{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T06:58:25Z","timestamp":1774335505541,"version":"3.50.1"},"reference-count":28,"publisher":"Oxford University Press (OUP)","issue":"12","license":[{"start":{"date-parts":[[2022,10,25]],"date-time":"2022-10-25T00:00:00Z","timestamp":1666656000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/open_access\/funder_policies\/chorus\/standard_publication_model"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,12,14]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>Demirci\u2013Sel\u00e7uk meet-in-the-middle (DS-MITM) attack is an effective method for cryptanalysis. As far as we know, the published automatic results of DS-MITM attack are all for byte-oriented ciphers. In this article, we first propose the automatic analysis method of DS-MITM attack for bit-oriented ciphers based on constraint programming, which is integrated with key-bridging technique. Based on the automatic modeling method, we propose the first result of DS-MITM attack on SIMON, which is a family of lightweight block ciphers proposed by the National Security Agency (NSA) in 2013.<\/jats:p>","DOI":"10.1093\/comjnl\/bxac149","type":"journal-article","created":{"date-parts":[[2022,11,2]],"date-time":"2022-11-02T14:15:34Z","timestamp":1667398534000},"page":"3052-3068","source":"Crossref","is-referenced-by-count":1,"title":["Automatic Demirci\u2013Sel\u00e7uk Meet-In-The-Middle Attack On SIMON"],"prefix":"10.1093","volume":"66","author":[{"given":"Yin","family":"Lv","sequence":"first","affiliation":[{"name":"State Key Laboratory of Information Security , Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China"},{"name":"School of Cyber Security , University of Chinese Academy of Sciences, Beijing 100093, China"}]},{"given":"Danping","family":"Shi","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Information Security , Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China"},{"name":"School of Cyber Security , University of Chinese Academy of Sciences, Beijing 100093, China"}]},{"given":"Yi","family":"Guo","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Information Security , Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China"},{"name":"School of Cyber Security , University of Chinese Academy of Sciences, Beijing 100093, China"}]},{"given":"Qiu","family":"Chen","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Information Security , Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China"},{"name":"School of Cyber Security , University of Chinese Academy of Sciences, Beijing 100093, China"}]},{"given":"Lei","family":"Hu","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Information Security , Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China"},{"name":"School of Cyber Security , University of Chinese Academy of Sciences, Beijing 100093, China"}]},{"given":"Zihui","family":"Guo","sequence":"additional","affiliation":[{"name":"School of Cyber Security , University of Chinese Academy of Sciences, Beijing 100093, China"},{"name":"Institute of Information Engineering , Chinese Academy of Sciences, Beijing 100093, China"}]}],"member":"286","published-online":{"date-parts":[[2022,10,25]]},"reference":[{"key":"2024020117183263500_ref1","first-page":"450","volume-title":"Cryptographic Hardware and Embedded Systems","author":"Bogdanov","year":"2007"},{"key":"2024020117183263500_ref2","first-page":"40","volume-title":"Workshop on Fault Diagnosis and Tolerance in Cryptography","author":"Ray","year":"2014"},{"key":"2024020117183263500_ref3","doi-asserted-by":"crossref","first-page":"327","DOI":"10.1007\/978-3-642-21554-4_19","volume-title":"Applied Cryptographt and Network Security","author":"Wu","year":"2011"},{"key":"2024020117183263500_ref4","doi-asserted-by":"crossref","first-page":"358","DOI":"10.46586\/tosc.v2017.i1.358-379","article-title":"Optimal differential trails in SIMON-like ciphers","author":"Liu","year":"2017","journal-title":"IACR Trans. Symmetric Cryptol"},{"key":"2024020117183263500_ref5","first-page":"098103:1","article-title":"Differential attacks on reduced SIMON versions with dynamic key-guessing techniques","author":"Wang","year":"2018","journal-title":"SCIENCE CHINA Information Sciences 61"},{"key":"2024020117183263500_ref6","doi-asserted-by":"crossref","first-page":"428","DOI":"10.1007\/978-3-662-52993-5_22","volume-title":"Fast Software Encryption","author":"Chen","year":"2016"},{"key":"2024020117183263500_ref7","first-page":"272","volume-title":"Advances in Cryptology-ASIACRYPT","author":"Leurent","year":"2021"},{"key":"2024020117183263500_ref8","article-title":"Differential and linear cryptanalysis of reduced-round SIMON","author":"Abed","year":"2013","journal-title":"IACR Cryptology ePrint Archive 2013"},{"key":"2024020117183263500_ref9","first-page":"143","volume-title":"Progress in Cryptology - INDOCRYPT","author":"Wang","year":"2014"},{"key":"2024020117183263500_ref10","first-page":"125","volume-title":"Information Security and Cryptology","author":"Sun","year":"2015"},{"key":"2024020117183263500_ref11","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1007\/978-3-662-52993-5_18","volume-title":"Fast Software Encryption","author":"Todo","year":"2016"},{"key":"2024020117183263500_ref12","volume-title":"IACR Cryptology ePrint Archive 2015","author":"Ahmadian","year":"2015"},{"key":"2024020117183263500_ref13","first-page":"140","volume-title":"The Second International Workshop on Lightweight Cryptography for Security & Privacy","author":"Song","year":"2014"},{"key":"2024020117183263500_ref14","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1007\/978-3-540-71039-4_7","volume-title":"Fast Software Encryption","author":"Demirci","year":"2008"},{"key":"2024020117183263500_ref15","first-page":"371","volume-title":"Advances in Cryptology - EUROCRYPT","author":"Derbez","year":"2013"},{"key":"2024020117183263500_ref16","first-page":"127","volume-title":"Fast Software Encryption - 21st International Workshop","author":"Li","year":"2014"},{"key":"2024020117183263500_ref17","doi-asserted-by":"crossref","first-page":"459","DOI":"10.1007\/s10623-015-0113-3","article-title":"Meet-in-the-middle attacks on 10-round AES-256","author":"Li","year":"2016","journal-title":"Design Codes Cryptogr"},{"key":"2024020117183263500_ref18","first-page":"190","article-title":"Meet-in-the-middle attacks and structural analysis of round-reduced PRINCE","author":"Derbez","year":"2020","journal-title":"Journal of Cryptology"},{"key":"2024020117183263500_ref19","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1007\/978-3-662-48116-5_3","volume-title":"Fast Software Encryption","author":"Li","year":"2015"},{"key":"2024020117183263500_ref20","first-page":"458","volume-title":"Advances in Cryptology-ASIACRYPT","author":"Guo","year":"2014"},{"key":"2024020117183263500_ref21","doi-asserted-by":"crossref","first-page":"34416","DOI":"10.1109\/ACCESS.2019.2900765","article-title":"Improved meet-in-the-middle attacks on generic Feistel constructions","author":"Zhao","year":"2019","journal-title":"IEEE Access"},{"key":"2024020117183263500_ref22","first-page":"158","volume-title":"Advances in Cryptology-ASIACRYPT","author":"Dunkelman","year":"2010"},{"key":"2024020117183263500_ref23","first-page":"541","volume-title":"Fast Software Encryption","author":"Derbez","year":"2013"},{"key":"2024020117183263500_ref24","first-page":"157","volume-title":"Advances in Cryptology - CRYPTO","author":"Derbez","year":"2016"},{"key":"2024020117183263500_ref25","first-page":"3","volume-title":"Advances in Cryptology- ASIACRYPT","author":"Shi","year":"2018"},{"key":"2024020117183263500_ref26","first-page":"136","volume-title":"Information Security and Cryptology - ICISC 2015","author":"Wang","year":"2015"},{"key":"2024020117183263500_ref27","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1007\/978-3-662-52993-5_13","volume-title":"Fast Software Encryption - 23rd International Conference","author":"Lin","year":"2016"},{"key":"2024020117183263500_ref28","first-page":"233","volume-title":"Information and Communications Security","author":"Chen","year":"2019"}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/comjnl\/article-pdf\/66\/12\/3052\/56534114\/bxac149.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/comjnl\/article-pdf\/66\/12\/3052\/56534114\/bxac149.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T17:18:56Z","timestamp":1706807936000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article\/66\/12\/3052\/6772525"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,25]]},"references-count":28,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2022,10,25]]},"published-print":{"date-parts":[[2023,12,14]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxac149","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"value":"0010-4620","type":"print"},{"value":"1460-2067","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2023,12]]},"published":{"date-parts":[[2022,10,25]]}}}