{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,4]],"date-time":"2025-01-04T05:37:37Z","timestamp":1735969057826,"version":"3.32.0"},"reference-count":11,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Fundamentals"],"published-print":{"date-parts":[[2025,1,1]]},"DOI":"10.1587\/transfun.2024eap1001","type":"journal-article","created":{"date-parts":[[2024,7,11]],"date-time":"2024-07-11T22:14:17Z","timestamp":1720736057000},"page":"11-19","source":"Crossref","is-referenced-by-count":0,"title":["New Distinguishing Attacks on Round-Reduced Sparkle384 and Sparkle512 Permutations"],"prefix":"10.1587","volume":"E108.A","author":[{"given":"Donghoon","family":"CHANG","sequence":"first","affiliation":[{"name":"National Institute of Standards and Technology"},{"name":"Strativia"},{"name":"Department of Computer Science, Indraprastha Institute of Information Technology Delhi (IIIT-Delhi)"}]},{"given":"Deukjo","family":"HONG","sequence":"additional","affiliation":[{"name":"Smart Grid Research Center, Jeonbuk National University"}]},{"given":"Jinkeon","family":"KANG","sequence":"additional","affiliation":[{"name":"National Institute of Standards and Technology"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"crossref","unstructured":"[1] C. Beierle, A. Biryukov, L.C. dos Santos, J. Gro\u00dfsch\u00e4dl, L. Perrin, A. Udovenko, V. Velichkov, and Q. Wang, \u201cSCHWAEMM and ESCH: Lightweight authenticated encryption and hashing using the sparkle permutation family (Version 1.2),\u201d Submission to the NIST Lightweight Cryptography Standardization Process, 2021. https:\/\/csrc.nist.gov\/Projects\/lightweight-cryptography\/finalists","DOI":"10.46586\/tosc.v2020.iS1.208-261"},{"key":"2","doi-asserted-by":"crossref","unstructured":"[3] D. Dinu, L. Perrin, A. Udovenko, V. Velichkov, J. Gro\u00dfsch\u00e4dl, and A. Biryukov, \u201cDesign strategies for ARX with provable bounds: Sparx and LAX,\u201d Jung Hee Cheon and Tsuyoshi Takagi, eds., Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, Proceedings, Part I, volume 10031 of Lecture Notes in Computer Science, pp.484-513, Dec. 2016. 10.1007\/978-3-662-53887-6_18","DOI":"10.1007\/978-3-662-53887-6_18"},{"key":"3","doi-asserted-by":"publisher","unstructured":"[4] M. Huang, Z. Xu, and L. Wang, \u201cOn the probability and automatic search of rotational-XOR cryptanalysis on ARX ciphers,\u201d Comput. J., vol.65, no.12, pp.3062-3080, 2022. 10.1093\/comjnl\/bxab126","DOI":"10.1093\/comjnl\/bxab126"},{"key":"4","unstructured":"[5] J. Kang, Finding Right Pairs for Sparkle Permutations, GitHub repository. https:\/\/github.com\/JinkeonKang\/Sparkle"},{"key":"5","doi-asserted-by":"crossref","unstructured":"[6] Y. Liu, S. Sun, and C. Li, \u201cRotational cryptanalysis from a differential-linear perspective - practical distinguishers for round-reduced friet, xoodoo, and alzette,\u201d Anne Canteaut and Fran\u00e7ois-XavierStandaert, eds., Advances in Cryptology - EUROCRYPT 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, Proceedings, Part I, volume 12696 of Lecture Notes in Computer Science, pp.741-770, Springer, Oct. 2021. 10.1007\/978-3-030-77870-5_26","DOI":"10.1007\/978-3-030-77870-5_26"},{"key":"6","doi-asserted-by":"publisher","unstructured":"[7] M. Matsui, \u201cLinear cryptanalysis method for DES cipher,\u201d T. Helleseth, ed., Advances in Cryptology - EUROCRYPT \u201993, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, Proceedings, volume 765 of Lecture Notes in Computer Science, pp.386-397, Springer, May 1993. 10.1007\/3-540-48285-7_33","DOI":"10.1007\/3-540-48285-7_33"},{"key":"7","doi-asserted-by":"crossref","unstructured":"[8] Z. Niu, S. Sun, Y. Liu, and C. Li, \u201cRotational differential-linear distinguishers of ARX ciphers with arbitrary output linear masks,\u201d Y. Dodis and T. Shrimpton, eds., Advances in Cryptology - CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Santa Barbara, CA, USA, Proceedings, Part I, volume 13507 of Lecture Notes in Computer Science, pp.3-32, Springer, Aug. 2022. 10.1007\/978-3-031-15802-5_1","DOI":"10.1007\/978-3-031-15802-5_1"},{"key":"8","doi-asserted-by":"crossref","unstructured":"[9] A. Schrottenloher and M. Stevens, \u201cSimplified MITM modeling for permutations: New (quantum) attacks,\u201d Y. Dodis and T. Shrimpton, eds., Advances in Cryptology - CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Santa Barbara, CA, USA, Proceedings, Part III, volume 13509 of Lecture Notes in Computer Science, pp.717-747. Springer, Aug. 2022. 10.1007\/978-3-031-15982-4_24","DOI":"10.1007\/978-3-031-15982-4_24"},{"key":"9","unstructured":"[10] T. Speel, \u201cCryptanalysis of sparkle\u2019s ARX-box Alzette,\u201d Bachelor Thesis, Radboud University, June 2022. https:\/\/www.cs.ru.nl\/bachelors-theses\/2022\/Ties_Speel___1020150___Cryptanalysis_of_SPARKLE_ARX-Box_Alzette.pdf"},{"key":"10","doi-asserted-by":"crossref","unstructured":"[11] M.S. Turan, K. McKay, D. Chang, L.E. Bassham, J. Kang, N.D. Waller, J.M. Kelsey, and D. Hong, \u201cStatus report on the final round of the nist lightweight cryptography standardization process,\u201d NIST IR 8454, June 2023. https:\/\/doi.org\/10.6028\/NIST.IR.8454 10.6028\/NIST.IR.8454","DOI":"10.6028\/NIST.IR.8454"},{"key":"11","unstructured":"[12] Z. Xu, Y. Li, L. Jiao, M. Wang, and W. Meier, \u201cDo NOT misuse the markov cipher assumption\u2006\u2014\u2006Automatic search for differential and impossible differential characteristics in ARX ciphers,\u201d IACR Cryptol. ePrint Arch., p.135, 2022."}],"container-title":["IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transfun\/E108.A\/1\/E108.A_2024EAP1001\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,4]],"date-time":"2025-01-04T03:18:49Z","timestamp":1735960729000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transfun\/E108.A\/1\/E108.A_2024EAP1001\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,1]]},"references-count":11,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.1587\/transfun.2024eap1001","relation":{},"ISSN":["0916-8508","1745-1337"],"issn-type":[{"type":"print","value":"0916-8508"},{"type":"electronic","value":"1745-1337"}],"subject":[],"published":{"date-parts":[[2025,1,1]]},"article-number":"2024EAP1001"}}