27","author":"Rijmen","year":"1997"},{"key":"10.1049\/iet-ifs:20060099_r28","unstructured":"Toshiba corporation: \u2018Specification of Hierocrypt-L1\u2019. Available from the NESSIE homepage, URL: http:\/\/cryptonessie.org"}],"container-title":["IET Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/digital-library.theiet.org\/content\/journals\/10.1049\/iet-ifs_20060099?crawler=true&mimetype=application\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,12]],"date-time":"2024-11-12T16:28:34Z","timestamp":1731428914000},"score":1,"resource":{"primary":{"URL":"http:\/\/digital-library.theiet.org\/doi\/10.1049\/iet-ifs%3A20060099"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,3,12]]},"references-count":28,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2007,3,12]]}},"alternative-id":["10.1049\/iet-ifs:20060099"],"URL":"https:\/\/doi.org\/10.1049\/iet-ifs:20060099","relation":{},"ISSN":["1751-8709","1751-8717"],"issn-type":[{"value":"1751-8709","type":"print"},{"value":"1751-8717","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,3,12]]}}}