{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T04:01:43Z","timestamp":1748491303310,"version":"3.41.0"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T00:00:00Z","timestamp":1743120000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T00:00:00Z","timestamp":1743120000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,3,28]]},"DOI":"10.1109\/cacml64929.2025.11010933","type":"proceedings-article","created":{"date-parts":[[2025,5,27]],"date-time":"2025-05-27T17:05:14Z","timestamp":1748365514000},"page":"1-16","source":"Crossref","is-referenced-by-count":0,"title":["Quantum Attack Implementation of TWINE Block Cipher"],"prefix":"10.1109","author":[{"given":"Zou","family":"Kun","sequence":"first","affiliation":[{"name":"Science and Technology On Communication Security Laboratory,Chengdu,China"}]},{"given":"Dong","family":"Xinfeng","sequence":"additional","affiliation":[{"name":"Science and Technology On Communication Security Laboratory,Chengdu,China"}]},{"given":"Zhang","family":"Fuzhong","sequence":"additional","affiliation":[{"name":"Science and Technology On Communication Security Laboratory,Chengdu,China"}]},{"given":"Cheng","family":"Rong","sequence":"additional","affiliation":[{"name":"Science and Technology On Communication Security Laboratory,Chengdu,China"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/SFCS.1994.365700"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1137\/S0097539795293172"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1137\/S0097539796298637"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/ISIT.2010.5513654"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1007\/978-3-030-12612-4_20"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1007\/s11432-017-9436-7"},{"volume-title":"Cryptology ePrint Archive, Report 2019\/327","author":"Ito","article-title":"Quantum Distinguishing Attacks against Type-1 Generalized Feistel Ciphers[J\/OL]","key":"ref7"},{"issue":"5","key":"ref8","first-page":"561","article-title":"Study on block cipher structures against simon\u2019s quantum algorithm[J]","volume":"6","author":"LUO","year":"2019","journal-title":"Journal of Cryptologic Research"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1007\/s10623-020-00741-y"},{"issue":"2","key":"ref10","first-page":"295","article-title":"Improved quantum attack on Type-1 Generalized Feistel Schemes and Its application to CAST-256[J]","volume":"42","author":"Ni","year":"2020","journal-title":"Journal of Electronics & Information Technology"},{"issue":"6","key":"ref11","first-page":"864","article-title":"Research on quantum cryptanalysis on SMS4-like structure and NBC algorithm[J]","volume":"7","author":"YOU","year":"2020","journal-title":"Journal of Cryptologic Research"},{"issue":"6","key":"ref12","first-page":"960","article-title":"Quantum cryptanalysis on some generalized unbalanced Feistel networks[J]","volume":"8","author":"YU","year":"2021","journal-title":"Journal of Cryptologic Research"},{"key":"ref13","first-page":"212","article-title":"A fast quantum mechanical algorithm for database search. In: Proceedings of the Twenty-eighth Annual ACM Symposium on Theory of Computing (STOC 1996) [C]","author":"Grover","year":"1996","journal-title":"ACM"},{"article-title":"Submission Requirements and Evaluation Criteria for the Post-Quantum Cryptography Standardization Process[S\/OL]","key":"ref14"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1007\/978-3-319-70697-9_6"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1007\/978-3-319-29360-8_3"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1007\/s11128-018-1864-3"},{"key":"ref18","first-page":"854","article-title":"Reducing the cost of implementing AES as a quantum circuit[J\/OL]","volume":"2019","author":"Langenberg","year":"2019","journal-title":"IACR Cryptol. ePrint Arch."},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1007\/978-3-030-45724-2_10"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"697","DOI":"10.1007\/978-3-030-64834-3_24","article-title":"Quantum Circuit Implementations of AES with Fewer Qubits[J]. Advances in Cryptology-ASIACRYPT 2020. ASIACRYPT 2020","volume":"12492","author":"Zou","year":"2020","journal-title":"Lecture Notes in Computer Science"},{"issue":"6","key":"ref21","first-page":"999","article-title":"Quantum implementation of SM4[J]","volume":"8","author":"LIN","year":"2021","journal-title":"Journal of Cryptologic Research"},{"volume-title":"Springer","author":"Huang","article-title":"Synthesizing Quantum Circuits of AES with Lower T-depth and Less Qubits. Advances in Cryptology-ASIACRYPT 2022. ASIACRYPT 2022. Lecture Notes in computer Science, vol 13793","key":"ref22"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1007\/978-981-99-8727-6_3"},{"issue":"4","key":"ref24","first-page":"633","article-title":"Quantum cryptanalysis of lightweight cipher TWINE-128[J]","volume":"9","author":"LI","year":"2022","journal-title":"Journal of Cryptologic Research"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1090\/conm\/305\/05215"},{"key":"ref26","first-page":"339","article-title":"TWINE: A lightweight block cipher for multiple platforms[C]","volume-title":"Selected Areas in Cryptography\u2014SAC 2012","author":"KOBAYASHI","year":"2012"}],"event":{"name":"2025 4th Asia Conference on Algorithms, Computing and Machine Learning (CACML)","start":{"date-parts":[[2025,3,28]]},"location":"Guangzhou, China","end":{"date-parts":[[2025,3,30]]}},"container-title":["2025 4th Asia Conference on Algorithms, Computing and Machine Learning (CACML)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11010900\/11010924\/11010933.pdf?arnumber=11010933","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,28]],"date-time":"2025-05-28T04:49:19Z","timestamp":1748407759000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11010933\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,28]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/cacml64929.2025.11010933","relation":{},"subject":[],"published":{"date-parts":[[2025,3,28]]}}}