{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T14:23:06Z","timestamp":1725718986620},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1109\/iscisc.2016.7736453","type":"proceedings-article","created":{"date-parts":[[2016,11,7]],"date-time":"2016-11-07T16:27:30Z","timestamp":1478536050000},"page":"66-71","source":"Crossref","is-referenced-by-count":3,"title":["Zero correlation linear attack on reduced round Piccolo-80"],"prefix":"10.1109","author":[{"given":"Mohammad Zare","family":"Ahangarkolaei","sequence":"first","affiliation":[]},{"given":"Seyed Reza Hoseini","family":"Najarkolaei","sequence":"additional","affiliation":[]},{"given":"Siavash","family":"Ahmadi","sequence":"additional","affiliation":[]},{"given":"Mohammad Reza","family":"Aref","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45661-9_9"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29101-2_23"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2344445"},{"key":"ref13","first-page":"621","article-title":"Biclique Cryptanalysis of Lightweight Block Ciphers PRESENT, Piccolo and LED","author":"jeong","year":"2012","journal-title":"IACR Cryptology EPrint Archive 2012"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1080\/00207160.2013.767445"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.E99.A.154"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-03515-4_21"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/11894063_4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23951-9_23"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-2694-0_23"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1080\/0161-110291890885"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-014-9976-y"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ISCISC.2014.6994028"},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-21554-4_19","article-title":"LBlock: a lightweight block cipher","author":"wu","year":"2011","journal-title":"Applied Cryptography and Network Security"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23951-9_22"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-012-9697-z"}],"event":{"name":"2016 13th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC)","start":{"date-parts":[[2016,9,7]]},"location":"Tehran","end":{"date-parts":[[2016,9,8]]}},"container-title":["2016 13th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7604981\/7736436\/07736453.pdf?arnumber=7736453","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T23:01:52Z","timestamp":1498345312000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7736453\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/iscisc.2016.7736453","relation":{},"subject":[],"published":{"date-parts":[[2016,9]]}}}