{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T04:39:08Z","timestamp":1729658348718,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1109\/iscisc.2014.6994027","type":"proceedings-article","created":{"date-parts":[[2014,12,30]],"date-time":"2014-12-30T22:11:01Z","timestamp":1419977461000},"page":"84-88","source":"Crossref","is-referenced-by-count":1,"title":["Security analysis of CLEFIA-128"],"prefix":"10.1109","author":[{"given":"Siavash","family":"Ahmadi","sequence":"first","affiliation":[]},{"given":"Mahshid","family":"Delavar","sequence":"additional","affiliation":[]},{"given":"Javad","family":"Mohajeri","sequence":"additional","affiliation":[]},{"given":"Mohammad Reza","family":"Aref","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"Impossible differential-linear cryptanalysis of reduced-round clefia-128","author":"yuan","year":"2013","journal-title":"Cryptology EPrint Archive Report 2013\/301"},{"key":"17","article-title":"Impossible differential cryptanalysis of clefia","volume":"5086","author":"tsunoo","year":"2008","journal-title":"FSE"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17401-8_15"},{"key":"15","article-title":"Biclique cryptanalysis of the full-round klein block cipher","author":"ahmadian","year":"2013","journal-title":"Cryptology EPrint Archive Report 2013\/097"},{"key":"16","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/978-3-540-74619-5_12","article-title":"The 128-bit blockcipher clefia","author":"shirai","year":"2007","journal-title":"Fast Software Encryption"},{"journal-title":"Biclique Cryptanalysis of Piccolo-80 and 128 10th International ISC Conference on Information Security & Cryptology iscisc'13","year":"2013","author":"ahmadi","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2013.03.011"},{"key":"11","article-title":"Non-isomorphic biclique cryptanalysis and its application to full-round mcrypton","author":"shakiba","year":"2013","journal-title":"Cryptology EPrint Archive Report 2013\/141"},{"key":"12","article-title":"Low data complexity biclique cryptanalysis of block ciphers with application to piccolo and hight","author":"ahmadi","year":"2013","journal-title":"Cryptology EPrint Archive Report 2013\/511"},{"key":"3","article-title":"Twine: A lightweight, versatile block cipher","author":"suzaki","year":"2011","journal-title":"Proc Ecrypt Workshop on RFID and Lightweight Crypto"},{"key":"20","article-title":"Low probability differentials and thecryptanalysis of full-round clefia-128","author":"emami","year":"2014","journal-title":"Cryptology EPrint Archive Report 2014\/056"},{"key":"2","first-page":"272","article-title":"Katan and ktantan-A family of smll and efficient hardware-oriented block ciphers","volume":"5747","author":"de canniere","year":"2009","journal-title":"CHES 2009 LNCS"},{"key":"1","first-page":"450466","article-title":"Present: An ultra-lightweight block cipher","volume":"4727","author":"bogdanov","year":"2007","journal-title":"CHES 2007"},{"key":"10","article-title":"Biclique cryptanalysis of the present and led lightweight ciphers","author":"abed","year":"2012","journal-title":"Cryptology Eprint Archive Report 2012\/591"},{"key":"7","first-page":"326","article-title":"Klein: A new family of lightweight block ciphers","volume":"6917","author":"gong","year":"2011","journal-title":"RFIDSec 2011"},{"key":"6","first-page":"342","article-title":"Piccolo: An ultra-lightweight blockcipher","author":"shibutani","year":"2011","journal-title":"CHES 2011 LNCS 6917"},{"key":"5","first-page":"243","article-title":"Crypton-A lightweight block cipher for security of low-cost rfid tags ad sensors","volume":"3786","author":"lim","year":"2006","journal-title":"WISA 2005 LNCS"},{"key":"4","first-page":"16","article-title":"Printcipher: A block cipher for ic-printing","volume":"6225","author":"knudsen","year":"2010","journal-title":"CHES 2010 LNCS"},{"key":"9","first-page":"344","article-title":"Biclique cryptanalysis of the full aes","author":"bogdanov","year":"2011","journal-title":"ASIACRYPT 2011 LNCS 7073"},{"key":"8","first-page":"326","article-title":"The led block cipher","author":"guo","year":"2011","journal-title":"CHES 2011 LNCS 6917"}],"event":{"name":"2014 11th International ISC Conference on Information Security and Cryptology (ISCISC)","start":{"date-parts":[[2014,9,3]]},"location":"Tehran, Iran","end":{"date-parts":[[2014,9,4]]}},"container-title":["2014 11th International ISC Conference on Information Security and Cryptology"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6975720\/6994006\/06994027.pdf?arnumber=6994027","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T22:54:40Z","timestamp":1498172080000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6994027\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/iscisc.2014.6994027","relation":{},"subject":[],"published":{"date-parts":[[2014,9]]}}}