{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:40:38Z","timestamp":1738777238561,"version":"3.37.0"},"reference-count":12,"publisher":"Academy Publisher","issue":"10","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JNW"],"DOI":"10.4304\/jnw.9.10.2788-2795","type":"journal-article","created":{"date-parts":[[2014,10,6]],"date-time":"2014-10-06T14:03:16Z","timestamp":1412604196000},"source":"Crossref","is-referenced-by-count":0,"title":["An Improvement Crypton Protocol with Higher Security Margin"],"prefix":"10.4304","volume":"9","author":[{"given":"Xiaoying","family":"Wang","sequence":"first","affiliation":[]},{"given":"Danqi","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Qingjie","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Ling","family":"Bai","sequence":"additional","affiliation":[]}],"member":"2838","published-online":{"date-parts":[[2014,10,6]]},"reference":[{"key":"ref1","first-page":"31","article-title":"A revised version of CRYPTON: CRYPTON V1. 0","volume-title":"Fast Software Encryption \u2013 FSE 99 vol LNCS 1636","author":"Lim","year":"1999","unstructured":"[2] C. H. Lim, \"A revised version of CRYPTON: CRYPTON V1. 0\". In L. Knudsen, editor, Fast Software Encryption \u2013 FSE'99, vol. LNCS 1636, pp. 31\u201345, Springer-Verlag, 1999."},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48519-8_4"},{"key":"ref3","first-page":"446","article-title":"\"Truncated Differential Attacks on 8-Round CRYPTON\", Information Security And Cryptology-Icisc 2003","volume":"2971","author":"Kim","year":"2004","unstructured":"[6] Jongsung Kim, Seokhie Hong, Sangjin Lee, Junghwan Song and Hyungjin Yang, \"Truncated Differential Attacks on 8-Round CRYPTON\", Information Security And Cryptology-Icisc 2003, LNCS, Vol. 2971, pp. 446-456, 2004","journal-title":"LNCS"},{"key":"ref4","first-page":"13","article-title":"Partitioning Cryptanalysis","volume-title":"Fast Software Encryption- FSE 97","year":"1997","unstructured":"[7] C. Harpes J. L. Massey, \"Partitioning Cryptanalysis\". In Fast Software Encryption- FSE'97, pp. 13, Springer Verlag, Haifa, Israel, January 1997."},{"key":"ref5","article-title":"AES proposal: Rijndael","volume-title":"The First AES Candidate Conference","author":"Daemen","year":"1998","unstructured":"[8] J. Daemen and V. Rijmen. \"AES proposal: Rijndael\". In The First AES Candidate Conference, 1998."},{"key":"ref6","volume-title":"\"A statistical test suite for random and pseudorandom number generators for cryptographic applications\" NIST special publication 800-22 National Institute of Standards and Technology","author":"Rukhin","year":"2001","unstructured":"[12] Rukhin, A., Soto, J., Nechvatal, J., Smid, M., Barker, E., Leigh, S., Levenson, M., Vangel, M., Banks, D., Heckert, A., Dray, J., Vo, S, \"A statistical test suite for random and pseudorandom number generators for cryptographic applications\". NIST special publication 800-22, National Institute of Standards and Technology (NIST), Gaithersburg, MD, USA (2001);"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1080\/0161-118791861749"},{"key":"ref8","first-page":"344","volume-title":"Dmitry Khovratovich Christian Rechberger \"Biclique Cryptanalysis of the Full AES\" ASIACRYPT 2011 LNCS 7073","author":"Bogdanov","year":"2011","unstructured":"[15] Andrey Bogdanov, Dmitry Khovratovich, Christian Rechberger, \"Biclique Cryptanalysis of the Full AES\", ASIACRYPT 2011, LNCS 7073, Springer, pp. 344-371, 2011."},{"key":"ref9","first-page":"392","volume-title":"Ga\u00ebtan Leurent Christian Rechberger \"Narrow-Bicliques","author":"Khovratovich","year":"2012","unstructured":"[16] Dmitry Khovratovich, Ga\u00ebtan Leurent, Christian Rechberger, \"Narrow-Bicliques: Cryptanalysis of Full IDEA\", Eurocrypt 2012, LNCS 7237, Springer, pp 392-410, 2012."},{"key":"ref10","first-page":"365","volume-title":"Bonwook Koo Daesung Kwon \"Biclique Attack on the Full HIGHT\" ICISC 2011 LNCS 7259","author":"Hong","year":"2011","unstructured":"[17] Deukjo Hong, Bonwook Koo, Daesung Kwon, \"Biclique Attack on the Full HIGHT\", ICISC 2011, LNCS 7259, Springer, pp. 365\u2013374, 2011."},{"key":"ref11","first-page":"1","volume-title":"Wenling Wu Xiaoli Yu Lei Zhang \"Security on LBlock against Biclique Cryptanalysis\" WISA 2012 LNCS 7690","author":"Wang","year":"2012","unstructured":"[18] Yanfeng Wang, Wenling Wu, Xiaoli Yu, Lei Zhang, \"Security on LBlock against Biclique Cryptanalysis\", WISA 2012, LNCS 7690, Springer, pp. 1\u201314, 2012."},{"key":"ref12","volume-title":"Christian Forler Eik List Stefan Lucks and Jakob Wenzel \"A Framework for Automated Independent-Biclique Cryptanalysis","author":"Abed","year":"2013","unstructured":"[19] Farzaneh Abed, Christian Forler, Eik List, Stefan Lucks and Jakob Wenzel, \"A Framework for Automated Independent-Biclique Cryptanalysis\", FSE 2013."}],"container-title":["Journal of Networks"],"original-title":[],"deposited":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:08:18Z","timestamp":1738775298000},"score":1,"resource":{"primary":{"URL":"https:\/\/dblp.org\/db\/journals\/jnw\/index.html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10,6]]},"references-count":12,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2014,10,6]]}},"URL":"https:\/\/doi.org\/10.4304\/jnw.9.10.2788-2795","relation":{},"ISSN":["1796-2056"],"issn-type":[{"type":"print","value":"1796-2056"}],"subject":[],"published":{"date-parts":[[2014,10,6]]}}}