{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T04:58:30Z","timestamp":1764997110854,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/icitst.2016.7856751","type":"proceedings-article","created":{"date-parts":[[2017,2,16]],"date-time":"2017-02-16T22:16:34Z","timestamp":1487283394000},"page":"447-454","source":"Crossref","is-referenced-by-count":2,"title":["Linear and differential cryptanalysis of small-sized random (n, m)-S-boxes"],"prefix":"10.1109","author":[{"given":"Y.","family":"Alsalami","sequence":"first","affiliation":[]},{"given":"C. Y.","family":"Yeun","sequence":"additional","affiliation":[]},{"given":"T.","family":"Martin","sequence":"additional","affiliation":[]},{"given":"M.","family":"Khonji","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48329-2_34"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-006-9012-y"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1147\/rd.383.0243"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45402-2_77"},{"key":"ref14","article-title":"The khazad legacy-level block cipher","volume":"97","author":"barreto","year":"2000","journal-title":"Primitive submitted to NESSIE"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"432","DOI":"10.1007\/978-3-540-24691-6_32","article-title":"New block cipher: Aria","author":"kwon","year":"2004","journal-title":"Information Security and Cryptology-ICISC 2003"},{"key":"ref16","article-title":"The anubis block cipher","author":"rijmen","year":"2000","journal-title":"Submission to NESSIE"},{"journal-title":"Vectorial Boolean Functions for Cryptography ser Discrete Mathematics and Its Applications","year":"2010","author":"carlet","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46416-6_32"},{"article-title":"The art of computer programming 1: Fundamental algorithms 2: Seminumerical algorithms 3: Sorting and searching","year":"1968","author":"knuth","key":"ref19"},{"key":"ref4","first-page":"19","article-title":"Advanced encryption standard","year":"2001","journal-title":"Federal Information Processing Standards Publication FIPS PUB 197"},{"key":"ref27","first-page":"113","article-title":"Almost perfect non-linear power functions on gf(2n): a new case for n divisible by 5","author":"dobbertin","year":"2000","journal-title":"Finite Fields and Applications Fq 5 Germany"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-58108-1_1"},{"journal-title":"PRESENT An Ultra-Lightweight Block Cipher","year":"2007","author":"bogdanov","key":"ref6"},{"key":"ref5","article-title":"Data encryption standard","author":"massey","year":"1977","journal-title":"Federal Informationx Processing Standards Publication FIPS PUB 46-3"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48285-7_33"},{"journal-title":"National Institute of Standards and Technology Information Technology Laboratory","article-title":"Sha-3 standard: Permutation-based hash and extendable-output functions","year":"2015","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-60590-8_22"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/BF00630563"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73074-3_13"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.3934\/amc.2015.9.541"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/BF00204800"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(71)90473-6"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1968.1054106"},{"key":"ref26","article-title":"Multi-valued cross-correlation functions between two maximal linear recursive sequences","author":"niho","year":"1972","journal-title":"DTIC Document Tech Rep"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/18.761283"}],"event":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","start":{"date-parts":[[2016,12,5]]},"location":"Barcelona, Spain","end":{"date-parts":[[2016,12,7]]}},"container-title":["2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7847254\/7856645\/07856751.pdf?arnumber=7856751","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,18]],"date-time":"2019-09-18T19:53:07Z","timestamp":1568836387000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7856751\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/icitst.2016.7856751","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}