{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T13:10:21Z","timestamp":1763644221027,"version":"3.37.3"},"reference-count":47,"publisher":"Informa UK Limited","issue":"2","funder":[{"name":"The Scientific and Technological Research Council of Turkey","award":["121E228"],"award-info":[{"award-number":["121E228"]}]},{"DOI":"10.13039\/501100004410","name":"T\u00fcrkiye Bilimsel ve Teknolojik Ara\u015ft\u0131rma Kurumu","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004410","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Cryptologia"],"published-print":{"date-parts":[[2025,3,4]]},"DOI":"10.1080\/01611194.2024.2320362","type":"journal-article","created":{"date-parts":[[2024,4,3]],"date-time":"2024-04-03T07:35:25Z","timestamp":1712129725000},"page":"128-152","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":2,"title":["Square impossible differential attack and security of AES in known plaintext scenario"],"prefix":"10.1080","volume":"49","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9685-6625","authenticated-orcid":false,"given":"Orhun","family":"Kara","sequence":"first","affiliation":[{"name":"Department of Mathematics, IZTECH, Izmir Institute of Technology","place":["Gulbahce, Urla, T\u00dcRK\u0130YE"]}]}],"member":"301","published-online":{"date-parts":[[2024,4,3]]},"reference":[{"key":"e_1_3_2_2_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs:20070078"},{"key":"e_1_3_2_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_2"},{"key":"e_1_3_2_4_1","unstructured":"Biham E. and N. Keller. 1999. Cryptanalysis of reduced variants of Rijndael unpublished manuscript."},{"key":"e_1_3_2_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25385-0_19"},{"key":"e_1_3_2_6_1","doi-asserted-by":"publisher","DOI":"10.13154\/tosc.v2020.i3.327-361"},{"key":"e_1_3_2_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-016-9251-7"},{"key":"e_1_3_2_8_1","doi-asserted-by":"publisher","DOI":"10.1080\/01611194.2019.1706064"},{"key":"e_1_3_2_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45861-1_4"},{"key":"e_1_3_2_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36178-2_17"},{"key":"e_1_3_2_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-04722-4"},{"key":"e_1_3_2_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71039-4_7"},{"key":"e_1_3_2_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38348-9_23"},{"key":"e_1_3_2_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17373-8_10"},{"key":"e_1_3_2_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-013-9159-4"},{"key":"e_1_3_2_16_1","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.FIPS.197"},{"key":"e_1_3_2_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44706-7_15"},{"key":"e_1_3_2_18_1","first-page":"230","volume-title":"The Third Advanced Encryption Standard Candidate Conference","author":"Gilbert H.","year":"2000","unstructured":"Gilbert, H., and M. Minier. 2000. A collision attack on 7 rounds of Rijndael. In The Third Advanced Encryption Standard Candidate Conference, April 13-14, New York, New York, USA, National Institute of Standards and Technology, 2000, 230\u201341."},{"key":"e_1_3_2_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-76953-0_13"},{"key":"e_1_3_2_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-38471-5_3"},{"key":"e_1_3_2_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-56614-6_10"},{"key":"e_1_3_2_22_1","doi-asserted-by":"publisher","DOI":"10.1080\/0161-119991887801"},{"key":"e_1_3_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2008.80"},{"key":"e_1_3_2_24_1","first-page":"741","volume-title":"Parallel Computing: Architectures, Algorithms and Applications, ParCo 2007","author":"G\u00fcneysu T.","year":"2007","unstructured":"G\u00fcneysu, T., C. Paar, J. Pelzl, G. Pfeiffer, M. Schimmler, and C. Schleiffer. 2007. Parallel computing with low-cost fpgas: A framework for COPACOBANA. In: C. H. Bischof, H. M. B\u00fccker, P. Gibbon, G. R. Joubert, T. Lippert, B. Mohr, F. J. Peters (Eds.), Parallel Computing: Architectures, Algorithms and Applications, ParCo 2007, Forschungszentrum J\u00fclich and RWTH Aachen University, Germany, 4-7 September 2007, Vol. 15 of Advances in Parallel Computing, IOS Press, 741\u20138."},{"key":"e_1_3_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPTC.2011.62"},{"key":"e_1_3_2_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-57936-2_32"},{"key":"e_1_3_2_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-10970-7_7"},{"key":"e_1_3_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPTC.2011.73"},{"key":"e_1_3_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2942960"},{"key":"e_1_3_2_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48892-8_19"},{"issue":"2","key":"e_1_3_2_31_1","first-page":"216","article-title":"Deal \u2013 A 128-bit block cipher","volume":"258","author":"Knudsen L.","year":"1998","unstructured":"Knudsen, L. 1998. Deal \u2013 A 128-bit block cipher. Complexity 258 (2):216.","journal-title":"Complexity"},{"key":"e_1_3_2_32_1","doi-asserted-by":"publisher","DOI":"10.1080\/01611194.2014.988370"},{"key":"e_1_3_2_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46706-0_7"},{"key":"e_1_3_2_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-017-9365-4"},{"key":"e_1_3_2_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89754-5_22"},{"key":"e_1_3_2_36_1","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/5980251"},{"key":"e_1_3_2_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17401-8_20"},{"key":"e_1_3_2_38_1","doi-asserted-by":"publisher","DOI":"10.1080\/0161-110291890740"},{"key":"e_1_3_2_39_1","doi-asserted-by":"publisher","DOI":"10.1080\/01611194.2016.1238423"},{"key":"e_1_3_2_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2004.02.018"},{"key":"e_1_3_2_41_1","unstructured":"Quisquater J.-J and F. Standaert. 2005. Exhaustive key search of the DES: Updates and refinements SHARCS 2005."},{"key":"e_1_3_2_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2013.12.008"},{"key":"e_1_3_2_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49890-3_8"},{"key":"e_1_3_2_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-19962-7_3"},{"key":"e_1_3_2_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-019-00660-7"},{"key":"e_1_3_2_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-016-0417-7"},{"key":"e_1_3_2_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-76788-6_19"},{"key":"e_1_3_2_48_1","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.E93.A.327"}],"container-title":["Cryptologia"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/01611194.2024.2320362","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T05:28:32Z","timestamp":1740029312000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/01611194.2024.2320362"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,3]]},"references-count":47,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,3,4]]}},"alternative-id":["10.1080\/01611194.2024.2320362"],"URL":"https:\/\/doi.org\/10.1080\/01611194.2024.2320362","relation":{},"ISSN":["0161-1194","1558-1586"],"issn-type":[{"type":"print","value":"0161-1194"},{"type":"electronic","value":"1558-1586"}],"subject":[],"published":{"date-parts":[[2024,4,3]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucry20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucry20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2024-04-03","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}