{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T13:26:29Z","timestamp":1740144389630,"version":"3.37.3"},"reference-count":17,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"10","license":[{"start":{"date-parts":[[2014,10,1]],"date-time":"2014-10-01T00:00:00Z","timestamp":1412121600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100003968","name":"Iran National Science Foundation","doi-asserted-by":"publisher","award":["92\/32575"],"award-info":[{"award-number":["92\/32575"]}],"id":[{"id":"10.13039\/501100003968","id-type":"DOI","asserted-by":"publisher"}]},{"name":"INSF Cryptography Chair"},{"name":"Office of Vice-President for the Science and Technology, Iran"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1109\/tifs.2014.2344445","type":"journal-article","created":{"date-parts":[[2014,7,30]],"date-time":"2014-07-30T16:57:46Z","timestamp":1406739466000},"page":"1641-1652","source":"Crossref","is-referenced-by-count":15,"title":["Low-Data Complexity Biclique Cryptanalysis of Block Ciphers With Application to Piccolo and HIGHT"],"prefix":"10.1109","volume":"9","author":[{"given":"Siavash","family":"Ahmadi","sequence":"first","affiliation":[]},{"given":"Zahra","family":"Ahmadian","sequence":"additional","affiliation":[]},{"given":"Javad","family":"Mohajeri","sequence":"additional","affiliation":[]},{"given":"Mohammad Reza","family":"Aref","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2014.0160"},{"journal-title":"A Framework for Automated Biclique Cryptanalysis of Block Ciphers","year":"2013","author":"abed","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40041-4_13"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2012.2207880"},{"article-title":"Biclique cryptanalysis of full round AES with reduced data complexity","year":"2013","author":"chang","key":"ref14"},{"key":"ref15","article-title":"Better than brute-force&#x2014;Optimized hardware architecture for efficient biclique attacks on AES-128","author":"bogdanov","year":"2012","journal-title":"Proc 5th Workshop SHARCS"},{"key":"ref16","first-page":"342","article-title":"Piccolo: An ultra-lightweight blockcipher","volume":"6917","author":"shibutani","year":"2011","journal-title":"Cryptographic Hardware and Embedded Systems&#x2014;CHES"},{"key":"ref17","first-page":"46","article-title":"HIGHT: A new block cipher suitable for low-resource device","volume":"4249","author":"hong","year":"2006","journal-title":"Cryptographic Hardware and Embedded Systems&#x2014;CHES"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29101-2_23"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_24"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1080\/00207160.2013.767445"},{"key":"ref5","first-page":"621","article-title":"Biclique cryptanalysis of lightweight block ciphers PRESENT, Piccolo and LED","author":"jeong","year":"0"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-642-35416-8_1","article-title":"Security on LBlock against biclique cryptanalysis","volume":"7690","author":"wang","year":"2012","journal-title":"Information Security Applications"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31912-9_24"},{"key":"ref2","first-page":"344","article-title":"Biclique cryptanalysis of the full AES","volume":"7073","author":"bogdanov","year":"2011","journal-title":"Adv Cryptology"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34047-5_15"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2013.03.011"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/6891522\/06868260.pdf?arnumber=6868260","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:51:42Z","timestamp":1641988302000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6868260\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10]]},"references-count":17,"journal-issue":{"issue":"10"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2014.2344445","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"type":"print","value":"1556-6013"},{"type":"electronic","value":"1556-6021"}],"subject":[],"published":{"date-parts":[[2014,10]]}}}