{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T19:09:25Z","timestamp":1764184165734,"version":"3.46.0"},"reference-count":42,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2022YFB2701900"],"award-info":[{"award-number":["2022YFB2701900"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62472172"],"award-info":[{"award-number":["62472172"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["40500-20104-222609"],"award-info":[{"award-number":["40500-20104-222609"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"name":"JSPS KAKENHI","award":["JP24K20733"],"award-info":[{"award-number":["JP24K20733"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Inform. Theory"],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1109\/tit.2025.3623726","type":"journal-article","created":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T17:49:11Z","timestamp":1760982551000},"page":"9732-9752","source":"Crossref","is-referenced-by-count":0,"title":["Practical Key Collision on AES and Kiasu-BC"],"prefix":"10.1109","volume":"71","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8314-4402","authenticated-orcid":false,"given":"Jianqiang","family":"Ni","sequence":"first","affiliation":[{"name":"Shanghai Key Laboratory of Trustworthy Computing, Software Engineering Institute, East China Normal University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1184-755X","authenticated-orcid":false,"given":"Yingxin","family":"Li","sequence":"additional","affiliation":[{"name":"School of Cryptology, East China Normal University, Shanghai, China"}]},{"given":"Fukang","family":"Liu","sequence":"additional","affiliation":[{"name":"Institute of Science Tokyo, Tokyo, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2121-9306","authenticated-orcid":false,"given":"Gaoli","family":"Wang","sequence":"additional","affiliation":[{"name":"Shanghai Key Laboratory of Trustworthy Computing, Software Engineering Institute, East China Normal University, Shanghai, China"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1007\/3-540-68697-5_19"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1007\/978-3-642-03317-9_18"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1007\/978-3-642-03317-9_3"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1007\/978-3-319-13051-4_5"},{"key":"ref5","first-page":"3291","article-title":"How to abuse and fix authenticated encryption without key commitment","volume-title":"Proc. 31st USENIX Secur. Symp.","author":"Albertini"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.46586\/tosc.v2023.i4.420-451"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.46586\/tosc.v2024.i2.85-117"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.46586\/tosc.v2024.i1.135-157"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1007\/978-981-96-0941-3_9"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1007\/978-3-642-03317-9_16"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1007\/978-3-642-10366-7_8"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1007\/978-3-642-13858-4_21"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1007\/978-3-642-17373-8_3"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1007\/978-3-642-34047-5_7"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1007\/978-3-642-32009-5_42"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1007\/978-3-642-34047-5_23"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1007\/978-3-662-46706-0_26"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1007\/s00145-013-9150-0"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1007\/978-3-030-45724-2_9"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1007\/978-3-031-15802-5_4"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1007\/978-3-642-00862-7_11"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1007\/978-3-642-42045-0_26"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1007\/978-3-662-43414-7_27"},{"issue":"3","key":"ref24","doi-asserted-by":"crossref","first-page":"400","DOI":"10.46586\/tosc.v2025.i3.400-443","article-title":"Chosen-key distinguishing attacks on full AES-192, AES-256, Kiasu-BC, and more","volume":"2025","author":"Dong","year":"2025","journal-title":"IACR Trans. Symmetric Cryptol."},{"volume-title":"Code for Verifying Key Collision Pairs","year":"2025","author":"Ni","key":"ref25"},{"key":"ref26","first-page":"1508","article-title":"Key collisions on AES and its applications","volume":"2024","author":"Taiyama","year":"2024","journal-title":"IACR Cryptol. ePrint Arch."},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1007\/978-3-319-39555-5_27"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1007\/978-3-319-52153-4_12"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1007\/11832072_6"},{"volume-title":"TikZ for Cryptographers","year":"2016","author":"Jean","key":"ref30"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.17487\/rfc1321"},{"year":"2012","article-title":"Secure Hash Standard (SHS)","key":"ref32"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1007\/0-387-34805-0_21"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1007\/0-387-34805-0_39"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1007\/3-540-48329-2_31"},{"volume-title":"Handbook of Applied Cryptography","year":"1996","author":"Menezes","key":"ref36"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.46586\/tosc.v2021.i1.269-315"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.46586\/tosc.v2023.i1.111-151"},{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1007\/978-3-662-47989-6_5"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1007\/11564751_73"},{"year":"2014","author":"Jean","article-title":"Kiasu v1. additional first-round candidates of Caesar compeition","key":"ref41"},{"doi-asserted-by":"publisher","key":"ref42","DOI":"10.1007\/978-3-662-45608-8_15"}],"container-title":["IEEE Transactions on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/18\/11268978\/11208666.pdf?arnumber=11208666","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T19:03:43Z","timestamp":1764183823000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11208666\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12]]},"references-count":42,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/tit.2025.3623726","relation":{},"ISSN":["0018-9448","1557-9654"],"issn-type":[{"type":"print","value":"0018-9448"},{"type":"electronic","value":"1557-9654"}],"subject":[],"published":{"date-parts":[[2025,12]]}}}