{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,4]],"date-time":"2025-04-04T15:25:14Z","timestamp":1743780314529},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.23919\/isita.2018.8664404","type":"proceedings-article","created":{"date-parts":[[2019,3,11]],"date-time":"2019-03-11T19:49:11Z","timestamp":1552333751000},"page":"447-451","source":"Crossref","is-referenced-by-count":3,"title":["Integral Cryptanalysis of Reduced-round KASUMI"],"prefix":"10.23919","author":[{"given":"Nobuyuki","family":"SUGIO","sequence":"first","affiliation":[]},{"given":"Yasutaka","family":"IGARASHI","sequence":"additional","affiliation":[]},{"given":"Toshinobu","family":"KANEKO","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"A Single-Key Attack on 6-Round KASUMI","author":"saito","year":"0","journal-title":"International Association for Cryptologic Research (IACR) Cryptology ePrint Archive Report 2011\/584"},{"key":"ref11","first-page":"234","article-title":"Meet-in-the-Middle Technique for Integral Attacks against Feistel Ciphers","author":"sasaki","year":"2012","journal-title":"Proc the 19th International Conference Selected Areas in Cryptography (SAC 2012) LNCS 7707"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1093\/ietfec\/e90-a.1.14"},{"key":"ref13","first-page":"267","article-title":"New Integral Characteristics of KASUMI Derived by Division Property","author":"sugio","year":"2016","journal-title":"Proc the 17th World Conference on Information Security Applications (WISA 2016) LNCS 10144"},{"key":"ref14","first-page":"287","article-title":"Structural Evaluation by Generalized Integral Property","author":"todo","year":"2015","journal-title":"Proc the 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2015) LNCS 9056"},{"key":"ref15","first-page":"413","article-title":"Integral Cryptanalysis on Full MISTY1","author":"todo","year":"2015","journal-title":"Proc the 35th Annual Cryptology Conference (CRYPTO 2015) LNCS 9215"},{"key":"ref16","first-page":"1","article-title":"Multidimensional zero-correlation linear cryptanalysis of the block cipher KASUMI","author":"yi","year":"2015","journal-title":"IET Journals on Information Security"},{"key":"ref4","first-page":"393","article-title":"A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony","author":"dunkelman","year":"2010","journal-title":"Proc the 30th Annual Cryptology Conference (CRYPTO 2010) LNCS 6223"},{"key":"ref3","first-page":"149","article-title":"The block cipher Square","author":"daemen","year":"1997","journal-title":"Proc the 4th International Workshop on Fast Software Encryption (FSE &#x2019;97) LNCS 1267"},{"key":"ref6","first-page":"112","article-title":"Integral cryptanalysis","author":"knudsen","year":"2002","journal-title":"Proc the 9th International Workshop on Fast Software Encryption (FSE 2002) LNCS 2365"},{"key":"ref5","first-page":"222","article-title":"Improved Cryptanalysis of the Block Cipher KASUMI","author":"jia","year":"2012","journal-title":"Proc the 19th International Conference on Selected Areas in Cryptography (SAC 2012) LNCS 7707"},{"key":"ref8","first-page":"54","article-title":"New Block Encryption Algorithm MISTY","author":"matsui","year":"1997","journal-title":"4th International Workshop on Fast Software Encryption LNCS 1267"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44987-6_20"},{"key":"ref2","first-page":"443","article-title":"A Related-Key Rectangle Attack on the Full KASUMI","author":"biham","year":"2005","journal-title":"Proc the 11th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2005) LNCS 3788"},{"journal-title":"Specification of the 3GPP Confidentiality and Integrity Algorithms Document 2 KASUMI Specification","year":"0","key":"ref1"},{"first-page":"197","article-title":"Advanced Encryption Standard (AES)","year":"2001","key":"ref9"}],"event":{"name":"2018 International Symposium on Information Theory and Its Applications (ISITA)","start":{"date-parts":[[2018,10,28]]},"location":"Singapore","end":{"date-parts":[[2018,10,31]]}},"container-title":["2018 International Symposium on Information Theory and Its Applications (ISITA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8660385\/8664205\/08664404.pdf?arnumber=8664404","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T01:25:35Z","timestamp":1643246735000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8664404\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":16,"URL":"https:\/\/doi.org\/10.23919\/isita.2018.8664404","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}