{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,3,28]],"date-time":"2024-03-28T15:57:31Z","timestamp":1711641451721},"reference-count":5,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Fundamentals"],"published-print":{"date-parts":[[2020,1,1]]},"DOI":"10.1587\/transfun.2019cil0004","type":"journal-article","created":{"date-parts":[[2019,12,31]],"date-time":"2019-12-31T22:05:57Z","timestamp":1577829957000},"page":"212-214","source":"Crossref","is-referenced-by-count":1,"title":["Security of Related-Key Differential Attacks on TWINE, Revisited"],"prefix":"10.1587","volume":"E103.A","author":[{"given":"Kosei","family":"SAKAMOTO","sequence":"first","affiliation":[{"name":"Graduate School of Applied Informatics, University of Hyogo"}]},{"given":"Kazuhiko","family":"MINEMATSU","sequence":"additional","affiliation":[{"name":"NEC Corporation"}]},{"given":"Nao","family":"SHIBATA","sequence":"additional","affiliation":[{"name":"NEC Solution Innovators"}]},{"given":"Maki","family":"SHIGERI","sequence":"additional","affiliation":[{"name":"NEC Solution Innovators"}]},{"given":"Hiroyasu","family":"KUBO","sequence":"additional","affiliation":[{"name":"NEC Solution Innovators"}]},{"given":"Yuki","family":"FUNABIKI","sequence":"additional","affiliation":[{"name":"Graduate School of Engineering, Kobe University"}]},{"given":"Takanori","family":"ISOBE","sequence":"additional","affiliation":[{"name":"Graduate School of Applied Informatics, University of Hyogo"},{"name":"National Institute of Information and Communications Technology"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"crossref","unstructured":"[1] G. Alfarano, C. Beierle, T. Isobe, S. K\u00f6lbl, and G. Leander, \u201cShiftRows alternatives for AES-like ciphers and optimal cell permutations for Midori and skinny,\u201d IACR Trans. Symm. Cryptol., vol.2018, no.2, pp.20-47, 2018. 10.13154\/tosc.v2018.i2.20-47","DOI":"10.46586\/tosc.v2018.i2.20-47"},{"key":"2","doi-asserted-by":"crossref","unstructured":"[2] A. Biryukov and I. Nikolic, \u201cAutomatic search for related-key differential characteristics in byte-oriented block ciphers: Application to AES, Camellia, Khazad and others,\u201d EUROCRYPT 2010, Henri Gilbert, ed., vol.6110 of LNCS, pp.322-344. Springer, Heidelberg, May\/June 2010. 10.1007\/978-3-642-13190-5_17","DOI":"10.1007\/978-3-642-13190-5_17"},{"key":"3","unstructured":"[3] Gurobi Optimization Inc., Gurobi optimizer 6.5. Official webpage, http:\/\/www.gurobi.com\/, 2015."},{"key":"4","doi-asserted-by":"crossref","unstructured":"[4] N. Mouha, Q. Wang, D. Gu, and B. Preneel, \u201cDifferential and linear cryptanalysis using mixed-integer linear programming,\u201d Information Security and Cryptology-7th International Conference, Inscrypt 2011, Revised Selected Papers, C. Wu, M. Yung, and D. Lin, eds., vol.7537 of Lecture Notes in Computer Science, pp.57-76, Springer, Beijing, China, Nov.-Dec. 2011. 10.1007\/978-3-642-34704-7_5","DOI":"10.1007\/978-3-642-34704-7_5"},{"key":"5","doi-asserted-by":"publisher","unstructured":"[5] T. Suzaki, K. Minematsu, S. Morioka, and E. Kobayashi, \u201cTWINE: A lightweight block cipher for multiple platforms,\u201d SAC 2012, L.R. Knudsen and H. Wu, eds., vol.7707 of LNCS, pp.339-354, Springer, Heidelberg, Aug. 2013. 10.1007\/978-3-642-35999-6_22","DOI":"10.1007\/978-3-642-35999-6_22"}],"container-title":["IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transfun\/E103.A\/1\/E103.A_2019CIL0004\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,14]],"date-time":"2021-02-14T17:35:16Z","timestamp":1613324116000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transfun\/E103.A\/1\/E103.A_2019CIL0004\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,1]]},"references-count":5,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020]]}},"URL":"https:\/\/doi.org\/10.1587\/transfun.2019cil0004","relation":{},"ISSN":["0916-8508","1745-1337"],"issn-type":[{"value":"0916-8508","type":"print"},{"value":"1745-1337","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,1,1]]}}}