{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T00:31:47Z","timestamp":1771979507531,"version":"3.50.1"},"reference-count":22,"publisher":"Walter de Gruyter GmbH","issue":"1","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,2,14]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>The use of alternative operations in differential cryptanalysis, or alternative notions of differentials, is lately receiving increasing attention. Recently, Civino et al. managed to design a block cipher that is secure with respect to the classical differential cryptanalysis performed using XOR-differentials, but weaker with respect to the attack based on an alternative difference operation acting on the first s-box of the block. We extend this result to parallel alternative operations, i.e. acting on each s-box of the block. First, we recall the mathematical framework needed to define and use such operations. After that, we perform some differential experiments against a toy cipher and compare the effectiveness of the attack with respect to the one that uses XOR-differentials.<\/jats:p>","DOI":"10.1515\/jmc-2023-0030","type":"journal-article","created":{"date-parts":[[2024,2,14]],"date-time":"2024-02-14T09:13:21Z","timestamp":1707902001000},"source":"Crossref","is-referenced-by-count":4,"title":["Differential experiments using parallel alternative operations"],"prefix":"10.1515","volume":"18","author":[{"given":"Marco","family":"Calderini","sequence":"first","affiliation":[{"name":"Department of Mathematics, University of Trento , Via Sommarive 14 , 38122, Povo , Italy"}]},{"given":"Roberto","family":"Civino","sequence":"additional","affiliation":[{"name":"Department of Information Engineering, Computer Science and Mathematics, University of l\u2019Aquila , Via Vetoio 67100 L\u2019Aquila , Italy"}]},{"given":"Riccardo","family":"Invernizzi","sequence":"additional","affiliation":[{"name":"KU Leuven , Celestijnenlaan 200a , 3001, Leuven , Belgium"}]}],"member":"374","published-online":{"date-parts":[[2024,2,14]]},"reference":[{"key":"2025120600251208145_j_jmc-2023-0030_ref_001","doi-asserted-by":"crossref","unstructured":"Biham E, Shamir A. Differential cryptanalysis of DES-like cryptosystems. J Cryptol. 1991;4:3\u201372.","DOI":"10.1007\/BF00630563"},{"key":"2025120600251208145_j_jmc-2023-0030_ref_002","doi-asserted-by":"crossref","unstructured":"Biham E, Biryukov A, Shamir A. Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials. J Cryptol. 2005;18:291\u2013311.","DOI":"10.1007\/s00145-005-0129-3"},{"key":"2025120600251208145_j_jmc-2023-0030_ref_003","doi-asserted-by":"crossref","unstructured":"Knudsen LR. Truncated and higher order differentials. In: Fast Software Encryption: Second International Workshop Leuven, Belgium, December 14\u201316, 1994 Proceedings 2. Springer; 1995. p. 196\u2013211.","DOI":"10.1007\/3-540-60590-8_16"},{"key":"2025120600251208145_j_jmc-2023-0030_ref_004","doi-asserted-by":"crossref","unstructured":"Wagner D. The boomerang attack. In: International Workshop on Fast Software Encryption. Springer; 1999. p. 156\u201370.","DOI":"10.1007\/3-540-48519-8_12"},{"key":"2025120600251208145_j_jmc-2023-0030_ref_005","doi-asserted-by":"crossref","unstructured":"Nyberg K. Differentially uniform mappings for cryptography. In: Workshop on the Theory and Application of of Cryptographic Techniques. Springer; 1993. p. 55\u201364.","DOI":"10.1007\/3-540-48285-7_6"},{"key":"2025120600251208145_j_jmc-2023-0030_ref_006","doi-asserted-by":"crossref","unstructured":"Mesnager S, Mandal B, Msahli M. Survey on recent trends towards generalized differential and boomerang uniformities. Cryptogr Commun. 2022;14:691\u2013735.","DOI":"10.1007\/s12095-021-00551-6"},{"key":"2025120600251208145_j_jmc-2023-0030_ref_007","unstructured":"Berson TA. Differential cryptanalysis mod 232 with applications to MD5. In: Advances in Cryptology\u2013EUROCRYPT\u2019 92. EUROCRYPT 1992. Lecture Notes in Computer Science, vol. 658. Springer, Berlin, Heidelberg; 1993."},{"key":"2025120600251208145_j_jmc-2023-0030_ref_008","doi-asserted-by":"crossref","unstructured":"Abazari F, Sadeghian B. Cryptanalysis with ternary difference: applied to block cipher PRESENT. Cryptology ePrint Archive. 2011.","DOI":"10.7763\/IJIEE.2012.V2.133"},{"key":"2025120600251208145_j_jmc-2023-0030_ref_009","doi-asserted-by":"crossref","unstructured":"Bogdanov A, Knudsen LR, Leander G, Paar C, Poschmann A, Robshaw MJ, et al. PRESENT: an ultra-lightweight block cipher. In: Cryptographic Hardware and Embedded Systems-CHES 2007: 9th International Workshop, Vienna, Austria, September 10\u201313, 2007. Proceedings 9. Springer; 2007. p. 450\u201366.","DOI":"10.1007\/978-3-540-74735-2_31"},{"key":"2025120600251208145_j_jmc-2023-0030_ref_010","doi-asserted-by":"crossref","unstructured":"Borisov N, Chew M, Johnson R, Wagner D. Multiplicative differentials. In: Fast Software Encryption: 9th International Workshop, FSE 2002 Leuven, Belgium, February 4\u20136, 2002 Revised Papers 9. Springer; 2002. p. 17\u201333.","DOI":"10.1007\/3-540-45661-9_2"},{"key":"2025120600251208145_j_jmc-2023-0030_ref_011","unstructured":"Lai X, Massey JL. A proposal for a new block encryption standard. In: Advances in Cryptology\u2013EUROCRYPT\u201990: Workshop on the Theory and Application of Cryptographic Techniques Aarhus, Denmark, May 21\u201324, 1990 Proceedings 9. Springer; 1991. p. 389\u2013404."},{"key":"2025120600251208145_j_jmc-2023-0030_ref_012","doi-asserted-by":"crossref","unstructured":"Ellingsen P, Felke P, Riera C, St\u01ceanic\u01ce P, Tkachenko A. C-differentials, multiplicative uniformity, and (almost) perfect c-nonlinearity. IEEE Trans Inform Theory. 2020;66(9):5781\u20139.","DOI":"10.1109\/TIT.2020.2971988"},{"key":"2025120600251208145_j_jmc-2023-0030_ref_013","unstructured":"Bartoli D, K\u00f6lsch L, Micheli G. Differential biases, c -differential uniformity, and their relation to differential attacks. 2022. arXiv: http:\/\/arXiv.org\/abs\/arXiv:220803884."},{"key":"2025120600251208145_j_jmc-2023-0030_ref_014","doi-asserted-by":"crossref","unstructured":"Civino R, Blondeau C, Sala M. Differential attacks: using alternative operations. Designs Codes Cryptography. 2019;87:225\u201347.","DOI":"10.1007\/s10623-018-0516-z"},{"key":"2025120600251208145_j_jmc-2023-0030_ref_015","doi-asserted-by":"crossref","unstructured":"Calderini M, Civino R, Sala M. On properties of translation groups in the affine general linear group with applications to cryptography. J Algebra. 2021;569:658\u201380.","DOI":"10.1016\/j.jalgebra.2020.10.034"},{"key":"2025120600251208145_j_jmc-2023-0030_ref_016","doi-asserted-by":"crossref","unstructured":"Caranti A, Dalla Volta F, Sala M. On some block ciphers and imprimitive groups. Appl Algebra Eng Commun Comput. 2009;20(5-6):339\u201350.","DOI":"10.1007\/s00200-009-0100-x"},{"key":"2025120600251208145_j_jmc-2023-0030_ref_017","doi-asserted-by":"crossref","unstructured":"Brunetta C, Calderini M, Sala M. On hidden sums compatible with a given block cipher diffusion layer. Discrete Math. 2019;342(2):373\u201386.","DOI":"10.1016\/j.disc.2018.10.003"},{"key":"2025120600251208145_j_jmc-2023-0030_ref_018","doi-asserted-by":"crossref","unstructured":"Aragona R, Civino R, Gavioli N, Scoppola CM. Regular subgroups with large intersection. Annali di Matematica Pura ed Applicata. 2019;198(6):2043\u201357.","DOI":"10.1007\/s10231-019-00853-w"},{"key":"2025120600251208145_j_jmc-2023-0030_ref_019","doi-asserted-by":"crossref","unstructured":"Dixon JD. Maximal abelian subgroups of the symmetric groups. Canadian J Math. 1971;23(3):426\u201338.","DOI":"10.4153\/CJM-1971-045-7"},{"key":"2025120600251208145_j_jmc-2023-0030_ref_020","doi-asserted-by":"crossref","unstructured":"Bosma W, Cannon J, Playoust C. The Magma algebra system I: the user language. J Symbolic Comput. 1997;24(3\u20134):235\u201365.","DOI":"10.1006\/jsco.1996.0125"},{"key":"2025120600251208145_j_jmc-2023-0030_ref_021","unstructured":"Leander G, Poschmann A. On the classification of 4 bit S-boxes. In: Arithmetic of Finite Fields: First International Workshop, WAIFI 2007, Madrid, Spain, June 21\u201322, 2007. Proceedings 1. Springer; 2007. p. 159\u201376."},{"key":"2025120600251208145_j_jmc-2023-0030_ref_022","doi-asserted-by":"crossref","unstructured":"Zajac P, J\u00f3kay M. Cryptographic properties of small bijective S-boxes with respect to modular addition. Cryptography Commun. 2020;12:947\u201363.","DOI":"10.1007\/s12095-020-00447-x"}],"container-title":["Journal of Mathematical Cryptology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jmc-2023-0030\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jmc-2023-0030\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T00:25:39Z","timestamp":1764980739000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jmc-2023-0030\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,1]]},"references-count":22,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,2,14]]},"published-print":{"date-parts":[[2024,2,14]]}},"alternative-id":["10.1515\/jmc-2023-0030"],"URL":"https:\/\/doi.org\/10.1515\/jmc-2023-0030","relation":{},"ISSN":["1862-2984"],"issn-type":[{"value":"1862-2984","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1,1]]},"article-number":"20230030"}}