{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T23:00:00Z","timestamp":1762210800443,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1109\/iscisc.2014.6994028","type":"proceedings-article","created":{"date-parts":[[2014,12,31]],"date-time":"2014-12-31T03:11:01Z","timestamp":1419995461000},"page":"89-94","source":"Crossref","is-referenced-by-count":15,"title":["Impossible differential cryptanalysis of Piccolo lightweight block cipher"],"prefix":"10.1109","author":[{"given":"Seyyed Arash","family":"Azimi","sequence":"first","affiliation":[]},{"given":"Zahra","family":"Ahmadian","sequence":"additional","affiliation":[]},{"given":"Javad","family":"Mohajeri","sequence":"additional","affiliation":[]},{"given":"Mohammad Reza","family":"Aref","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04159-4_29"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31448-3_6"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-25937-4_17"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34931-7_17"},{"key":"3","first-page":"326","article-title":"The led block cipher","volume":"2011","author":"guo","year":"2011","journal-title":"Cryptographic Hardware and Embedded Systems-CHES"},{"key":"2","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/978-3-540-74619-5_12","article-title":"The 128-bit blockcipher clefia","author":"shirai","year":"2007","journal-title":"Fast Software Encryption"},{"key":"1","first-page":"33","article-title":"On bruteforce-like cryptanalysis: New meet-in-themiddle attacks in symmetric cryptanalysis","volume":"2012","author":"rechberger","year":"2013","journal-title":"Information Security and Cryptology - ICISC?99"},{"key":"10","first-page":"342","article-title":"Piccolo: An ultra-lightweight blockcipher","volume":"2011","author":"shibutani","year":"2011","journal-title":"Cryptographic Hardware and Embedded Systems-CHES"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1080\/00207160.2013.767445"},{"key":"6","article-title":"Biclique cryptanalysis of lightweight block ciphers present, piccolo and led","volume":"621","author":"jeong","year":"2012","journal-title":"IACR Cryptology ePrint Archive"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29101-2_23"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-013-0902-2"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-03515-4_21"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2344445"}],"event":{"name":"2014 11th International ISC Conference on Information Security and Cryptology (ISCISC)","start":{"date-parts":[[2014,9,3]]},"location":"Tehran, Iran","end":{"date-parts":[[2014,9,4]]}},"container-title":["2014 11th International ISC Conference on Information Security and Cryptology"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6975720\/6994006\/06994028.pdf?arnumber=6994028","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T02:54:39Z","timestamp":1498186479000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6994028\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/iscisc.2014.6994028","relation":{},"subject":[],"published":{"date-parts":[[2014,9]]}}}