{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:48:50Z","timestamp":1762004930006,"version":"3.37.3"},"reference-count":32,"publisher":"Wiley","license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61402280","16YSXK04","61272440","61472251","U1536101","2013M531174","2014T70417","MMJJ20170105"],"award-info":[{"award-number":["61402280","16YSXK04","61272440","61472251","U1536101","2013M531174","2014T70417","MMJJ20170105"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shanghai Dianji University","award":["61402280","16YSXK04","61272440","61472251","U1536101","2013M531174","2014T70417","MMJJ20170105"],"award-info":[{"award-number":["61402280","16YSXK04","61272440","61472251","U1536101","2013M531174","2014T70417","MMJJ20170105"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61402280","16YSXK04","61272440","61472251","U1536101","2013M531174","2014T70417","MMJJ20170105"],"award-info":[{"award-number":["61402280","16YSXK04","61272440","61472251","U1536101","2013M531174","2014T70417","MMJJ20170105"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61402280","16YSXK04","61272440","61472251","U1536101","2013M531174","2014T70417","MMJJ20170105"],"award-info":[{"award-number":["61402280","16YSXK04","61272440","61472251","U1536101","2013M531174","2014T70417","MMJJ20170105"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61402280","16YSXK04","61272440","61472251","U1536101","2013M531174","2014T70417","MMJJ20170105"],"award-info":[{"award-number":["61402280","16YSXK04","61272440","61472251","U1536101","2013M531174","2014T70417","MMJJ20170105"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["61402280","16YSXK04","61272440","61472251","U1536101","2013M531174","2014T70417","MMJJ20170105"],"award-info":[{"award-number":["61402280","16YSXK04","61272440","61472251","U1536101","2013M531174","2014T70417","MMJJ20170105"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["61402280","16YSXK04","61272440","61472251","U1536101","2013M531174","2014T70417","MMJJ20170105"],"award-info":[{"award-number":["61402280","16YSXK04","61272440","61472251","U1536101","2013M531174","2014T70417","MMJJ20170105"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Cryptography Development Fund","award":["61402280","16YSXK04","61272440","61472251","U1536101","2013M531174","2014T70417","MMJJ20170105"],"award-info":[{"award-number":["61402280","16YSXK04","61272440","61472251","U1536101","2013M531174","2014T70417","MMJJ20170105"]}]},{"name":"Science and Technology on Communication Security Laboratory","award":["61402280","16YSXK04","61272440","61472251","U1536101","2013M531174","2014T70417","MMJJ20170105"],"award-info":[{"award-number":["61402280","16YSXK04","61272440","61472251","U1536101","2013M531174","2014T70417","MMJJ20170105"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2017]]},"abstract":"<jats:p>We improve Wu and Wang\u2019s method for finding impossible differentials of block cipher structures. This improvement is more general than Wu and Wang\u2019s method where it can find more impossible differentials with less time. We apply it on Gen-CAST256, Misty, Gen-Skipjack, Four-Cell, Gen-MARS, SMS4, MIBS, <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\" id=\"M1\"><mml:mrow><mml:msup><mml:mrow><mml:mi mathvariant=\"normal\">C<\/mml:mi><mml:mi mathvariant=\"normal\">a<\/mml:mi><mml:mi mathvariant=\"normal\">m<\/mml:mi><mml:mi mathvariant=\"normal\">e<\/mml:mi><mml:mi mathvariant=\"normal\">l<\/mml:mi><mml:mi mathvariant=\"normal\">l<\/mml:mi><mml:mi mathvariant=\"normal\">i<\/mml:mi><mml:mi mathvariant=\"normal\">a<\/mml:mi><\/mml:mrow><mml:mrow><mml:mo>\u204e<\/mml:mo><\/mml:mrow><\/mml:msup><\/mml:mrow><\/mml:math>, LBlock, E2, and SNAKE block ciphers. All impossible differentials discovered by the algorithm are the same as Wu\u2019s method. Besides, for the 8-round MIBS block cipher, we find 4 new impossible differentials, which are not listed in Wu and Wang\u2019s results. The experiment results show that the improved algorithm can not only find more impossible differentials, but also largely reduce the search time.<\/jats:p>","DOI":"10.1155\/2017\/5980251","type":"journal-article","created":{"date-parts":[[2017,8,29]],"date-time":"2017-08-29T17:02:18Z","timestamp":1504026138000},"page":"1-9","source":"Crossref","is-referenced-by-count":5,"title":["Improvements for Finding Impossible Differentials of Block Cipher Structures"],"prefix":"10.1155","volume":"2017","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9557-5100","authenticated-orcid":true,"given":"Yiyuan","family":"Luo","sequence":"first","affiliation":[{"name":"School of Electronics and Information, Shanghai Dian Ji University, Shanghai, China"}]},{"given":"Xuejia","family":"Lai","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"},{"name":"Westone Cryptologic Research Center, Beijing 100070, China"}]}],"member":"311","reference":[{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-005-0129-3"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-016-9075-6"},{"issue":"12, article 122101","key":"9","volume":"60","year":"2017","journal-title":"Science China Information Sciences"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-015-5487-3"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-015-5459-7"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-015-0345-0"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-015-5474-8"},{"issue":"4","key":"12","first-page":"1041","volume":"33","year":"2017","journal-title":"Journal of Information Science and Engineering"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-014-5219-0"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45611-8_10"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24582-7_6"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/j.disc.2009.10.019"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.08.051"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10240-0_9"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-015-5295-9"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-015-0363-7"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-43414-7_15"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26617-6_10"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48116-5_5"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34931-7_17"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47989-6_5"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44448-3_21"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02620-1_6"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0052334"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10433-6_22"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44983-3_4"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21554-4_19"},{"issue":"1","key":"14","first-page":"48","volume":"e83-a","year":"2000","journal-title":"IEICE Transactions Fundamentals - Special Section on Cryptography and Information Security"},{"first-page":"3","volume-title":"The block cipher: SNAKE with provable resistance against DC and LC attacks","year":"1997","key":"18"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44448-3_22"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_5"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07536-5_17"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2017\/5980251.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2017\/5980251.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2017\/5980251.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,8,29]],"date-time":"2017-08-29T17:02:29Z","timestamp":1504026149000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2017\/5980251\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"references-count":32,"alternative-id":["5980251","5980251"],"URL":"https:\/\/doi.org\/10.1155\/2017\/5980251","relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"type":"print","value":"1939-0114"},{"type":"electronic","value":"1939-0122"}],"subject":[],"published":{"date-parts":[[2017]]}}}