{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T11:23:03Z","timestamp":1774524183891,"version":"3.50.1"},"reference-count":8,"publisher":"Institution of Engineering and Technology (IET)","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IET Inf. Secur."],"published-print":{"date-parts":[[2008,6,9]]},"DOI":"10.1049\/iet-ifs:20070078","type":"journal-article","created":{"date-parts":[[2008,6,12]],"date-time":"2008-06-12T22:46:17Z","timestamp":1213310777000},"page":"28-32","source":"Crossref","is-referenced-by-count":51,"title":["Impossible differential attack on seven-round AES-128"],"prefix":"10.1049","volume":"2","author":[{"given":"B.","family":"Bahrak","sequence":"first","affiliation":[{"name":"Information System and Security Laboratory (ISSL), Electrical Engineering Department, Sharif University of Technology, Tehran, Iran"}]},{"given":"M.R.","family":"Aref","sequence":"additional","affiliation":[{"name":"Information System and Security Laboratory (ISSL), Electrical Engineering Department, Sharif University of Technology, Tehran, Iran"}]}],"member":"265","reference":[{"key":"10.1049\/iet-ifs:20070078_r1","doi-asserted-by":"crossref","unstructured":"Daemen, J., and Rijmen, V.: \u2018The design of Rijndael: AES \u2013 the Advanced Encryption Standard\u2019, (Springer Verlag 2002)","DOI":"10.1007\/978-3-662-04722-4"},{"key":"10.1049\/iet-ifs:20070078_r2","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"Biham","year":"1991","ISSN":"https:\/\/id.crossref.org\/issn\/0933-2790","issn-type":"print"},{"key":"10.1049\/iet-ifs:20070078_r3","first-page":"12","volume":"1592","author":"Biham","year":"1999"},{"key":"10.1049\/iet-ifs:20070078_r4","author":"Biham","year":"2000","journal-title":"AES Conf."},{"key":"10.1049\/iet-ifs:20070078_r5","first-page":"39","volume":"2288","author":"Cheon","year":"2001"},{"key":"10.1049\/iet-ifs:20070078_r6","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1016\/j.ipl.2004.02.018","volume":"91","author":"Phan","year":"2004","ISSN":"https:\/\/id.crossref.org\/issn\/0020-0190","issn-type":"print"},{"key":"10.1049\/iet-ifs:20070078_r7","first-page":"213","volume":"1978","author":"Ferguson","year":"2001"},{"key":"10.1049\/iet-ifs:20070078_r8","first-page":"230","author":"Gilbert","year":"2000","journal-title":"Proc. 3rd AES Conf."}],"container-title":["IET Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/digital-library.theiet.org\/content\/journals\/10.1049\/iet-ifs_20070078?crawler=true&mimetype=application\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,12]],"date-time":"2024-11-12T14:19:48Z","timestamp":1731421188000},"score":1,"resource":{"primary":{"URL":"http:\/\/digital-library.theiet.org\/doi\/10.1049\/iet-ifs%3A20070078"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,6,9]]},"references-count":8,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2008,6,9]]}},"alternative-id":["10.1049\/iet-ifs:20070078"],"URL":"https:\/\/doi.org\/10.1049\/iet-ifs:20070078","relation":{},"ISSN":["1751-8709","1751-8717"],"issn-type":[{"value":"1751-8709","type":"print"},{"value":"1751-8717","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,6,9]]}}}