{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,2]],"date-time":"2024-08-02T09:08:21Z","timestamp":1722589701238},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"2-3","license":[{"start":{"date-parts":[[2018,11,19]],"date-time":"2018-11-19T00:00:00Z","timestamp":1542585600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2019,3]]},"DOI":"10.1007\/s10623-018-0582-2","type":"journal-article","created":{"date-parts":[[2018,11,19]],"date-time":"2018-11-19T08:58:33Z","timestamp":1542617913000},"page":"609-626","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Almost involutory recursive MDS diffusion layers"],"prefix":"10.1007","volume":"87","author":[{"given":"Kishan Chand","family":"Gupta","sequence":"first","affiliation":[]},{"given":"Sumit Kumar","family":"Pandey","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0003-3178-0727","authenticated-orcid":false,"given":"Ayineedi","family":"Venkateswarlu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,19]]},"reference":[{"key":"582_CR1","unstructured":"Augot D., Finiasz M.: Direct construction of recursive MDS diffusion layers using shortened BCH codes. In: FSE 2014, LNCS, vol. 8540, pp. 3\u201317. Springer (2015)."},{"key":"582_CR2","unstructured":"Barreto P., Rijmen V.: The Anubis Block Cipher. Submission to the NESSIE Project (2000)."},{"key":"582_CR3","unstructured":"Barreto P., Rijmen V.: The Khazad Legacy-Level Block Cipher. First Open NESSIE Workshop (2000)."},{"key":"582_CR4","unstructured":"Beierle C., Kranz T., Leander G.: Lightweight multiplication in \n \n \n \n $$GF(2^n)$$\n \n \n \n G\n F\n (\n \n 2\n n\n \n )\n \n \n \n with applications to MDS matrices. In: CRYPTO 2016, LNCS, vol. 9814, pp. 625\u2013653. Springer (2016)."},{"key":"582_CR5","unstructured":"Berger T.P.: Construction of recursive MDS diffusion layers from Gabidulin codes. In: INDOCRYPT 2013, LNCS, vol. 8250, pp. 274\u2013285. Springer (2013)."},{"key":"582_CR6","doi-asserted-by":"crossref","unstructured":"Daemen J., Rijmen V.: The design of Rijndael: AES\u2014the advanced encryption standard. In: Information Security and Cryptography. Springer (2002).","DOI":"10.1007\/978-3-662-04722-4"},{"key":"582_CR7","unstructured":"Guo J., Peyrin T., Poshmann A.: The PHOTON family of lightweight hash functions. In: CRYPTO 2011, LNCS, vol. 6841, pp. 222\u2013239. Springer (2011)."},{"key":"582_CR8","unstructured":"Guo J., Peyrin T., Poshmann A., Robshaw M.J.B.: The LED block cipher. In: CHES 2011, LNCS, vol. 6917, pp. 326\u2013341. Springer (2011)."},{"key":"582_CR9","unstructured":"Gupta K.C., Ray I.G.: On constructions of MDS matrices from companion matrices for lightweight cryptography. In: CD-ARES Workshops 2013, LNCS, vol. 8128, pp. 29\u201343. Springer (2013)."},{"key":"582_CR10","unstructured":"Gupta K.C., Ray I.G.: On constructions of involutory MDS matrices. In: AFRICACRYPT, LNCS, vol. 7918, pp. 43\u201360. Springer (2013)."},{"issue":"2","key":"582_CR11","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/s12095-014-0116-3","volume":"7","author":"KC Gupta","year":"2015","unstructured":"Gupta K.C., Ray I.G.: Cryptographically significant MDS matrices based on circulant and circulant-like matrices for lightweight applications. Cryptogr. Commun. 7(2), 257\u2013287 (2015).","journal-title":"Cryptogr. Commun."},{"issue":"1\u20132","key":"582_CR12","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/s10623-016-0233-4","volume":"82","author":"KC Gupta","year":"2017","unstructured":"Gupta K.C., Pandey S.K., Venkateswarlu A.: On the direct construction of recursive MDS matrices. Des. Codes Cryptogr. 82(1\u20132), 77\u201394 (2017).","journal-title":"Des. Codes Cryptogr."},{"issue":"1\u20132","key":"582_CR13","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/s10623-016-0261-0","volume":"82","author":"KC Gupta","year":"2017","unstructured":"Gupta K.C., Pandey S.K., Venkateswarlu A.: Towards a general construction of recursive MDS diffusion layers. Des. Codes Cryptogr. 82(1\u20132), 179\u2013195 (2017).","journal-title":"Des. Codes Cryptogr."},{"key":"582_CR14","unstructured":"Junod P., Vaudenay S.: Perfect diffusion primitives for block ciphers. In: SAC 2004, LNCS, vol. 3357, pp. 84\u201399. Springer (2004)."},{"key":"582_CR15","unstructured":"Khoo K., Peyrin T., Poschmann A., Yap H.: FOAM: searching for hardware-optimal SPN Structures and components with a fair comparison. In: CHES 2014, LNCS, vol. 8731, pp. 433\u2013450. Springer (2014)."},{"key":"582_CR16","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/s12095-008-0005-8","volume":"1","author":"N Kolokotronis","year":"2009","unstructured":"Kolokotronis N., Limniotis K., Kalouptsidis N.: Factorization of determinants over finite fields and application in stream ciphers. Cryptogr. Commun. 1, 175\u2013205 (2009).","journal-title":"Cryptogr. Commun."},{"key":"582_CR17","volume-title":"Finite Fields","author":"R Lidl","year":"1997","unstructured":"Lidl R., Niederreiter H.: Finite Fields, 2nd edn. Cambridge University Press, Cambridge (1997).","edition":"2"},{"key":"582_CR18","volume-title":"The Theory of Error-Correcting Codes","author":"FJ MacWilliams","year":"1977","unstructured":"MacWilliams F.J., Sloane N.J.A.: The Theory of Error-Correcting Codes. North Holland Publishing Co., New York (1977)."},{"issue":"2","key":"582_CR19","first-page":"109","volume":"9","author":"J Nakahara","year":"2009","unstructured":"Nakahara J., Abraho E.: A new involutory MDS matrix for the AES. J Netw. Secur. 9(2), 109\u2013116 (2009).","journal-title":"J Netw. Secur."},{"key":"582_CR20","unstructured":"Rijmen V., Daemen J., Preneel B., Bosselaers A., De Win E.: The cipher SHARK. In: FSE 1996, LNCS, vol. 1039, pp. 99\u2013111. Springer (1996)."},{"key":"582_CR21","unstructured":"Sajadieh M., Dakhilalian M., Mala H., Sepehrdad P.: Recursive diffusion layers for block ciphers and hash functions. In: FSE 2012, LNCS, vol. 7549, pp. 385\u2013401. Springer (2012)."},{"key":"582_CR22","unstructured":"Sarkar S., Syed H., Sadhukhan R., Mukhopadhyay D.: Lightweight design choices for LED-like block ciphers. In: INDOCRYPT 2017, LNCS, vol. 10698, pp. 267\u2013281. Springer (2017)."},{"key":"582_CR23","unstructured":"Sim S.M., Khoo K., Oggier F., Peyrin T.: Lightweight MDS involution matrices. In: FSE 2015, LNCS, vol. 9054, pp. 471\u2013493. Springer (2015)."},{"key":"582_CR24","unstructured":"Wu S., Wang M., Wu W.: Recursive diffusion layers for (lightweight) block ciphers and hash functions. In: SAC 2013, LNCS, vol. 7707, pp. 355\u2013371. Springer (2013)."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-018-0582-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-018-0582-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-018-0582-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,19]],"date-time":"2019-11-19T00:23:35Z","timestamp":1574123015000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-018-0582-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,19]]},"references-count":24,"journal-issue":{"issue":"2-3","published-print":{"date-parts":[[2019,3]]}},"alternative-id":["582"],"URL":"https:\/\/doi.org\/10.1007\/s10623-018-0582-2","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,11,19]]},"assertion":[{"value":"22 December 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 July 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 November 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 November 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}