{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T20:27:03Z","timestamp":1762028823829,"version":"build-2065373602"},"reference-count":33,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"12","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Fundamentals"],"published-print":{"date-parts":[[2020,12,1]]},"DOI":"10.1587\/transfun.2019eap1141","type":"journal-article","created":{"date-parts":[[2020,11,30]],"date-time":"2020-11-30T22:17:12Z","timestamp":1606774632000},"page":"1629-1639","source":"Crossref","is-referenced-by-count":7,"title":["Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure"],"prefix":"10.1587","volume":"E103.A","author":[{"given":"Kosei","family":"SAKAMOTO","sequence":"first","affiliation":[{"name":"Graduate School of Applied Informatics, University of Hyogo"}]},{"given":"Kazuhiko","family":"MINEMATSU","sequence":"additional","affiliation":[{"name":"NEC Corporation"}]},{"given":"Nao","family":"SHIBATA","sequence":"additional","affiliation":[{"name":"NEC Solution Innovators"}]},{"given":"Maki","family":"SHIGERI","sequence":"additional","affiliation":[{"name":"NEC Solution Innovators"}]},{"given":"Hiroyasu","family":"KUBO","sequence":"additional","affiliation":[{"name":"NEC Solution Innovators"}]},{"given":"Yuki","family":"FUNABIKI","sequence":"additional","affiliation":[{"name":"Sony Corporation"}]},{"given":"Andrey","family":"BOGDANOV","sequence":"additional","affiliation":[{"name":"Technical University of Denmark"}]},{"given":"Sumio","family":"MORIOKA","sequence":"additional","affiliation":[{"name":"Interstellar Technologies"}]},{"given":"Takanori","family":"ISOBE","sequence":"additional","affiliation":[{"name":"Graduate School of Applied Informatics, University of Hyogo"},{"name":"National Institute of Information and Communications Technology"}]}],"member":"532","reference":[{"key":"1","unstructured":"[1] R. Avanzi, \u201cThe QARMA block cipher family,\u201d IACR Trans. Symm. Cryptol., vol.2017, no.1, pp.4-44, 2017."},{"key":"2","doi-asserted-by":"crossref","unstructured":"[2] C. Beierle, J. Jean, S. K\u00f6lbl, G. Leander, A. Moradi, T. Peyrin, Y. Sasaki, P. Sasdrich, and S.M. Sim, \u201cThe SKINNY family of block ciphers and its low-latency variant MANTIS,\u201d CRYPTO 2016, Part II, M. Robshaw and J. Katz, eds., volume 9815 of LNCS, pp.123-153, Springer, Heidelberg, Aug. 2016. 10.1007\/978-3-662-53008-5_5","DOI":"10.1007\/978-3-662-53008-5_5"},{"key":"3","unstructured":"[3] C. Beierle, G. Leander, A. Moradi, and S. Rasoolzadeh, \u201cCRAFT: Lightweight tweakable block cipher with efficient protection against DFA attacks,\u201d IACR Trans. Symmetric Cryptol., vol.2019, no.1, pp.5-45, 2019."},{"key":"4","doi-asserted-by":"crossref","unstructured":"[4] E. Biham, A. Biryukov, and A. Shamir, \u201cCryptanalysis of Skipjack reduced to 31 rounds using impossible differentials,\u201d EUROCRYPT&apos;99, J. Stern, ed., volume 1592 of LNCS, pp.12-23, Springer, Heidelberg, May 1999. 10.1007\/3-540-48910-x_2","DOI":"10.1007\/3-540-48910-X_2"},{"key":"5","doi-asserted-by":"crossref","unstructured":"[5] E. Biham and A. Shamir, \u201cDifferential cryptanalysis of DES-like cryptosystems,\u201d CRYPTO&apos;90, A.J. Menezes and S.A. Vanstone, eds., volume 537 of LNCS, pp.2-21, Springer, Heidelberg, Aug. 1991. 10.1007\/3-540-38424-3_1","DOI":"10.1007\/3-540-38424-3_1"},{"key":"6","unstructured":"[6] A. Chakraborti, N. Datta, A. Jha, C. Mancillas-L\u00f3pez, M. Nandi, and Y. Sasaki, \u201cElastic-tweak: A framework for short tweak tweakable block cipher,\u201d IACR Cryptology ePrint Archive, 2019:440, 2019."},{"key":"7","doi-asserted-by":"publisher","unstructured":"[7] J. Daemen, L.R. Knudsen, and V. Rijmen, \u201cThe block cipher Square,\u201d FSE&apos;97, E. Biham, ed., volume 1267 of LNCS, pp.149-165, Springer, Heidelberg, Jan. 1997. 10.1007\/bfb0052343","DOI":"10.1007\/BFb0052343"},{"key":"8","doi-asserted-by":"crossref","unstructured":"[8] D. Goldenberg, S. Hohenberger, M. Liskov, E.C. Schwartz, and H. Seyalioglu, \u201cOn tweaking Luby-Rackoff blockciphers,\u201d ASIACRYPT 2007, K. Kurosawa, ed., volume 4833 of LNCS, pp.342-356, Springer, Heidelberg, Dec. 2007. 10.1007\/978-3-540-76900-2_21","DOI":"10.1007\/978-3-540-76900-2_21"},{"key":"9","doi-asserted-by":"crossref","unstructured":"[9] J. Guo, T. Peyrin, A. Poschmann, and M.J.B. Robshaw, \u201cThe LED block cipher,\u201d CHES 2011, B. Preneel and T. Takagi, eds., volume 6917 of LNCS, pp.326-341, Springer, Heidelberg, Sept.\/Oct. 2011. 10.1007\/978-3-642-23951-9_22","DOI":"10.1007\/978-3-642-23951-9_22"},{"key":"10","doi-asserted-by":"publisher","unstructured":"[10] D. Hong, J. Sung, S. Hong, J. Lim, S. Lee, B.-S. Koo, C. Lee, D. Chang, J. Lee, K. Jeong, H. Kim, J. Kim, and S. Chee, \u201cHIGHT: A new block cipher suitable for low-resource device,\u201d CHES 2006, L. Goubin and M. Matsui, eds., volume 4249 of LNCS, pp.46-59, Springer, Heidelberg, Oct. 2006. 10.1007\/11894063_4","DOI":"10.1007\/11894063_4"},{"key":"11","unstructured":"[11] Gurobi Optimization Inc., Gurobi optimizer 6.5. Official webpage, http:\/\/www.gurobi.com\/, 2015."},{"key":"12","doi-asserted-by":"crossref","unstructured":"[12] J. Jean, I. Nikolic, and T. Peyrin, \u201cTweaks and keys for block ciphers: The TWEAKEY framework,\u201d ASIACRYPT 2014, Part II, P. Sarkar and T. Iwata, eds., volume 8874 of LNCS, pp.274-288, Springer, Heidelberg, Dec. 2014. 10.1007\/978-3-662-45608-8_15","DOI":"10.1007\/978-3-662-45608-8_15"},{"key":"13","unstructured":"[13] Peyrin T Seurin Jean J, Nikoli\u0107 I, Deoxys v1.41, submitted to CAESAR, 2016."},{"key":"14","doi-asserted-by":"publisher","unstructured":"[14] L.R. Knudsen and D. Wagner, \u201cIntegral cryptanalysis,\u201d FSE 2002, J. Daemen and V. Rijmen, eds., volume 2365 of LNCS, pp.112-127, Springer, Heidelberg, Feb. 2002. 10.1007\/3-540-45661-9_9","DOI":"10.1007\/3-540-45661-9_9"},{"key":"15","doi-asserted-by":"crossref","unstructured":"[15] T. Krovetz and P. Rogaway, \u201cThe software performance of authenticated-encryption modes,\u201d FSE 2011, A. Joux, ed., volume 6733 of LNCS, pp.306-327, Springer, Heidelberg, Feb. 2011. 10.1007\/978-3-642-21702-9_18","DOI":"10.1007\/978-3-642-21702-9_18"},{"key":"16","doi-asserted-by":"publisher","unstructured":"[16] R. Lampe and Y. Seurin, \u201cTweakable blockciphers with asymptotically optimal security,\u201d FSE 2013, S. Moriai, ed., volume 8424 of LNCS, pp.133-151, Springer, Heidelberg, March 2014. 10.1007\/978-3-662-43933-3_8","DOI":"10.1007\/978-3-662-43933-3_8"},{"key":"17","doi-asserted-by":"crossref","unstructured":"[17] W. Landecker, T. Shrimpton, and R.S. Terashima, \u201cTweakable blockciphers with beyond birthday-bound security,\u201d CRYPTO 2012, R. Safavi-Naini and R. Canetti, eds., volume 7417 of LNCS, pp.14-30, Springer, Heidelberg, Aug. 2012. 10.1007\/978-3-642-32009-5_2","DOI":"10.1007\/978-3-642-32009-5_2"},{"key":"18","doi-asserted-by":"publisher","unstructured":"[18] M. Liskov, R.L. Rivest, and D. Wagner, \u201cTweakable block ciphers,\u201d CRYPTO 2002, M. Yung, ed., volume 2442 of LNCS, pp.31-46, Springer, Heidelberg, Aug. 2002. 10.1007\/3-540-45708-9_3","DOI":"10.1007\/3-540-45708-9_3"},{"key":"19","doi-asserted-by":"publisher","unstructured":"[19] M. Matsui, \u201cLinear cryptanalysis method for DES cipher,\u201d EUROCRYPT&apos;93, T. Helleseth, ed., volume 765 of LNCS, pp.386-397, Springer, Heidelberg, May 1994. 10.1007\/3-540-48285-7_33","DOI":"10.1007\/3-540-48285-7_33"},{"key":"20","doi-asserted-by":"publisher","unstructured":"[20] A. Mitsuda and T. Iwata, \u201cTweakable pseudorandom permutation from generalized Feistel structure,\u201d ProvSec 2008, J. Baek, F. Bao, K. Chen, and X. Lai, eds., volume 5324 of LNCS, pp.22-37, Springer, Heidelberg, Oct.\/Nov. 2008. 10.1007\/978-3-540-88733-1_2","DOI":"10.1007\/978-3-540-88733-1_2"},{"key":"21","doi-asserted-by":"crossref","unstructured":"[21] N. Mouha, Q. Wang, D. Gu, and B. Preneel, \u201cDifferential and linear cryptanalysis using mixed-integer linear programming,\u201d Information Security and Cryptology-7th International Conference, Inscrypt 2011, Revised Selected Papers, C. Wu, M. Yung, and D. Lin, eds., volume 7537 of LNCS, pp.57-76, Beijing, China, Springer, Nov.-Dec. 2011. 10.1007\/978-3-642-34704-7_5","DOI":"10.1007\/978-3-642-34704-7_5"},{"key":"22","unstructured":"[22] B. Schneier, D. Whiting, M. Bellare, T. Kohno, J. Callas, J. Walker, N. Ferguson, and S. Lucks, The SKEIN Hash Function Family, http:\/\/www.skein-hash.info, 2010."},{"key":"23","doi-asserted-by":"publisher","unstructured":"[23] K. Nyberg, \u201cGeneralized Feistel networks,\u201d ASIACRYPT&apos;96, K. Kim and T. Matsumoto, eds., volume 1163 of LNCS, pp.91-104, Springer, Heidelberg, Nov. 1996. 10.1007\/bfb0034838","DOI":"10.1007\/BFb0034838"},{"key":"24","unstructured":"[24] R. Schroeppel, An overview of the hasty pudding cipher, http:\/\/www.cs.arizona.edu\/~rcs\/hpc, 1998."},{"key":"25","doi-asserted-by":"publisher","unstructured":"[25] P. Rogaway, \u201cEfficient instantiations of tweakable blockciphers and refinements to modes OCB and PMAC,\u201d ASIACRYPT 2004, P.J. Lee, ed., volume 3329 of LNCS, pp.16-31, Springer, Heidelberg, Dec. 2004. 10.1007\/978-3-540-30539-2_2","DOI":"10.1007\/978-3-540-30539-2_2"},{"key":"26","doi-asserted-by":"crossref","unstructured":"[26] P. Rogaway, M. Bellare, J. Black, and T. Krovetz, \u201cOCB: A block-cipher mode of operation for efficient authenticated encryption,\u201d ACM CCS 01, pp.196-205, ACM Press, Nov. 2001. 10.1145\/501983.502011","DOI":"10.1145\/501983.502011"},{"key":"27","doi-asserted-by":"crossref","unstructured":"[27] K. Sakamoto, K. Minematsu, N. Shibata, M. Shigeri, H. Kubo, Y. Funabiki, A. Bogdanov, S. Morioka, and T. Isobe, \u201cTweakable TWINE: building a tweakable block cipher on generalized feistel structure,\u201d Advances in Information and Computer Security-14th International Workshop on Security, IWSEC 2019, Proceedings, Tokyo, Japan, pp.129-145, Aug. 2019. 10.1007\/978-3-030-26834-3_8","DOI":"10.1007\/978-3-030-26834-3_8"},{"key":"28","doi-asserted-by":"publisher","unstructured":"[28] T. Suzaki and K. Minematsu, \u201cImproving the generalized Feistel,\u201d FSE 2010, S. Hong and T. Iwata, eds., volume 6147 of LNCS, pp.19-39, Springer, Heidelberg, Feb. 2010. 10.1007\/978-3-642-13858-4_2","DOI":"10.1007\/978-3-642-13858-4_2"},{"key":"29","doi-asserted-by":"publisher","unstructured":"[29] T. Suzaki, K. Minematsu, S. Morioka, and E. Kobayashi, \u201cTWINE: A lightweight block cipher for multiple platforms,\u201d SAC 2012, L.R. Knudsen and H. Wu, eds., volume 7707 of LNCS, pp.339-354, Springer, Heidelberg, Aug. 2013. 10.1007\/978-3-642-35999-6_22","DOI":"10.1007\/978-3-642-35999-6_22"},{"key":"30","doi-asserted-by":"crossref","unstructured":"[30] Y. Todo, \u201cStructural evaluation by generalized integral property,\u201d EUROCRYPT 2015, Part I, E. Oswald and M. Fischlin, eds., volume 9056 of LNCS, pp.287-314, Springer, Heidelberg, April 2015. 10.1007\/978-3-662-46800-5_12","DOI":"10.1007\/978-3-662-46800-5_12"},{"key":"31","doi-asserted-by":"crossref","unstructured":"[31] L. Wang, J. Guo, G. Zhang, J. Zhao, and D. Gu, \u201cHow to build fully secure tweakable blockciphers from classical blockciphers,\u201d Advances in Cryptology-ASIACRYPT 2016-22nd International Conference on the Theory and Application of Cryptology and Information Security, Proceedings, Part I, J.H. Cheon and T. Takagi, eds., volume 10031 of Lecture Notes in Computer Science, pages 455-483, Hanoi, Vietnam, Dec. 2016. 10.1007\/978-3-662-53887-6_17","DOI":"10.1007\/978-3-662-53887-6_17"},{"key":"32","doi-asserted-by":"crossref","unstructured":"[32] Z. Xiang, W. Zhang, Z. Bao, and D. Lin, \u201cApplying MILP method to searching integral distinguishers based on division property for 6 lightweight block ciphers,\u201d ASIACRYPT 2016, Part I, J.H. Cheon and T. Takagi, eds., volume 10031 of LNCS, pp.648-678, Springer, Heidelberg, Dec. 2016. 10.1007\/978-3-662-53887-6_24","DOI":"10.1007\/978-3-662-53887-6_24"},{"key":"33","doi-asserted-by":"crossref","unstructured":"[33] Y. Zheng, T. Matsumoto, and H. Imai, \u201cImpossibility and optimality results on constructing pseudorandom permutations (extended abstract),\u201d EUROCRYPT&apos;89, J.-J. Quisquater and J. Vandewalle, eds., volume 434 of LNCS, pp.412-422, Springer, Heidelberg, April 1990. 10.1007\/3-540-46885-4_41","DOI":"10.1007\/3-540-46885-4_41"}],"container-title":["IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transfun\/E103.A\/12\/E103.A_2019EAP1141\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,5]],"date-time":"2020-12-05T05:31:58Z","timestamp":1607146318000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transfun\/E103.A\/12\/E103.A_2019EAP1141\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,1]]},"references-count":33,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2020]]}},"URL":"https:\/\/doi.org\/10.1587\/transfun.2019eap1141","relation":{},"ISSN":["0916-8508","1745-1337"],"issn-type":[{"type":"print","value":"0916-8508"},{"type":"electronic","value":"1745-1337"}],"subject":[],"published":{"date-parts":[[2020,12,1]]}}}