{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T10:43:01Z","timestamp":1740134581678,"version":"3.37.3"},"reference-count":5,"publisher":"Wiley","license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/"}],"funder":[{"name":"Ministry of Science, ICT & Future Planning","award":["NIPA-2013-H0301-13-3007"],"award-info":[{"award-number":["NIPA-2013-H0301-13-3007"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Applied Mathematics"],"published-print":{"date-parts":[[2013]]},"abstract":"<jats:p>At AES\u201900, a collision attack on 7-round reduced AES was proposed. In this paper, we apply this idea to seven SPN block ciphers, AES-192\/256, Crypton-192\/256, mCrypton-96\/128, and Anubis. Applying our attacks on AES-192\/256, we improve the attack result based on meet-in-the-middle attack (AES-192) and the attack result proposed in AES\u201900 (AES-256), respectively. Our attack result on Anubis is superior to known cryptanalytic result on it. In the cases of Crypton-192\/256 and mCrypton-96\/128, our attacks are applicable to 8-round reduced versions. The attack results on mCrypton-96\/128 are more practical than known cryptanalytic results on them.<\/jats:p>","DOI":"10.1155\/2013\/713673","type":"journal-article","created":{"date-parts":[[2013,11,10]],"date-time":"2013-11-10T11:49:29Z","timestamp":1384084169000},"page":"1-10","source":"Crossref","is-referenced-by-count":4,"title":["Collision Attacks on AES-192\/256, Crypton-192\/256, mCrypton-96\/128, and Anubis"],"prefix":"10.1155","volume":"2013","author":[{"given":"Jinkeon","family":"Kang","sequence":"first","affiliation":[{"name":"Center for Information Security Technologies (CIST), Korea University, Anam-dong, Seongbuk-gu, Seoul 136-713, Republic of Korea"}]},{"given":"Kitae","family":"Jeong","sequence":"additional","affiliation":[{"name":"Center for Information Security Technologies (CIST), Korea University, Anam-dong, Seongbuk-gu, Seoul 136-713, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8681-4106","authenticated-orcid":true,"given":"Jaechul","family":"Sung","sequence":"additional","affiliation":[{"name":"Department of Mathematics, University of Seoul, Jeonnong-dong, Dongdaemun-gu, Seoul 130-743, Republic of Korea"}]},{"given":"Seokhie","family":"Hong","sequence":"additional","affiliation":[{"name":"Center for Information Security Technologies (CIST), Korea University, Anam-dong, Seongbuk-gu, Seoul 136-713, Republic of Korea"}]},{"given":"Kyungho","family":"Lee","sequence":"additional","affiliation":[{"name":"Center for Information Security Technologies (CIST), Korea University, Anam-dong, Seongbuk-gu, Seoul 136-713, Republic of Korea"}]}],"member":"311","reference":[{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77026-8_8"},{"journal-title":"The NESSIE","year":"2000","key":"1"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24691-6_33"},{"issue":"4","key":"11","doi-asserted-by":"crossref","first-page":"415","DOI":"10.1002\/dac.1248","volume":"25","year":"2012","journal-title":"International Journal of Communication Systems"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10366-7_1"}],"container-title":["Journal of Applied Mathematics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/jam\/2013\/713673.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/jam\/2013\/713673.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/jam\/2013\/713673.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T21:42:40Z","timestamp":1498081360000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.hindawi.com\/journals\/jam\/2013\/713673\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"references-count":5,"alternative-id":["713673","713673"],"URL":"https:\/\/doi.org\/10.1155\/2013\/713673","relation":{},"ISSN":["1110-757X","1687-0042"],"issn-type":[{"type":"print","value":"1110-757X"},{"type":"electronic","value":"1687-0042"}],"subject":[],"published":{"date-parts":[[2013]]}}}