{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T08:28:46Z","timestamp":1765268926524,"version":"3.37.3"},"reference-count":24,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundations of China","doi-asserted-by":"publisher","award":["62372463","62302518"],"award-info":[{"award-number":["62372463","62302518"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006407","name":"Natural Science Foundation of Henan Province","doi-asserted-by":"publisher","award":["222300420100"],"award-info":[{"award-number":["222300420100"]}],"id":[{"id":"10.13039\/501100006407","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/tifs.2024.3350374","type":"journal-article","created":{"date-parts":[[2024,1,5]],"date-time":"2024-01-05T19:30:45Z","timestamp":1704483045000},"page":"2385-2397","source":"Crossref","is-referenced-by-count":4,"title":["Congruent Differential Cluster for Binary SPN Ciphers"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8074-4581","authenticated-orcid":false,"given":"Ting","family":"Cui","sequence":"first","affiliation":[{"name":"Department of Applied Mathematics, PLA SSF Information Engineering University, Zhengzhou, China"}]},{"given":"Yiming","family":"Mao","sequence":"additional","affiliation":[{"name":"Department of Applied Mathematics, PLA SSF Information Engineering University, Zhengzhou, China"}]},{"given":"Yang","family":"Yang","sequence":"additional","affiliation":[{"name":"Department of Applied Mathematics, PLA SSF Information Engineering University, Zhengzhou, China"}]},{"given":"Yi","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of Applied Mathematics, PLA SSF Information Engineering University, Zhengzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8332-0047","authenticated-orcid":false,"given":"Jiyan","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of Applied Mathematics, PLA SSF Information Engineering University, Zhengzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4941-7133","authenticated-orcid":false,"given":"Chenhui","family":"Jin","sequence":"additional","affiliation":[{"name":"Department of Applied Mathematics, PLA SSF Information Engineering University, Zhengzhou, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-99277-4_9"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-27160-0_3"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/BF00630563"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4613-9314-6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48285-7_33"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/BF00204800"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/BF00190756"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1007\/978-3-662-60769-5_9","article-title":"The wide trail design strategy","volume-title":"The Design of Rijndael","author":"Daemen","year":"2020"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/11506447_5"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-10970-7_8"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-65277-7_15"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-92062-3_10"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53008-5_5"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48800-3_17"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.46586\/tosc.v2019.i1.5-45"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1002\/int.23078"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.46586\/tosc.v2019.i4.290-317"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46416-6_2"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49890-3_8"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-69710-1_15"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39200-9_3"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-43414-7_10"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.46586\/tosc.v2019.i3.1-42"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.46586\/tosc.v2021.i2.1-30"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/10319981\/10381785.pdf?arnumber=10381785","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,18]],"date-time":"2024-01-18T01:43:53Z","timestamp":1705542233000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10381785\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/tifs.2024.3350374","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"type":"print","value":"1556-6013"},{"type":"electronic","value":"1556-6021"}],"subject":[],"published":{"date-parts":[[2024]]}}}