{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:00:51Z","timestamp":1729634451620,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1109\/iscisc.2016.7736450","type":"proceedings-article","created":{"date-parts":[[2016,11,7]],"date-time":"2016-11-07T21:27:30Z","timestamp":1478554050000},"page":"46-51","source":"Crossref","is-referenced-by-count":1,"title":["Biclique cryptanalysis of Twine-128"],"prefix":"10.1109","author":[{"given":"Seyed Reza Hoseini","family":"Najarkolaei","sequence":"first","affiliation":[]},{"given":"Mohammad Zare","family":"Ahangarkolaei","sequence":"additional","affiliation":[]},{"given":"Siavash","family":"Ahmadi","sequence":"additional","affiliation":[]},{"given":"Mohammad Reza","family":"Aref","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"1401","DOI":"10.1002\/dac.2721","article-title":"Cryptanalysis of mCrypton-64","volume":"28","author":"mohsen","year":"2015","journal-title":"International Journal of Communication Systems"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"1641","DOI":"10.1109\/TIFS.2014.2344445","article-title":"Low-data complexity biclique cryptanalysis of block ciphers with application to piccolo and hight","volume":"9","author":"siavash","year":"2014","journal-title":"Information Forensics and Security IEEE Transactions on"},{"key":"ref12","article-title":"Biclique cryptanalysis of LBlock with modified key schedule","author":"siavash","year":"2015","journal-title":"Information Security and Cryptology (ISCISC) 2015 12th InternationalIranian Society of Cryptology Conference on"},{"key":"ref13","first-page":"370","article-title":"Improving the efficiency of impossible differential cryptanalysis of reduced Camellia and MISTY1","author":"jiqiang","year":"2008","journal-title":"Topics in Cryptology - CT-RSA 2008"},{"key":"ref4","article-title":"TWINE: A Lightweight Block Cipher for Multiple Platforms","author":"tomoyasu","year":"2012","journal-title":"Selected Areas in Cryptography"},{"key":"ref3","first-page":"326","article-title":"The LED block cipher","author":"jian","year":"2011","journal-title":"Cryptographic Hardware and Embedded Systems - CHES 2011"},{"key":"ref6","article-title":"Improved multidimensional zero-correlation linear cryptanalysis and applications to LBlock and TWINE","author":"yanfeng","year":"2014","journal-title":"Information Security and Privacy"},{"key":"ref5","first-page":"123","article-title":"Impossible differential attack on reduced-round TWINE","author":"xuexin","year":"2013","journal-title":"Information Security and Cryptology -- ICISC 2013"},{"key":"ref8","first-page":"344","article-title":"Biclique cryptanalysis of the full AES","author":"andrey","year":"2011","journal-title":"Advances in Cryptology - ASIACRYPT 2011"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1007\/978-3-642-35404-5_5","article-title":"Biclique cryptanalysis of TWINE","author":"\u00e7oban","year":"2012","journal-title":"Cryptology and Network Security"},{"key":"ref2","article-title":"LBlock: a lightweight block cipher","author":"wenling","year":"2011","journal-title":"Applied Cryptography and Network Security"},{"key":"ref1","first-page":"342","article-title":"Piccolo: an ultra-lightweight blockcipher","author":"kyoji","year":"2011","journal-title":"Cryptographic Hardware and Embedded Systems - CHES 2011"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1016\/j.csi.2015.02.002","article-title":"Non-isomorphic biclique cryptanalysis of full-round crypton","volume":"41","author":"mohsen","year":"2015","journal-title":"Computer Standards & Interfaces"}],"event":{"name":"2016 13th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC)","start":{"date-parts":[[2016,9,7]]},"location":"Tehran","end":{"date-parts":[[2016,9,8]]}},"container-title":["2016 13th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7604981\/7736436\/07736450.pdf?arnumber=7736450","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T03:01:52Z","timestamp":1498359712000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7736450\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/iscisc.2016.7736450","relation":{},"subject":[],"published":{"date-parts":[[2016,9]]}}}