{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T20:18:54Z","timestamp":1740169134141,"version":"3.37.3"},"reference-count":28,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100003968","name":"Iranian National Science Foundation","doi-asserted-by":"crossref","award":["96.53979"],"award-info":[{"award-number":["96.53979"]}],"id":[{"id":"10.13039\/501100003968","id-type":"DOI","asserted-by":"crossref"}]},{"name":"INSF Cryptography Chair"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2019.2962101","type":"journal-article","created":{"date-parts":[[2019,12,24]],"date-time":"2019-12-24T19:34:38Z","timestamp":1577216078000},"page":"2284-2301","source":"Crossref","is-referenced-by-count":4,"title":["Generalized Meet in the Middle Cryptanalysis of Block Ciphers With an Automated Search Algorithm"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8801-337X","authenticated-orcid":false,"given":"Siavash","family":"Ahmadi","sequence":"first","affiliation":[]},{"given":"Mohammad Reza","family":"Aref","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2017.2699190"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-40367-0_24"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34931-7_17"},{"key":"ref13","article-title":"Automatic search of meet-in-the middle and impossible differential attacks","author":"patrick","year":"2016","journal-title":"Proc Annu Int Cryptol Conf"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-52993-5_13"},{"key":"ref15","article-title":"A framework for automated independent-biclique cryptanalysis","author":"farzaneh","year":"2013","journal-title":"Fast Software Encryption Third International Workshop Proceedings"},{"key":"ref16","article-title":"Automatic search for a variant of division property using three subsets","author":"kai","year":"2019","journal-title":"Proc Cryptographers Track RSA Conf"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2344445"},{"key":"ref18","first-page":"46","volume":"4249","author":"hong","year":"2006","journal-title":"HIGHT A New Block Cipher Suitable For low-Resource Device Cryptographic Hardware and Embedded Systems-CHES Lecture Notes in Computer Science"},{"key":"ref19","first-page":"342","volume":"6917","author":"shibutani","year":"2011","journal-title":"Piccolo An Ultra-Lightweight Blockcipher"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22792-9_10"},{"key":"ref4","first-page":"344","volume":"7073","author":"bogdanov","year":"2011","journal-title":"Biclique Cryptanalysis of the Full AES"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-35869-3_6"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22497-3_31"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79263-5_24"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2945006"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-52993-5_14"},{"key":"ref7","first-page":"222","article-title":"Sieve-in-the-middle: Improved MITM attacks","volume":"8042","author":"lu","year":"2008","journal-title":"Topics in Cryptology&#x2014;CT-RSA"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19574-7_16"},{"article-title":"Towards finding the best characteristics of some bit-oriented block ciphers and automatic enumeration of (related-key) differential and linear characteristics with predefined properties","year":"2014","author":"siwei","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/C-M.1977.217750"},{"key":"ref20","first-page":"5","article-title":"CRAFT: Lightweight tweakable block cipher with efficient protection against DFA Attacks","volume":"2019","author":"christof","year":"2019","journal-title":"IACR Trans Symmetric Cryptol"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3382"},{"journal-title":"The Design of Rijndael AES&#x2014;The Advanced Encryption Standard","year":"2002","author":"daemen","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-19962-7_3"},{"key":"ref23","article-title":"Bicliques with minimal data and time complexity for AES","author":"andrey","year":"2014","journal-title":"Proc Int Conf Inf Security Cryptol"},{"article-title":"Comprehensive security analysis of CRAFT","year":"2019","author":"hadipour","key":"ref26"},{"key":"ref25","first-page":"126","article-title":"New automatic search method for truncated-differential characteristics: Application to Midori and SKINNY","author":"moghaddam","year":"2019"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/08941008.pdf?arnumber=8941008","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:36:01Z","timestamp":1641987361000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8941008\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/access.2019.2962101","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2020]]}}}