{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:52:11Z","timestamp":1762005131207,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":72,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,11]],"date-time":"2019-11-11T00:00:00Z","timestamp":1573430400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,11]]},"DOI":"10.1145\/3338500.3360335","type":"proceedings-article","created":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T19:43:22Z","timestamp":1573155802000},"page":"69-80","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Adapting Rigidity to Symmetric Cryptography"],"prefix":"10.1145","author":[{"given":"Orr","family":"Dunkelman","sequence":"first","affiliation":[{"name":"University of Haifa, Haifa, Israel"}]},{"given":"L\u00e9o","family":"Perrin","sequence":"additional","affiliation":[{"name":"Inria, Paris, France"}]}],"member":"320","published-online":{"date-parts":[[2019,11,11]]},"reference":[{"volume-title":"Advanced Encryption Standard (AES)","author":"AES","key":"e_1_3_2_1_1_1","unstructured":"AES 2001. Advanced Encryption Standard (AES) . National Institute of Standardsand Technology (NIST), FIPS PUB 197, U.S. Department of Commerce . AES 2001. Advanced Encryption Standard (AES). National Institute of Standardsand Technology (NIST), FIPS PUB 197, U.S. Department of Commerce."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13051-4_1"},{"key":"e_1_3_2_1_3_1","volume-title":"Youssef","author":"AlTawy Riham","year":"2014","unstructured":"Riham AlTawy and Amr M . Youssef . 2014 . Watch your Constants : Malicious Streebog. Cryptology ePrint Archive, Report 2014\/879. http:\/\/eprint.iacr.org\/2014\/879. Riham AlTawy and Amr M. Youssef. 2014. Watch your Constants: Malicious Streebog. Cryptology ePrint Archive, Report 2014\/879. http:\/\/eprint.iacr.org\/2014\/879."},{"key":"e_1_3_2_1_4_1","volume-title":"Simon: NSA-designed Cipher in the Post-snowden World. Talk at the Technion's CRYPTODAY.","author":"Ashur Tomer","year":"2015","unstructured":"Tomer Ashur . 2015 . Simon: NSA-designed Cipher in the Post-snowden World. Talk at the Technion's CRYPTODAY. Tomer Ashur. 2015. Simon: NSA-designed Cipher in the Post-snowden World. Talk at the Technion's CRYPTODAY."},{"key":"e_1_3_2_1_5_1","volume-title":"Notes on \"Notes on the design and analysis of SIMON and SPECK\" and an Analysis of it. Rump Session Presentation at EUROCRYPT","author":"Ashur Tomer","year":"2017","unstructured":"Tomer Ashur . 2017. Notes on \"Notes on the design and analysis of SIMON and SPECK\" and an Analysis of it. Rump Session Presentation at EUROCRYPT 2017 . Tomer Ashur. 2017. Notes on \"Notes on the design and analysis of SIMON and SPECK\" and an Analysis of it. Rump Session Presentation at EUROCRYPT 2017."},{"key":"e_1_3_2_1_6_1","unstructured":"Thomas Baign\u00e8res C\u00e9cile Delerabl\u00e9e Matthieu Finiasz Louis Goubin Tancr\u00e8de Lepoint and Matthieu Rivain. 2016. Trap Me If You Can. https:\/\/cryptoexperts.github.io\/million-dollar-curve\/specifications\/2016-02-01_trap-me-if-you-can.pdf  Thomas Baign\u00e8res C\u00e9cile Delerabl\u00e9e Matthieu Finiasz Louis Goubin Tancr\u00e8de Lepoint and Matthieu Rivain. 2016. Trap Me If You Can. https:\/\/cryptoexperts.github.io\/million-dollar-curve\/specifications\/2016-02-01_trap-me-if-you-can.pdf"},{"key":"e_1_3_2_1_10_1","unstructured":"Daniel Bernstein. 2013. SafeCurves: choosing safe curves for elliptic-curve cryptography. https:\/\/safecurves.cr.yp.to\/rigid.html  Daniel Bernstein. 2013. SafeCurves: choosing safe curves for elliptic-curve cryptography. https:\/\/safecurves.cr.yp.to\/rigid.html"},{"key":"e_1_3_2_1_11_1","volume-title":"Workshop Record of SASC","volume":"8","author":"Bernstein Daniel J","year":"2008","unstructured":"Daniel J Bernstein . 2008 . ChaCha, a variant of Salsa20 . In Workshop Record of SASC , Vol. 8 . 3--5. Daniel J Bernstein. 2008. ChaCha, a variant of Salsa20. In Workshop Record of SASC, Vol. 8. 3--5."},{"volume-title":"Advances in Cryptology -- EUROCRYPT 2013 (Lecture Notes in Computer Science), Thomas Johansson and Phong Q","author":"Bertoni Guido","key":"e_1_3_2_1_12_1","unstructured":"Guido Bertoni , Joan Daemen , Michael Peeters , and Gilles Van Assche . 2013. Keccak . In Advances in Cryptology -- EUROCRYPT 2013 (Lecture Notes in Computer Science), Thomas Johansson and Phong Q . Nguyen (Eds.), Vol. 7881 . Springer , Heidelberg , 313--314. https:\/\/doi.org\/10.1007\/978-3-642-38348-9_19 10.1007\/978-3-642-38348-9_19 Guido Bertoni, Joan Daemen, Michael Peeters, and Gilles Van Assche. 2013. Keccak. In Advances in Cryptology -- EUROCRYPT 2013 (Lecture Notes in Computer Science), Thomas Johansson and Phong Q. Nguyen (Eds.), Vol. 7881. Springer, Heidelberg, 313--314. https:\/\/doi.org\/10.1007\/978-3-642-38348-9_19"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978423"},{"key":"e_1_3_2_1_14_1","volume-title":"Knudsen","author":"Biham Eli","year":"1998","unstructured":"Eli Biham , Ross J. Anderson , and Lars R . Knudsen . 1998 . Serpent : A New Block Cipher Proposal. In Fast Software Encryption -- FSE'98 (Lecture Notes in Computer Science),, Serge Vaudenay (Ed.), Vol. 1372 . Springer , Heidelberg, 222--238. https:\/\/doi.org\/10.1007\/3--540--69710--1_15 10.1007\/3--540--69710--1_15 Eli Biham, Ross J. Anderson, and Lars R. Knudsen. 1998. Serpent: A New Block Cipher Proposal. In Fast Software Encryption -- FSE'98 (Lecture Notes in Computer Science),, Serge Vaudenay (Ed.), Vol. 1372. Springer, Heidelberg, 222--238. https:\/\/doi.org\/10.1007\/3--540--69710--1_15"},{"volume-title":"Advances in Cryptology -- CRYPTO'90 (Lecture Notes in Computer Science),, Alfred J","author":"Biham Eli","key":"e_1_3_2_1_15_1","unstructured":"Eli Biham and Adi Shamir . 1991. Differential Cryptanalysis of DES-like Cryptosystems . In Advances in Cryptology -- CRYPTO'90 (Lecture Notes in Computer Science),, Alfred J . Menezes and Scott A. Vanstone (Eds.), Vol. 537 . Springer , Heidelberg , 2--21. https:\/\/doi.org\/10.1007\/3-540-38424-3_1 10.1007\/3-540-38424-3_1 Eli Biham and Adi Shamir. 1991. Differential Cryptanalysis of DES-like Cryptosystems. In Advances in Cryptology -- CRYPTO'90 (Lecture Notes in Computer Science),, Alfred J. Menezes and Scott A. Vanstone (Eds.), Vol. 537. Springer, Heidelberg, 2--21. https:\/\/doi.org\/10.1007\/3-540-38424-3_1"},{"key":"e_1_3_2_1_16_1","volume-title":"Advances in Cryptology -- CRYPTO","author":"Biryukov Alex","year":"2015","unstructured":"Alex Biryukov and L\u00e9o Perrin . 2015. On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure . In Advances in Cryptology -- CRYPTO 2015 , Part I (Lecture Notes in Computer Science), Rosario Gennaro and Matthew J. B. Robshaw (Eds.), Vol. 9215 . Springer , Heidelberg, 116--140. https:\/\/doi.org\/10.1007\/978-3-662-47989-6_6 10.1007\/978-3-662-47989-6_6 Alex Biryukov and L\u00e9o Perrin. 2015. On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure. In Advances in Cryptology -- CRYPTO 2015, Part I (Lecture Notes in Computer Science), Rosario Gennaro and Matthew J. B. Robshaw (Eds.), Vol. 9215. Springer, Heidelberg, 116--140. https:\/\/doi.org\/10.1007\/978-3-662-47989-6_6"},{"key":"e_1_3_2_1_17_1","volume-title":"Advances in Cryptology -- EUROCRYPT","author":"Biryukov Alex","year":"2016","unstructured":"Alex Biryukov , L\u00e9o Perrin , and Aleksei Udovenko . 2016. Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1 . In Advances in Cryptology -- EUROCRYPT 2016 , Part I (Lecture Notes in Computer Science), Marc Fischlin and Jean-S\u00e9 bastien Coron (Eds.), Vol. 9665 . Springer , Heidelberg, 372--402. https:\/\/doi.org\/10.1007\/978-3-662-49890-3_15 10.1007\/978-3-662-49890-3_15 Alex Biryukov, L\u00e9o Perrin, and Aleksei Udovenko. 2016. Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1. In Advances in Cryptology -- EUROCRYPT 2016, Part I (Lecture Notes in Computer Science), Marc Fischlin and Jean-S\u00e9 bastien Coron (Eds.), Vol. 9665. Springer, Heidelberg, 372--402. https:\/\/doi.org\/10.1007\/978-3-662-49890-3_15"},{"key":"e_1_3_2_1_18_1","volume-title":"PRESENT: An Ultra-Lightweight Block Cipher. In Cryptographic Hardware and Embedded Systems -- CHES 2007 (Lecture Notes in Computer Science),","author":"Bogdanov Andrey","year":"2007","unstructured":"Andrey Bogdanov , Lars R. Knudsen , Gregor Leander , Christof Paar , Axel Poschmann , Matthew J. B. Robshaw , Yannick Seurin , and C. Vikkelsoe . 2007 . PRESENT: An Ultra-Lightweight Block Cipher. In Cryptographic Hardware and Embedded Systems -- CHES 2007 (Lecture Notes in Computer Science), , Pascal Paillier and Ingrid Verbauwhede (Eds.), Vol. 4727 . Springer , Heidelberg , 450--466. https:\/\/doi.org\/10.1007\/978-3-540-74735--2_31 10.1007\/978-3-540-74735--2_31 Andrey Bogdanov, Lars R. Knudsen, Gregor Leander, Christof Paar, Axel Poschmann, Matthew J. B. Robshaw, Yannick Seurin, and C. Vikkelsoe. 2007. PRESENT: An Ultra-Lightweight Block Cipher. In Cryptographic Hardware and Embedded Systems -- CHES 2007 (Lecture Notes in Computer Science),, Pascal Paillier and Ingrid Verbauwhede (Eds.), Vol. 4727. Springer, Heidelberg, 450--466. https:\/\/doi.org\/10.1007\/978-3-540-74735--2_31"},{"volume-title":"Fast Software Encryption -- FSE 2012 (Lecture Notes in Computer Science),","author":"Bogdanov Andrey","key":"e_1_3_2_1_19_1","unstructured":"Andrey Bogdanov and Meiqin Wang . 2012. Zero Correlation Linear Cryptanalysis with Reduced Data Complexity . In Fast Software Encryption -- FSE 2012 (Lecture Notes in Computer Science), , Anne Canteaut (Ed.), Vol. 7549 . Springer , Heidelberg , 29--48. https:\/\/doi.org\/10.1007\/978-3-642-34047-5_3 10.1007\/978-3-642-34047-5_3 Andrey Bogdanov and Meiqin Wang. 2012. Zero Correlation Linear Cryptanalysis with Reduced Data Complexity. In Fast Software Encryption -- FSE 2012 (Lecture Notes in Computer Science),, Anne Canteaut (Ed.), Vol. 7549. Springer, Heidelberg, 29--48. https:\/\/doi.org\/10.1007\/978-3-642-34047-5_3"},{"volume-title":"Fast Software Encryption -- FSE 2011 (Lecture Notes in Computer Science),","author":"Boura Christina","key":"e_1_3_2_1_21_1","unstructured":"Christina Boura , Anne Canteaut , and Christophe De Canni\u00e8re . 2011. Higher-Order Differential Properties of Keccak and Luffa . In Fast Software Encryption -- FSE 2011 (Lecture Notes in Computer Science), , Antoine Joux (Ed.), Vol. 6733 . Springer , Heidelberg , 252--269. https:\/\/doi.org\/10.1007\/978-3-642-21702-9_15 10.1007\/978-3-642-21702-9_15 Christina Boura, Anne Canteaut, and Christophe De Canni\u00e8re. 2011. Higher-Order Differential Properties of Keccak and Luffa. In Fast Software Encryption -- FSE 2011 (Lecture Notes in Computer Science),, Antoine Joux (Ed.), Vol. 6733. Springer, Heidelberg, 252--269. https:\/\/doi.org\/10.1007\/978-3-642-21702-9_15"},{"volume-title":"Advances in Cryptology -- CRYPTO'85 (Lecture Notes in Computer Science),, Hugh C","author":"Chaum David","key":"e_1_3_2_1_22_1","unstructured":"David Chaum and Jan-Hendrik Evertse . 1986. Crytanalysis of DES with a Reduced Number of Rounds: Sequences of Linear Factors in Block Ciphers . In Advances in Cryptology -- CRYPTO'85 (Lecture Notes in Computer Science),, Hugh C . Williams (Ed.), Vol. 218 . Springer , Heidelberg , 192--211. https:\/\/doi.org\/10.1007\/3-540-39799-X_16 10.1007\/3-540-39799-X_16 David Chaum and Jan-Hendrik Evertse. 1986. Crytanalysis of DES with a Reduced Number of Rounds: Sequences of Linear Factors in Block Ciphers. In Advances in Cryptology -- CRYPTO'85 (Lecture Notes in Computer Science),, Hugh C. Williams (Ed.), Vol. 218. Springer, Heidelberg, 192--211. https:\/\/doi.org\/10.1007\/3-540-39799-X_16"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978395"},{"volume-title":"USENIX Security 2014: 23rd USENIX Security Symposium","author":"Checkoway Stephen","key":"e_1_3_2_1_25_1","unstructured":"Stephen Checkoway , Ruben Niederhagen , Adam Everspaugh , Matthew Green , Tanja Lange , Thomas Ristenpart , Daniel J. Bernstein , Jake Maskiewicz , Hovav Shacham , and Matthew Fredrikson . 2014. On the Practical Exploitability of Dual EC in TLS Implementations . In USENIX Security 2014: 23rd USENIX Security Symposium , Kevin Fu and Jaeyeon Jung (Eds.). USENIX Association , 319--335. Stephen Checkoway, Ruben Niederhagen, Adam Everspaugh, Matthew Green, Tanja Lange, Thomas Ristenpart, Daniel J. Bernstein, Jake Maskiewicz, Hovav Shacham, and Matthew Fredrikson. 2014. On the Practical Exploitability of Dual EC in TLS Implementations. In USENIX Security 2014: 23rd USENIX Security Symposium, Kevin Fu and Jaeyeon Jung (Eds.). USENIX Association, 319--335."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-018-0516-z"},{"key":"e_1_3_2_1_27_1","volume-title":"The Data Encryption Standard (DES) and its strength against attacks. IBM journal of research and development","author":"Coppersmith Don","year":"1994","unstructured":"Don Coppersmith . 1994. The Data Encryption Standard (DES) and its strength against attacks. IBM journal of research and development , Vol. 38 , 3 ( 1994 ), 243--250. Don Coppersmith. 1994. The Data Encryption Standard (DES) and its strength against attacks. IBM journal of research and development, Vol. 38, 3 (1994), 243--250."},{"volume-title":"Fast Software Encryption -- FSE'97 (Lecture Notes in Computer Science),","author":"Daemen Joan","key":"e_1_3_2_1_28_1","unstructured":"Joan Daemen , Lars R. Knudsen , and Vincent Rijmen . 1997. The Block Cipher Square . In Fast Software Encryption -- FSE'97 (Lecture Notes in Computer Science), , Eli Biham (Ed.), Vol. 1267 . Springer , Heidelberg , 149--165. https:\/\/doi.org\/10.1007\/BFb0052343 10.1007\/BFb0052343 Joan Daemen, Lars R. Knudsen, and Vincent Rijmen. 1997. The Block Cipher Square. In Fast Software Encryption -- FSE'97 (Lecture Notes in Computer Science),, Eli Biham (Ed.), Vol. 1267. Springer, Heidelberg, 149--165. https:\/\/doi.org\/10.1007\/BFb0052343"},{"key":"e_1_3_2_1_29_1","volume-title":"ISC 2006: 9th International Conference on Information Security (Lecture Notes in Computer Science),, Sokratis K. Katsikas, Javier Lopez, Michael Backes, Stefanos Gritzalis, and Bart Preneel (Eds.)","volume":"4176","author":"Canni\u00e8re Christophe De","year":"2006","unstructured":"Christophe De Canni\u00e8re . 2006 . Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles . In ISC 2006: 9th International Conference on Information Security (Lecture Notes in Computer Science),, Sokratis K. Katsikas, Javier Lopez, Michael Backes, Stefanos Gritzalis, and Bart Preneel (Eds.) , Vol. 4176 . Springer, Heidelberg, 171--186. Christophe De Canni\u00e8re. 2006. Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles. In ISC 2006: 9th International Conference on Information Security (Lecture Notes in Computer Science),, Sokratis K. Katsikas, Javier Lopez, Michael Backes, Stefanos Gritzalis, and Bart Preneel (Eds.), Vol. 4176. Springer, Heidelberg, 171--186."},{"volume-title":"Cryptographic Hardware and Embedded Systems -- CHES 2009 (Lecture Notes in Computer Science),","author":"Canni\u00e8re Christophe De","key":"e_1_3_2_1_30_1","unstructured":"Christophe De Canni\u00e8re , Orr Dunkelman , and Miroslav Knevz evi\u0107. 2009. KATAN and KTANTAN - A Family of Small and Efficient Hardware-Oriented Block Ciphers . In Cryptographic Hardware and Embedded Systems -- CHES 2009 (Lecture Notes in Computer Science), , Christophe Clavier and Kris Gaj (Eds.), Vol. 5747 . Springer , Heidelberg , 272--288. https:\/\/doi.org\/10.1007\/978-3-642-04138-9_20 10.1007\/978-3-642-04138-9_20 Christophe De Canni\u00e8re, Orr Dunkelman, and Miroslav Knevz evi\u0107. 2009. KATAN and KTANTAN - A Family of Small and Efficient Hardware-Oriented Block Ciphers. In Cryptographic Hardware and Embedded Systems -- CHES 2009 (Lecture Notes in Computer Science),, Christophe Clavier and Kris Gaj (Eds.), Vol. 5747. Springer, Heidelberg, 272--288. https:\/\/doi.org\/10.1007\/978-3-642-04138-9_20"},{"volume-title":"Data Encryption Standard","key":"e_1_3_2_1_31_1","unstructured":"DES77 1977. Data Encryption Standard . National Bureau of Standards, NBS FIPSPUB 46, U.S. Department of Commerce DES77 1977. Data Encryption Standard. National Bureau of Standards, NBS FIPSPUB 46, U.S. Department of Commerce"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/C-M.1977.217750"},{"key":"e_1_3_2_1_34_1","volume-title":"Advances in Cryptology -- ASIACRYPT","author":"Dinu Daniel","year":"2016","unstructured":"Daniel Dinu , L\u00e9o Perrin , Aleksei Udovenko , Vesselin Velichkov , Johann Gro\u00dfsch\u0120dl , and Alex Biryukov . 2016. Design Strategies for ARX with Provable Bounds: Sparx and LAX . In Advances in Cryptology -- ASIACRYPT 2016 , Part I (Lecture Notes in Computer Science), Jung Hee Cheon and Tsuyoshi Takagi (Eds.), Vol. 10031 . Springer , Heidelberg, 484--513. https:\/\/doi.org\/10.1007\/978-3-662-53887-6_18 10.1007\/978-3-662-53887-6_18 Daniel Dinu, L\u00e9o Perrin, Aleksei Udovenko, Vesselin Velichkov, Johann Gro\u00dfsch\u0120dl, and Alex Biryukov. 2016. Design Strategies for ARX with Provable Bounds: Sparx and LAX. In Advances in Cryptology -- ASIACRYPT 2016, Part I (Lecture Notes in Computer Science), Jung Hee Cheon and Tsuyoshi Takagi (Eds.), Vol. 10031. Springer, Heidelberg, 484--513. https:\/\/doi.org\/10.1007\/978-3-662-53887-6_18"},{"key":"e_1_3_2_1_36_1","unstructured":"Federal Agency on Technical Regulation and Metrology. 2012. Information Technology -- Data Security: Hash function. English version available at http:\/\/wwwold.tc26.ru\/en\/standard\/gost\/GOST_R_34_11-2012_eng.pdf.  Federal Agency on Technical Regulation and Metrology. 2012. Information Technology -- Data Security: Hash function. English version available at http:\/\/wwwold.tc26.ru\/en\/standard\/gost\/GOST_R_34_11-2012_eng.pdf."},{"key":"e_1_3_2_1_37_1","unstructured":"Federal Agency on Technical Regulation and Metrology. 2015. Information Technology -- Data Security: Block ciphers. English version available at http:\/\/wwwold.tc26.ru\/en\/standard\/gost\/GOST_R_34_12_2015_ENG.pdf.  Federal Agency on Technical Regulation and Metrology. 2015. Information Technology -- Data Security: Block ciphers. English version available at http:\/\/wwwold.tc26.ru\/en\/standard\/gost\/GOST_R_34_12_2015_ENG.pdf."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican0573-15"},{"key":"e_1_3_2_1_39_1","volume-title":"Backdoored Hash Functions: Immunizing HMAC and HKDF. In 31st IEEE Computer Security Foundations Symposium, CSF 2018","author":"Fischlin Marc","year":"2018","unstructured":"Marc Fischlin , Christian Janson , and Sogol Mazaheri . 2018 . Backdoored Hash Functions: Immunizing HMAC and HKDF. In 31st IEEE Computer Security Foundations Symposium, CSF 2018 , Oxford, United Kingdom , July 9-12, 2018. IEEE Computer Society, 105--118. https:\/\/doi.org\/10.1109\/CSF.2018.00015 10.1109\/CSF.2018.00015 Marc Fischlin, Christian Janson, and Sogol Mazaheri. 2018. Backdoored Hash Functions: Immunizing HMAC and HKDF. In 31st IEEE Computer Security Foundations Symposium, CSF 2018, Oxford, United Kingdom, July 9-12, 2018. IEEE Computer Society, 105--118. https:\/\/doi.org\/10.1109\/CSF.2018.00015"},{"key":"e_1_3_2_1_40_1","volume-title":"The (Real-Time) Cryptanalysis of A5\/2. Rump Session Presentation at CRYPTO","author":"Goldberg Ian","year":"1999","unstructured":"Ian Goldberg , David Wagner , and Lucky Green . 1999. The (Real-Time) Cryptanalysis of A5\/2. Rump Session Presentation at CRYPTO 1999 . Ian Goldberg, David Wagner, and Lucky Green. 1999. The (Real-Time) Cryptanalysis of A5\/2. Rump Session Presentation at CRYPTO 1999."},{"key":"e_1_3_2_1_41_1","volume-title":"Massey","author":"Harpes Carlo","year":"1997","unstructured":"Carlo Harpes and James L . Massey . 1997 . Partitioning Cryptanalysis. In Fast Software Encryption -- FSE'97 (Lecture Notes in Computer Science),, Eli Biham (Ed.), Vol. 1267 . Springer , Heidelberg, 13--27. https:\/\/doi.org\/10.1007\/BFb0052331 10.1007\/BFb0052331 Carlo Harpes and James L. Massey. 1997. Partitioning Cryptanalysis. In Fast Software Encryption -- FSE'97 (Lecture Notes in Computer Science),, Eli Biham (Ed.), Vol. 1267. Springer, Heidelberg, 13--27. https:\/\/doi.org\/10.1007\/BFb0052331"},{"key":"e_1_3_2_1_42_1","unstructured":"M. Hellman R. Merkle R. Schroeppel L. Washington W. Diffie S. Pohlig and P. Schweitzer. 1976. Results of an Initial Attempt to Cryptanalyze the NBS Data Encryption Standard. Technical Report. Stanford University Information Systems Laboratory. Available at https:\/\/ee.stanford.edu\/ hellman\/resources\/1976_sel_des_report.pdf.  M. Hellman R. Merkle R. Schroeppel L. Washington W. Diffie S. Pohlig and P. Schweitzer. 1976. Results of an Initial Attempt to Cryptanalyze the NBS Data Encryption Standard. Technical Report. Stanford University Information Systems Laboratory. Available at https:\/\/ee.stanford.edu\/ hellman\/resources\/1976_sel_des_report.pdf."},{"key":"e_1_3_2_1_43_1","volume-title":"Joo Yeon Cho, and Kaisa Nyberg","author":"Hermelin Miia","year":"2008","unstructured":"Miia Hermelin , Joo Yeon Cho, and Kaisa Nyberg . 2008 . Multidimensional Linear Cryptanalysis of Reduced Round Serpent. In ACISP 08: 13th Australasian Conference on Information Security and Privacy (Lecture Notes in Computer Science),, Yi Mu, Willy Susilo, and Jennifer Seberry (Eds.), Vol. 5107 . Springer , Heidelberg, 203--215. Miia Hermelin, Joo Yeon Cho, and Kaisa Nyberg. 2008. Multidimensional Linear Cryptanalysis of Reduced Round Serpent. In ACISP 08: 13th Australasian Conference on Information Security and Privacy (Lecture Notes in Computer Science),, Yi Mu, Willy Susilo, and Jennifer Seberry (Eds.), Vol. 5107. Springer, Heidelberg, 203--215."},{"volume-title":"Fast Software Encryption -- FSE'94 (Lecture Notes in Computer Science),","author":"Knudsen Lars R.","key":"e_1_3_2_1_44_1","unstructured":"Lars R. Knudsen . 1995. Truncated and Higher Order Differentials . In Fast Software Encryption -- FSE'94 (Lecture Notes in Computer Science), , Bart Preneel (Ed.), Vol. 1008 . Springer , Heidelberg , 196--211. https:\/\/doi.org\/10.1007\/3-540-60590-8_16 10.1007\/3-540-60590-8_16 Lars R. Knudsen. 1995. Truncated and Higher Order Differentials. In Fast Software Encryption -- FSE'94 (Lecture Notes in Computer Science),, Bart Preneel (Ed.), Vol. 1008. Springer, Heidelberg, 196--211. https:\/\/doi.org\/10.1007\/3-540-60590-8_16"},{"key":"e_1_3_2_1_45_1","volume-title":"Knudsen and H\u00e5vard Raddum","author":"Lars","year":"2001","unstructured":"Lars R. Knudsen and H\u00e5vard Raddum . 2001 . On Noekeon . https:\/\/citeseerx.ist.psu.edu\/viewdoc\/summary?doi=10.1.1.20.6349 Lars R. Knudsen and H\u00e5vard Raddum. 2001. On Noekeon. https:\/\/citeseerx.ist.psu.edu\/viewdoc\/summary?doi=10.1.1.20.6349"},{"key":"e_1_3_2_1_46_1","volume-title":"Knudsen and David Wagner","author":"Lars","year":"2002","unstructured":"Lars R. Knudsen and David Wagner . 2002 . Integral Cryptanalysis. In Fast Software Encryption -- FSE 2002 (Lecture Notes in Computer Science),, Joan Daemen and Vincent Rijmen (Eds.), Vol. 2365 . Springer , Heidelberg, 112--127. https:\/\/doi.org\/10.1007\/3-540-45661-9_9 10.1007\/3-540-45661-9_9 Lars R. Knudsen and David Wagner. 2002. Integral Cryptanalysis. In Fast Software Encryption -- FSE 2002 (Lecture Notes in Computer Science),, Joan Daemen and Vincent Rijmen (Eds.), Vol. 2365. Springer, Heidelberg, 112--127. https:\/\/doi.org\/10.1007\/3-540-45661-9_9"},{"key":"e_1_3_2_1_47_1","volume-title":"HMAC: Keyed-Hashing for Message Authentication. RFC 2104","author":"Krawczyk Hugo","year":"1997","unstructured":"Hugo Krawczyk , Mihir Bellare , and Ran Canetti . 1997 . HMAC: Keyed-Hashing for Message Authentication. RFC 2104 . RFC Editor. http:\/\/www.rfc-editor.org\/rfc\/rfc2104.txt http:\/\/www.rfc-editor.org\/rfc\/rfc2104.txt. Hugo Krawczyk, Mihir Bellare, and Ran Canetti. 1997. HMAC: Keyed-Hashing for Message Authentication. RFC 2104. RFC Editor. http:\/\/www.rfc-editor.org\/rfc\/rfc2104.txt http:\/\/www.rfc-editor.org\/rfc\/rfc2104.txt."},{"key":"e_1_3_2_1_48_1","volume-title":"Massey","author":"Lai Xuejia","year":"1991","unstructured":"Xuejia Lai and James L . Massey . 1991 . A Proposal for a New Block Encryption Standard. In Advances in Cryptology -- EUROCRYPT'90 (Lecture Notes in Computer Science),, Ivan Damg\u00e5rd (Ed.), Vol. 473 . Springer , Heidelberg, 389--404. https:\/\/doi.org\/10.1007\/3-540-46877--3_35 10.1007\/3-540-46877--3_35 Xuejia Lai and James L. Massey. 1991. A Proposal for a New Block Encryption Standard. In Advances in Cryptology -- EUROCRYPT'90 (Lecture Notes in Computer Science),, Ivan Damg\u00e5rd (Ed.), Vol. 473. Springer, Heidelberg, 389--404. https:\/\/doi.org\/10.1007\/3-540-46877--3_35"},{"key":"e_1_3_2_1_49_1","volume-title":"Hellman","author":"Langford Susan K.","year":"1994","unstructured":"Susan K. Langford and Martin E . Hellman . 1994 . Differential-Linear Cryptanalysis. In Advances in Cryptology -- CRYPTO'94 (Lecture Notes in Computer Science),, Yvo Desmedt (Ed.), Vol. 839 . Springer , Heidelberg, 17--25. https:\/\/doi.org\/10.1007\/3-540-48658-5_3 10.1007\/3-540-48658-5_3 Susan K. Langford and Martin E. Hellman. 1994. Differential-Linear Cryptanalysis. In Advances in Cryptology -- CRYPTO'94 (Lecture Notes in Computer Science),, Yvo Desmedt (Ed.), Vol. 839. Springer, Heidelberg, 17--25. https:\/\/doi.org\/10.1007\/3-540-48658-5_3"},{"key":"e_1_3_2_1_50_1","volume-title":"Hoda AlKhzaimi, and Erik Zenner.","author":"Leander Gregor","year":"2011","unstructured":"Gregor Leander , Mohamed Ahmed Abdelraheem , Hoda AlKhzaimi, and Erik Zenner. 2011 . A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack. In Advances in Cryptology -- CRYPTO 2011 (Lecture Notes in Computer Science),, Phillip Rogaway (Ed.), Vol. 6841 . Springer , Heidelberg, 206--221. https:\/\/doi.org\/10.1007\/978-3-642-22792-9_12 10.1007\/978-3-642-22792-9_12 Gregor Leander, Mohamed Ahmed Abdelraheem, Hoda AlKhzaimi, and Erik Zenner. 2011. A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack. In Advances in Cryptology -- CRYPTO 2011 (Lecture Notes in Computer Science),, Phillip Rogaway (Ed.), Vol. 6841. Springer, Heidelberg, 206--221. https:\/\/doi.org\/10.1007\/978-3-642-22792-9_12"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73458-1_13"},{"volume-title":"Fast Software Encryption -- FSE 2001 (Lecture Notes in Computer Science),","author":"Lucks Stefan","key":"e_1_3_2_1_52_1","unstructured":"Stefan Lucks . 2002. The Saturation Attack - A Bait for Twofish . In Fast Software Encryption -- FSE 2001 (Lecture Notes in Computer Science), , Mitsuru Matsui (Ed.), Vol. 2355 . Springer , Heidelberg , 1--15. https:\/\/doi.org\/10.1007\/3-540-45473-X_1 10.1007\/3-540-45473-X_1 Stefan Lucks. 2002. The Saturation Attack - A Bait for Twofish. In Fast Software Encryption -- FSE 2001 (Lecture Notes in Computer Science),, Mitsuru Matsui (Ed.), Vol. 2355. Springer, Heidelberg, 1--15. https:\/\/doi.org\/10.1007\/3-540-45473-X_1"},{"volume-title":"Advances in Cryptology -- EUROCRYPT'93 (Lecture Notes in Computer Science),","author":"Matsui Mitsuru","key":"e_1_3_2_1_53_1","unstructured":"Mitsuru Matsui . 1994. Linear Cryptanalysis Method for DES Cipher . In Advances in Cryptology -- EUROCRYPT'93 (Lecture Notes in Computer Science), , Tor Helleseth (Ed.), Vol. 765 . Springer , Heidelberg , 386--397. https:\/\/doi.org\/10.1007\/3-540-48285-7_33 10.1007\/3-540-48285-7_33 Mitsuru Matsui. 1994. Linear Cryptanalysis Method for DES Cipher. In Advances in Cryptology -- EUROCRYPT'93 (Lecture Notes in Computer Science),, Tor Helleseth (Ed.), Vol. 765. Springer, Heidelberg, 386--397. https:\/\/doi.org\/10.1007\/3-540-48285-7_33"},{"key":"e_1_3_2_1_55_1","unstructured":"National Institute of Standards and Technology. 1995. FIPS 180--1: Secure Hash Standard.  National Institute of Standards and Technology. 1995. FIPS 180--1: Secure Hash Standard."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00204800"},{"volume-title":"Fast Software Encryption -- FSE'99 (Lecture Notes in Computer Science), Lars R","author":"Paterson Kenneth G.","key":"e_1_3_2_1_57_1","unstructured":"Kenneth G. Paterson . 1999. Imprimitive Permutation Groups and Trapdoors in Iterated Block Ciphers . In Fast Software Encryption -- FSE'99 (Lecture Notes in Computer Science), Lars R . Knudsen (Ed.), Vol. 1636 . Springer , Heidelberg , 201--214. https:\/\/doi.org\/10.1007\/3-540-48519-8_15 10.1007\/3-540-48519-8_15 Kenneth G. Paterson. 1999. Imprimitive Permutation Groups and Trapdoors in Iterated Block Ciphers. In Fast Software Encryption -- FSE'99 (Lecture Notes in Computer Science), Lars R. Knudsen (Ed.), Vol. 1636. Springer, Heidelberg, 201--214. https:\/\/doi.org\/10.1007\/3-540-48519-8_15"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.46586\/tosc.v2019.i1.302-329"},{"key":"e_1_3_2_1_60_1","first-page":"99","article-title":"Exponential S-Boxes: a Link Between the S-Boxes of BelT and Kuznyechik\/Streebog","volume":"2016","author":"Perrin L\u00e9","year":"2016","unstructured":"L\u00e9 o Perrin and Aleksei Udovenko . 2016 . Exponential S-Boxes: a Link Between the S-Boxes of BelT and Kuznyechik\/Streebog . IACR Transactions on Symmetric Cryptology , Vol. 2016 , 2 (2016), 99 -- 124 . https:\/\/doi.org\/10.13154\/tosc.v2016.i2.99--124 http:\/\/tosc.iacr.org\/index.php\/ToSC\/article\/view\/567. 10.13154\/tosc.v2016.i2.99--124 L\u00e9 o Perrin and Aleksei Udovenko. 2016. Exponential S-Boxes: a Link Between the S-Boxes of BelT and Kuznyechik\/Streebog. IACR Transactions on Symmetric Cryptology, Vol. 2016, 2 (2016), 99--124. https:\/\/doi.org\/10.13154\/tosc.v2016.i2.99--124 http:\/\/tosc.iacr.org\/index.php\/ToSC\/article\/view\/567.","journal-title":"IACR Transactions on Symmetric Cryptology"},{"key":"e_1_3_2_1_61_1","unstructured":"Frank Quick. 2009. Common Cryptographic Algorithms. Available online at https:\/\/www.3gpp2.org\/Public_html\/Specs\/S.S0053-0_v2.0.pdf..  Frank Quick. 2009. Common Cryptographic Algorithms. Available online at https:\/\/www.3gpp2.org\/Public_html\/Specs\/S.S0053-0_v2.0.pdf.."},{"volume-title":"Fast Software Encryption -- FSE'97 (Lecture Notes in Computer Science),","author":"Rijmen Vincent","key":"e_1_3_2_1_62_1","unstructured":"Vincent Rijmen and Bart Preneel . 1997. A Family of Trapdoor Ciphers . In Fast Software Encryption -- FSE'97 (Lecture Notes in Computer Science), , Eli Biham (Ed.), Vol. 1267 . Springer , Heidelberg , 139--148. https:\/\/doi.org\/10.1007\/BFb0052342 10.1007\/BFb0052342 Vincent Rijmen and Bart Preneel. 1997. A Family of Trapdoor Ciphers. In Fast Software Encryption -- FSE'97 (Lecture Notes in Computer Science),, Eli Biham (Ed.), Vol. 1267. Springer, Heidelberg, 139--148. https:\/\/doi.org\/10.1007\/BFb0052342"},{"key":"e_1_3_2_1_63_1","unstructured":"V. Rudskoy. 2015. Note on Streebog constants origin. Available online at https:\/\/tc26.ru\/upload\/medialibrary\/efb\/streebog_constants_eng%20Rudskoi.pdf.  V. Rudskoy. 2015. Note on Streebog constants origin. Available online at https:\/\/tc26.ru\/upload\/medialibrary\/efb\/streebog_constants_eng%20Rudskoi.pdf."},{"volume-title":"Fast Software Encryption -- FSE'93 (Lecture Notes in Computer Science), Ross J","author":"Schneier Bruce","key":"e_1_3_2_1_64_1","unstructured":"Bruce Schneier . 1994. Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish) . In Fast Software Encryption -- FSE'93 (Lecture Notes in Computer Science), Ross J . Anderson (Ed.), Vol. 809 . Springer , Heidelberg , 191--204. https:\/\/doi.org\/10.1007\/3-540-58108-1_24 10.1007\/3-540-58108-1_24 Bruce Schneier. 1994. Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish). In Fast Software Encryption -- FSE'93 (Lecture Notes in Computer Science), Ross J. Anderson (Ed.), Vol. 809. Springer, Heidelberg, 191--204. https:\/\/doi.org\/10.1007\/3-540-58108-1_24"},{"volume-title":"Secure Hash Standard (SHS)","key":"e_1_3_2_1_66_1","unstructured":"SHA3 2015. Secure Hash Standard (SHS) . National Institute of Standards andTechnology (NIST), FIPS PUB 180-4, U.S. Department of Commerce . SHA3 2015. Secure Hash Standard (SHS). National Institute of Standards andTechnology (NIST), FIPS PUB 180-4, U.S. Department of Commerce."},{"volume-title":"SHA-3 Standard: Permutation-Based Hash and Extendable-OutputFunction","key":"e_1_3_2_1_67_1","unstructured":"SHA3 2015. SHA-3 Standard: Permutation-Based Hash and Extendable-OutputFunction . National Institute of Standards and Technology (NIST), FIPS PUB 202 ,U.S. Department of Commerce . SHA3 2015. SHA-3 Standard: Permutation-Based Hash and Extendable-OutputFunction. National Institute of Standards and Technology (NIST), FIPS PUB 202 ,U.S. Department of Commerce."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"e_1_3_2_1_69_1","unstructured":"Vasily Shishkin and Grigory Marshalko. 2018. A Memo on Kuznyechik S-Box. ISO\/IEC JTC 1\/SC 27\/WG 2 Officer's Contribution N1804. https:\/\/cdn.virgilsecurity.com\/assets\/docs\/memo-on-kuznyechik-s-box.pdf  Vasily Shishkin and Grigory Marshalko. 2018. A Memo on Kuznyechik S-Box. ISO\/IEC JTC 1\/SC 27\/WG 2 Officer's Contribution N1804. https:\/\/cdn.virgilsecurity.com\/assets\/docs\/memo-on-kuznyechik-s-box.pdf"},{"volume-title":"Advances in Cryptology -- CRYPTO'83,","author":"Simmons Gustavus J.","key":"e_1_3_2_1_70_1","unstructured":"Gustavus J. Simmons . 1983. The Prisoners' Problem and the Subliminal Channel . In Advances in Cryptology -- CRYPTO'83, , David Chaum (Ed.). Plenum Press , New York, USA , 51--67. Gustavus J. Simmons. 1983. The Prisoners' Problem and the Subliminal Channel. In Advances in Cryptology -- CRYPTO'83,, David Chaum (Ed.). Plenum Press, New York, USA, 51--67."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1080\/0161-118491858746"},{"key":"e_1_3_2_1_72_1","volume-title":"Advances in Cryptology -- CRYPTO","author":"Stevens Marc","year":"2017","unstructured":"Marc Stevens , Elie Bursztein , Pierre Karpman , Ange Albertini , and Yarik Markov . 2017. The First Collision for Full SHA-1 . In Advances in Cryptology -- CRYPTO 2017 , Part I (Lecture Notes in Computer Science),, Jonathan Katz and Hovav Shacham (Eds.), Vol. 10401 . Springer , Heidelberg, 570--596. https:\/\/doi.org\/10.1007\/978-3-319-63688-7_19 10.1007\/978-3-319-63688-7_19 Marc Stevens, Elie Bursztein, Pierre Karpman, Ange Albertini, and Yarik Markov. 2017. The First Collision for Full SHA-1. In Advances in Cryptology -- CRYPTO 2017, Part I (Lecture Notes in Computer Science),, Jonathan Katz and Hovav Shacham (Eds.), Vol. 10401. Springer, Heidelberg, 570--596. https:\/\/doi.org\/10.1007\/978-3-319-63688-7_19"},{"key":"e_1_3_2_1_73_1","volume-title":"Advances in Cryptology -- EUROCRYPT","author":"Todo Yosuke","year":"2015","unstructured":"Yosuke Todo . 2015. Structural Evaluation by Generalized Integral Property . In Advances in Cryptology -- EUROCRYPT 2015 , Part I (Lecture Notes in Computer Science), Elisabeth Oswald and Marc Fischlin (Eds.), Vol. 9056 . Springer , Heidelberg, 287--314. https:\/\/doi.org\/10.1007\/978-3-662-46800-5_12 10.1007\/978-3-662-46800-5_12 Yosuke Todo. 2015. Structural Evaluation by Generalized Integral Property. In Advances in Cryptology -- EUROCRYPT 2015, Part I (Lecture Notes in Computer Science), Elisabeth Oswald and Marc Fischlin (Eds.), Vol. 9056. Springer, Heidelberg, 287--314. https:\/\/doi.org\/10.1007\/978-3-662-46800-5_12"},{"key":"e_1_3_2_1_74_1","unstructured":"U.S. Department Of Commerce\/National Institute of Standards and Technology. 1998. Skipjack and KEA Algorithms Specifications v2.0. http:\/\/csrc.nist.gov\/groups\/ST\/toolkit\/documents\/skipjack\/skipjack.pdf  U.S. Department Of Commerce\/National Institute of Standards and Technology. 1998. Skipjack and KEA Algorithms Specifications v2.0. http:\/\/csrc.nist.gov\/groups\/ST\/toolkit\/documents\/skipjack\/skipjack.pdf"},{"volume-title":"Fast Software Encryption -- FSE'99 (Lecture Notes in Computer Science),, Lars R","author":"Wagner David","key":"e_1_3_2_1_75_1","unstructured":"David Wagner . 1999. The Boomerang Attack . In Fast Software Encryption -- FSE'99 (Lecture Notes in Computer Science),, Lars R . Knudsen (Ed.), Vol. 1636 . Springer , Heidelberg , 156--170. https:\/\/doi.org\/10.1007\/3-540-48519-8_12 10.1007\/3-540-48519-8_12 David Wagner. 1999. The Boomerang Attack. In Fast Software Encryption -- FSE'99 (Lecture Notes in Computer Science),, Lars R. Knudsen (Ed.), Vol. 1636. Springer, Heidelberg, 156--170. https:\/\/doi.org\/10.1007\/3-540-48519-8_12"},{"volume-title":"Advances in Cryptology -- CRYPTO'97 (Lecture Notes in Computer Science),","author":"Wagner David","key":"e_1_3_2_1_76_1","unstructured":"David Wagner , Bruce Schneier , and John Kelsey . 1997. Cryptanalysis of the Cellular Encryption Algorithm . In Advances in Cryptology -- CRYPTO'97 (Lecture Notes in Computer Science), , Burton S. Kaliski Jr. (Ed.), Vol. 1294 . Springer , Heidelberg , 526--537. https:\/\/doi.org\/10.1007\/BFb0052260 10.1007\/BFb0052260 David Wagner, Bruce Schneier, and John Kelsey. 1997. Cryptanalysis of the Cellular Encryption Algorithm. In Advances in Cryptology -- CRYPTO'97 (Lecture Notes in Computer Science),, Burton S. Kaliski Jr. (Ed.), Vol. 1294. Springer, Heidelberg, 526--537. https:\/\/doi.org\/10.1007\/BFb0052260"},{"key":"e_1_3_2_1_77_1","volume-title":"Tavares","author":"Webster A. F.","year":"1986","unstructured":"A. F. Webster and Stafford E . Tavares . 1986 . On the Design of S-Boxes (Impromptu Talk). In Advances in Cryptology -- CRYPTO'85 (Lecture Notes in Computer Science),, Hugh C. Williams (Ed.), Vol. 218 . Springer , Heidelberg, 523--534. https:\/\/doi.org\/10.1007\/3-540-39799-X_41 10.1007\/3-540-39799-X_41 A. F. Webster and Stafford E. Tavares. 1986. On the Design of S-Boxes (Impromptu Talk). In Advances in Cryptology -- CRYPTO'85 (Lecture Notes in Computer Science),, Hugh C. Williams (Ed.), Vol. 218. Springer, Heidelberg, 523--534. https:\/\/doi.org\/10.1007\/3-540-39799-X_41"},{"volume-title":"Advances in Cryptology -- ASIACRYPT'98 (Lecture Notes in Computer Science)","author":"Wu Hongjun","key":"e_1_3_2_1_78_1","unstructured":"Hongjun Wu , Feng Bao , Robert H. Deng , and Qin-Zhong Ye. 1998. Cryptanalysis of Rijmen-Preneel Trapdoor Ciphers . In Advances in Cryptology -- ASIACRYPT'98 (Lecture Notes in Computer Science) , Kazuo Ohta and Dingyi Pei (Eds.), Vol. 1514 . Springer , Heidelberg , 126--132. https:\/\/doi.org\/10.1007\/3-540-49649-1_11 10.1007\/3-540-49649-1_11 Hongjun Wu, Feng Bao, Robert H. Deng, and Qin-Zhong Ye. 1998. Cryptanalysis of Rijmen-Preneel Trapdoor Ciphers. In Advances in Cryptology -- ASIACRYPT'98 (Lecture Notes in Computer Science), Kazuo Ohta and Dingyi Pei (Eds.), Vol. 1514. Springer, Heidelberg, 126--132. https:\/\/doi.org\/10.1007\/3-540-49649-1_11"},{"key":"e_1_3_2_1_79_1","volume-title":"Meeting Report for the Discussion on Kuznyechik and Streebog. https:\/\/cdn.virgilsecurity.com\/assets\/docs\/memo-on-kuznyechik-s-box.pdf","author":"Yoshida Hirotaka","year":"2019","unstructured":"Hirotaka Yoshida and Jonathan Hammell . 2019 . Meeting Report for the Discussion on Kuznyechik and Streebog. https:\/\/cdn.virgilsecurity.com\/assets\/docs\/memo-on-kuznyechik-s-box.pdf Hirotaka Yoshida and Jonathan Hammell. 2019. Meeting Report for the Discussion on Kuznyechik and Streebog. https:\/\/cdn.virgilsecurity.com\/assets\/docs\/memo-on-kuznyechik-s-box.pdf"},{"key":"e_1_3_2_1_80_1","volume-title":"Kleptography: Using Cryptography Against Cryptography. In Advances in Cryptology -- EUROCRYPT'97 (Lecture Notes in Computer Science)","author":"Young Adam","year":"1997","unstructured":"Adam Young and Moti Yung . 1997 . Kleptography: Using Cryptography Against Cryptography. In Advances in Cryptology -- EUROCRYPT'97 (Lecture Notes in Computer Science) , Walter Fumy (Ed.), Vol. 1233 . Springer , Heidelberg , 62--74. https:\/\/doi.org\/10.1007\/3-540-69053-0_6 10.1007\/3-540-69053-0_6 Adam Young and Moti Yung. 1997. Kleptography: Using Cryptography Against Cryptography. In Advances in Cryptology -- EUROCRYPT'97 (Lecture Notes in Computer Science), Walter Fumy (Ed.), Vol. 1233. Springer, Heidelberg, 62--74. https:\/\/doi.org\/10.1007\/3-540-69053-0_6"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30564-4_14"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1007\/11693383_9"}],"event":{"name":"CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"London United Kingdom","acronym":"CCS '19"},"container-title":["Proceedings of the 5th ACM Workshop on Security Standardisation Research Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338500.3360335","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3338500.3360335","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:12:49Z","timestamp":1750201969000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338500.3360335"}},"subtitle":["Towards \"Unswerving\" Designs"],"short-title":[],"issued":{"date-parts":[[2019,11,11]]},"references-count":72,"alternative-id":["10.1145\/3338500.3360335","10.1145\/3338500"],"URL":"https:\/\/doi.org\/10.1145\/3338500.3360335","relation":{},"subject":[],"published":{"date-parts":[[2019,11,11]]},"assertion":[{"value":"2019-11-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}