{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T15:07:04Z","timestamp":1730214424045,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,5]]},"DOI":"10.1109\/dessert50317.2020.9125071","type":"proceedings-article","created":{"date-parts":[[2020,6,25]],"date-time":"2020-06-25T16:46:07Z","timestamp":1593103567000},"page":"157-160","source":"Crossref","is-referenced-by-count":0,"title":["The Method of Searching for Differential Trails of ARX-based Block Cipher Cypress"],"prefix":"10.1109","author":[{"given":"Mariia","family":"Rodinko","sequence":"first","affiliation":[]},{"given":"Roman","family":"Oliynykov","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"181","article-title":"The 128-bit blockcipher CLEFIA","author":"taizo","year":"2007","journal-title":"Fast Software Encryption Third International Workshop"},{"key":"ref11","first-page":"146","article-title":"Twine: A lightweight, versatile block cipher","author":"suzaki","year":"2011","journal-title":"ECRYPT Workshop on Lightweight Cryptography (LC11)"},{"key":"ref12","first-page":"1","article-title":"KLEIN: a new family of lightweight block ciphers","author":"gong","year":"2011","journal-title":"Radio Frequency Identification: Security and Privacy Issues"},{"key":"ref13","first-page":"411","article-title":"Midori: A block cipher for low energy&#x201D;, Advances in Cryptology - ASIACRYPT 2015","author":"banik","year":"2015","journal-title":"Proceedings of 21st International Conference on the Theory and Application of Cryptology and Information Security November 29 - December 3 2015 Auckland New Zealand Part II Vol 9453 of Lecture Notes in Computer Science"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00253-4_5"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/DESSERT.2018.8409150"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMMST.2018.8631904"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04852-9_12"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46416-6_2"},{"key":"ref19","article-title":"Towards finding optimal differential characteristics for ARX: Application to Salsa20","author":"mouha","year":"2013","journal-title":"Cryptology EPrint Archive Report 2013\/496"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00253-4_6"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/DESSERT.2018.8409148"},{"key":"ref6","first-page":"7","article-title":"Lightweight Cryptography for the Internet of Things","author":"katagi","year":"2008","journal-title":"Sony Corporation"},{"key":"ref5","first-page":"19","article-title":"The Design Space of Lightweight Cryptography","author":"mouha","year":"2015","journal-title":"NIST Workshop on Lightweight Cryptography"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-60590-8_29"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2747946"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"82","DOI":"10.47839\/ijc.18.1.1277","article-title":"Studies on Statistical Analysis and Performance Evaluation For Some Stream Ciphers","volume":"18","author":"gorbenko","year":"2019","journal-title":"International Journal of Computing"},{"key":"ref1","article-title":"A New Encryption Standard of Ukraine: The Kalyna Block Cipher","author":"oliynykov","year":"2015","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref9","first-page":"3","article-title":"LEA: A 128-bit block cipher for fast encryption on common processors","author":"hong","year":"2013","journal-title":"International Workshop on Information Security and Application"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-25937-4_20"},{"key":"ref21","first-page":"336","article-title":"Efficient algorithms for computing differential properties of addition","author":"lipmaa","year":"2001","journal-title":"Fast Software Encryption Third International Workshop"}],"event":{"name":"2020 IEEE 11th International Conference on Dependable Systems, Services and Technologies (DESSERT)","start":{"date-parts":[[2020,5,14]]},"location":"Kyiv, Ukraine","end":{"date-parts":[[2020,5,18]]}},"container-title":["2020 IEEE 11th International Conference on Dependable Systems, Services and Technologies (DESSERT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9122248\/9124995\/09125071.pdf?arnumber=9125071","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T12:10:49Z","timestamp":1656331849000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9125071\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/dessert50317.2020.9125071","relation":{},"subject":[],"published":{"date-parts":[[2020,5]]}}}