{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,2,15]],"date-time":"2024-02-15T16:40:58Z","timestamp":1708015258783},"reference-count":27,"publisher":"Informa UK Limited","issue":"2","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Cryptologia"],"published-print":{"date-parts":[[2024,3,3]]},"DOI":"10.1080\/01611194.2022.2134752","type":"journal-article","created":{"date-parts":[[2023,1,13]],"date-time":"2023-01-13T06:05:10Z","timestamp":1673589910000},"page":"140-172","update-policy":"http:\/\/dx.doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":0,"title":["On security aspects of the ciphers T-310 and SKS with approved long-term keys"],"prefix":"10.1080","volume":"48","author":[{"given":"Wolfgang","family":"Killmann","sequence":"first","affiliation":[]}],"member":"301","published-online":{"date-parts":[[2023,1,12]]},"reference":[{"key":"e_1_3_5_2_1","doi-asserted-by":"publisher","DOI":"10.1080\/01611194.2017.1362062"},{"key":"e_1_3_5_3_1","unstructured":"Courtois N. T. 2018b. On the existence of non-linear invariants and algebraic polynomial constructive approach to backdoors in block ciphers. IACR Cryptology ePrint Archive 2018\/807."},{"key":"e_1_3_5_4_1","unstructured":"Courtois N. T. 2018c. Structural nonlinear invariant attacks on T-310: Attacking arbitrary Boolean functions. IACR Cryptology ePrint Archive 2018\/1242."},{"key":"e_1_3_5_5_1","unstructured":"Courtois N. T. 2020. Invariant hopping attacks on block ciphers. CoRR abs\/2002.03212."},{"key":"e_1_3_5_6_1","doi-asserted-by":"publisher","DOI":"10.1080\/01611194.2020.1736207"},{"key":"e_1_3_5_7_1","doi-asserted-by":"publisher","DOI":"10.1080\/01611194.2019.1706062"},{"key":"e_1_3_5_8_1","unstructured":"Courtois N. T. and A. Patrick. 2019. Lack of unique factorization as a tool in block cipher cryptanalysis. CoRR abs\/1905.04684."},{"key":"e_1_3_5_9_1","doi-asserted-by":"crossref","unstructured":"Courtois N. T. and J.-J. Quisquater. 2020. Can a differential attack work for an arbitrarily large number of rounds?. In Information Security and Cryptology \u2013 ICISC 2020 \u2013 23rd International Conference Seoul South Korea 2\u20134 December Proceedings volume 12593 of Lecture Notes in Computer Science ed. D. Hong 157\u2013181. Berlin: Springer.","DOI":"10.1007\/978-3-030-68890-5_9"},{"key":"e_1_3_5_10_1","unstructured":"Courtois N. T. and M. Georgiou. 2019. Constructive non-linear polynomial cryptanalysis of a historical block cipher. CoRR abs\/1902.02748."},{"key":"e_1_3_5_11_1","doi-asserted-by":"publisher","DOI":"10.1080\/01611194.2017.1362065"},{"key":"e_1_3_5_12_1","unstructured":"Courtois N. T. K. Schmeh J. Drobick J. Patarin M.-B. Oprisanu M. Scarlata and O. Bhallamudi. 2018. Cryptographic security analysis of T-310. IACR Cryptology ePrint Archive 2017\/440 2017."},{"key":"e_1_3_5_13_1","doi-asserted-by":"publisher","DOI":"10.1080\/01611194.2018.1548392"},{"key":"e_1_3_5_14_1","doi-asserted-by":"publisher","DOI":"10.2478\/tmmp-2019-0006"},{"key":"e_1_3_5_15_1","doi-asserted-by":"publisher","DOI":"10.1080\/01611194.2018.1483981"},{"key":"e_1_3_5_16_1","unstructured":"Georgiou M. 2019. Weak keys and cryptanalysis of a cold war block cipher. CoRR abs\/1901.06504."},{"key":"e_1_3_5_17_1","doi-asserted-by":"crossref","unstructured":"Harpes C. G. G. Kramer and J. L. Massey. 1995. A generalization of linear cryptanalysis and the applicability of Matsui\u2019s piling-up lemma. In Advances in Cryptology \u2013 EUROCRYPT \u201995 International Conference on the Theory and Application of Cryptographic Techniques Saint-Malo France 21\u201325 May 1995 Proceeding volume 921 of Lecture Notes in Computer Science ed. L. C. Guillou and J.-J. Quisquater 24\u201338. Berlin: Springer.","DOI":"10.1007\/3-540-49264-X_3"},{"key":"e_1_3_5_18_1","volume-title":"Information security \u2013 Encryption algorithms \u2013 Part 1: General","author":"International Organization for Standardization","year":"2021","unstructured":"International Organization for Standardization. 2021. Information security \u2013 Encryption algorithms \u2013 Part 1: General. Geneva, CH: Standard, International Organization for Standardization."},{"key":"e_1_3_5_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-61897-4"},{"key":"e_1_3_5_20_1","doi-asserted-by":"crossref","unstructured":"Matsui M. 1984. Linear cryptanalysis method for DES cipher. In Proceeding EUROCRYPT \u201993 Workshop on the theory and application of cryptographic techniques on Advances in cryptology LNCS vol. 765 386\u2013397. Berlin: Springer.","DOI":"10.1007\/3-540-48285-7_33"},{"key":"e_1_3_5_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10231-016-0559-6"},{"key":"e_1_3_5_22_1","doi-asserted-by":"publisher","DOI":"10.1080\/01611190600632457"},{"key":"e_1_3_5_23_1","doi-asserted-by":"publisher","DOI":"10.1515\/jmc-2013-0028"},{"key":"e_1_3_5_24_1","doi-asserted-by":"publisher","DOI":"10.3384\/ecp188407"},{"key":"e_1_3_5_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-47555-9_9"},{"key":"e_1_3_5_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45661-9_11"},{"key":"e_1_3_5_28_1","volume-title":"Finite permutation groups","author":"Wielandt H.","year":"1964","unstructured":"Wielandt, H. 1964. Finite permutation groups. New York and London: Academic Press."},{"key":"e_1_3_5_32_1","unstructured":"ZCO. 1990. Klasse ALPHA: Langzeitschl\u00fcsselverzeichnis 1976"}],"container-title":["Cryptologia"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/01611194.2022.2134752","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,15]],"date-time":"2024-02-15T16:13:07Z","timestamp":1708013587000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/01611194.2022.2134752"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,12]]},"references-count":27,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,3,3]]}},"alternative-id":["10.1080\/01611194.2022.2134752"],"URL":"https:\/\/doi.org\/10.1080\/01611194.2022.2134752","relation":{},"ISSN":["0161-1194","1558-1586"],"issn-type":[{"value":"0161-1194","type":"print"},{"value":"1558-1586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,1,12]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucry20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucry20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2023-01-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}