{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,28]],"date-time":"2025-07-28T06:32:17Z","timestamp":1753684337213,"version":"3.37.3"},"reference-count":11,"publisher":"Wiley","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61732021","61472417","61772519","61472415","61402469","Y7Z0251103"],"award-info":[{"award-number":["61732021","61472417","61772519","61472415","61402469","Y7Z0251103"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61732021","61472417","61772519","61472415","61402469","Y7Z0251103"],"award-info":[{"award-number":["61732021","61472417","61772519","61472415","61402469","Y7Z0251103"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61732021","61472417","61772519","61472415","61402469","Y7Z0251103"],"award-info":[{"award-number":["61732021","61472417","61772519","61472415","61402469","Y7Z0251103"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61732021","61472417","61772519","61472415","61402469","Y7Z0251103"],"award-info":[{"award-number":["61732021","61472417","61772519","61472415","61402469","Y7Z0251103"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61732021","61472417","61772519","61472415","61402469","Y7Z0251103"],"award-info":[{"award-number":["61732021","61472417","61772519","61472415","61402469","Y7Z0251103"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002367","name":"Chinese Academy of Sciences","doi-asserted-by":"publisher","award":["61732021","61472417","61772519","61472415","61402469","Y7Z0251103"],"award-info":[{"award-number":["61732021","61472417","61772519","61472415","61402469","Y7Z0251103"]}],"id":[{"id":"10.13039\/501100002367","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004739","name":"Youth Innovation Promotion Association of the Chinese Academy of Sciences","doi-asserted-by":"publisher","award":["61732021","61472417","61772519","61472415","61402469","Y7Z0251103"],"award-info":[{"award-number":["61732021","61472417","61772519","61472415","61402469","Y7Z0251103"]}],"id":[{"id":"10.13039\/501100004739","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Institute of Information Engineering","award":["61732021","61472417","61772519","61472415","61402469","Y7Z0251103"],"award-info":[{"award-number":["61732021","61472417","61772519","61472415","61402469","Y7Z0251103"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2018]]},"abstract":"<jats:p>While impossible differential attack is one of the most well-known and familiar techniques for symmetric-key cryptanalysts, its subtlety and complicacy make the construction and verification of such attacks difficult and error-prone. We introduce a new set of notations for impossible differential analysis. These notations lead to unified formulas for estimation of data complexities of ordinary impossible differential attacks and attacks employing multiple impossible differentials. We also identify an interesting point from the new formulas: in most cases, the data complexity is only related to the form of the underlying distinguisher and has nothing to do with how the differences at the beginning and the end of the distinguisher propagate in the outer rounds. We check the formulas with some examples, and the results are all matching. Since the estimation of the time complexity is flawed in some situations, in this work, we show under which condition the formula is valid and give a simple time complexity estimation for impossible differential attack which is always achievable.<\/jats:p>","DOI":"10.1155\/2018\/7393401","type":"journal-article","created":{"date-parts":[[2018,4,17]],"date-time":"2018-04-17T19:32:16Z","timestamp":1523993536000},"page":"1-11","source":"Crossref","is-referenced-by-count":2,"title":["On the Complexity of Impossible Differential Cryptanalysis"],"prefix":"10.1155","volume":"2018","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2062-1344","authenticated-orcid":true,"given":"Qianqian","family":"Yang","sequence":"first","affiliation":[{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"},{"name":"Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, Beijing, China"},{"name":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9920-5342","authenticated-orcid":true,"given":"Lei","family":"Hu","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"},{"name":"Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, Beijing, China"},{"name":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Danping","family":"Shi","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"},{"name":"Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, Beijing, China"},{"name":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Yosuke","family":"Todo","sequence":"additional","affiliation":[{"name":"NTT Secure Platform Laboratories, Tokyo, Japan"}]},{"given":"Siwei","family":"Sun","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"},{"name":"Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, Beijing, China"},{"name":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"}]}],"member":"311","reference":[{"issue":"2","key":"11","volume":"258","year":"1998","journal-title":"Complexity"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-014-1419-8"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.E98.A.843"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.E99.A.154"},{"volume":"151","journal-title":"Cryptology ePrint Archive","year":"2008","key":"21"},{"volume":"551","journal-title":"Cryptology ePrint Archive","year":"2011","key":"27"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-52993-5_14"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.08.051"},{"volume":"404","journal-title":"IACR Cryptology ePrint Archive","year":"2013","key":"4"},{"issue":"1","key":"17","first-page":"281","volume":"2017","year":"2017","journal-title":"IACR Trans. Symmetric Cryptol"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs:20070078"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2018\/7393401.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2018\/7393401.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2018\/7393401.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,4,17]],"date-time":"2018-04-17T19:32:25Z","timestamp":1523993545000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2018\/7393401\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":11,"alternative-id":["7393401","7393401"],"URL":"https:\/\/doi.org\/10.1155\/2018\/7393401","relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"type":"print","value":"1939-0114"},{"type":"electronic","value":"1939-0122"}],"subject":[],"published":{"date-parts":[[2018]]}}}