{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:21:36Z","timestamp":1740122496863,"version":"3.37.3"},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2023,8,5]],"date-time":"2023-08-05T00:00:00Z","timestamp":1691193600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,8,5]],"date-time":"2023-08-05T00:00:00Z","timestamp":1691193600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.1007\/s10623-023-01277-7","type":"journal-article","created":{"date-parts":[[2023,8,5]],"date-time":"2023-08-05T07:03:11Z","timestamp":1691218991000},"page":"3881-3899","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Structural evaluation of AES-like ciphers against mixture differential cryptanalysis"],"prefix":"10.1007","volume":"91","author":[{"given":"Xiaofeng","family":"Xie","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6044-9083","authenticated-orcid":false,"given":"Tian","family":"Tian","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,8,5]]},"reference":[{"key":"1277_CR1","doi-asserted-by":"crossref","unstructured":"Bao Z., Guo J., List E.: Extended truncated-differential distinguishers on round-reduced AES. IACR Trans. Symmetric Cryptol. 2020(3), 197\u2013261 (2020)","DOI":"10.46586\/tosc.v2020.i3.197-261"},{"key":"1277_CR2","doi-asserted-by":"crossref","unstructured":"Bardeh, N.G., R\u00f8njom, S.: The exchange attack: how to distinguish six rounds of AES with $$2^{88.2}$$ chosen plaintexts. In: Galbraith, S.D., Moriai, S. (eds.) Advances in Cryptology-ASIACRYPT 2019-Proceedings of the 25th International Conference on the Theory and Application of Cryptology and Information Security, December 8\u201312, Part III, Lecture Notes in Computer Science, vol. 11923, pp. 347\u2013370. Springer, Kobe, Japan (2019)","DOI":"10.1007\/978-3-030-34618-8_12"},{"key":"1277_CR3","doi-asserted-by":"crossref","unstructured":"Bar-On, A., Dunkelman, O., Keller, N., Ronen, E., Shamir, A.: Improved key recovery attacks on reduced-round AES with practical data and memory complexities. In: Shacham, H., Boldyreva, A. (eds.) Advances in Cryptology-CRYPTO 2018-Proceedings of the 38th Annual International Cryptology Conference, August 19\u201323, Part II, Lecture Notes in Computer Science, vol. 10992, pp. 185\u2013212. Springer, Santa Barbara, CA, USA (2018)","DOI":"10.1007\/978-3-319-96881-0_7"},{"key":"1277_CR4","unstructured":"Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., Wingers, L: SIMON and SPECK: block ciphers for the internet of things. IACR Cryptol. Arch. p. 585 (2015)"},{"key":"1277_CR5","doi-asserted-by":"crossref","unstructured":"Biham, E., Biryukov, A., Dunkelman, O., Richardson, E., Shamir, A.: Initial observations on skipjack: cryptanalysis of skipjack-3xor. In: Tavares S.E., Meijer H. (eds.) Proceedings of the Selected Areas in Cryptography \u201998, SAC\u201998, Kingston, Ontario, Canada, August 17\u201318, Lecture Notes in Computer Science, vol. 1556, pp. 362\u2013376. Springer, Berlin (1998)","DOI":"10.1007\/3-540-48892-8_27"},{"key":"1277_CR6","doi-asserted-by":"crossref","unstructured":"Biham, E., Biryukov, A., Shamir, A.: Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. In: Stern, J. (ed.) Advances in Cryptology-EUROCRYPT \u201999-Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, May 2\u20136, Lecture Notes in Computer Science, vol. 1592, pp. 12\u201323. Springer, Prague, Czech Republic (1999)","DOI":"10.1007\/3-540-48910-X_2"},{"key":"1277_CR7","doi-asserted-by":"crossref","unstructured":"Blondeau, C., G\u00e9rard, B.: Multiple differential cryptanalysis: theory and practice. In: Joux, A. (ed.) Fast Software Encryption-18th International Workshop, FSE 2011, February 13\u201316, Revised Selected Papers, Lecture Notes in Computer Science, vol. 6733, pp. 35\u201354. Springer, Lyngby, Denmark (2011)","DOI":"10.1007\/978-3-642-21702-9_3"},{"key":"1277_CR8","doi-asserted-by":"crossref","unstructured":"Daemen J., Rijmen V.: The Design of Rijndael-The Advanced Encryption Standard (AES). Information Security and Cryptography, 2nd edn Springer, Berlin (2020)","DOI":"10.1007\/978-3-662-60769-5"},{"key":"1277_CR9","doi-asserted-by":"crossref","unstructured":"Dunkelman, O., Keller, N., Ronen, E., Shamir, A.: The retracing boomerang attack. In: Canteaut, A., Ishai, Y. (eds.) Advances in Cryptology-EUROCRYPT 2020-Proceedings of the 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, May 10\u201314, Part I, Lecture Notes in Computer Science, vol. 12105, pp. 280\u2013309. Springer, Zagreb, Croatia (2020)","DOI":"10.1007\/978-3-030-45721-1_11"},{"key":"1277_CR10","doi-asserted-by":"crossref","unstructured":"Grassi L., Rechberger C., R\u00f8njom S.: Subspace trail cryptanalysis and its applications to AES. IACR Trans. Symmetric Cryptol. 2016(2), 192\u2013225 (2016)","DOI":"10.46586\/tosc.v2016.i2.192-225"},{"key":"1277_CR11","doi-asserted-by":"crossref","unstructured":"Grassi, L., Rechberger, C., R\u00f8njom, S.: A new structural-differential property of 5-round AES. In: Jean-S\u00e9bastien, C., Nielsen, J.B. (eds.) Advances in Cryptology-EUROCRYPT 2017-Proceedings of the 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30\u2013May 4, Part II, Lecture Notes in Computer Science, vol. 10211, pp. 289\u2013317 (2017)","DOI":"10.1007\/978-3-319-56614-6_10"},{"key":"1277_CR12","doi-asserted-by":"crossref","unstructured":"Grassi L.: Mixture differential cryptanalysis: a new approach to distinguishers and attacks on round-reduced AES. IACR Trans. Symmetric Cryptol. 2018(2), 133\u2013160 (2018)","DOI":"10.46586\/tosc.v2018.i2.133-160"},{"key":"1277_CR13","doi-asserted-by":"crossref","unstructured":"Guo, J., Song, L., Wang, H.: Key structures: improved related-key boomerang attack against the full AES-256. In: Nguyen, K., Yang, G., Guo, F., Susilo, W. (eds.) Information Security and Privacy-Proceedings of the 27th Australasian Conference, ACISP 2022, November 28\u201330, Lecture Notes in Computer Science, vol. 13494, pp. 3\u201323. Springer, Wollongong, NSW, Australia (2022)","DOI":"10.1007\/978-3-031-22301-3_1"},{"key":"1277_CR14","doi-asserted-by":"crossref","unstructured":"Moghaddam A.E., Ahmadian Z.: New automatic search method for truncated-differential characteristics application to midori. SKINNY CRAFT Comput. J. 63(12), 1813\u20131825 (2020)","DOI":"10.1093\/comjnl\/bxaa004"},{"key":"1277_CR15","doi-asserted-by":"crossref","unstructured":"R\u00f8njom, S., Bardeh, N.G., Helleseth, T.: Yoyo tricks with AES. In: Takagi, T., Peyrin, T. (eds.) Advances in Cryptology-ASIACRYPT 2017-Proceedings of the 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3\u20137, Part I, Lecture Notes in Computer Science, vol. 10624, pp. 217\u2013243. Springer (2017)","DOI":"10.1007\/978-3-319-70694-8_8"},{"key":"1277_CR16","doi-asserted-by":"crossref","unstructured":"Sun, B., Liu, M., Guo, J., Rijmen, V,, Li, R.: Provable security evaluation of structures against impossible differential and zero correlation linear cryptanalysis. In: Fischlin, M., Coron, J. (eds.) Advances in Cryptology-EUROCRYPT 2016-Proceedings of the 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, May 8\u201312, Part I, Lecture Notes in Computer Science, vol. 9665, pp. 196\u2013213. Springer, Vienna, Austria (2016)","DOI":"10.1007\/978-3-662-49890-3_8"},{"key":"1277_CR17","unstructured":"Tian T., Qi W., Ye C., Xie X.: Spring: a family of small hardware-oriented block ciphers based on NFSRs. J. Cryptol. Res. 2019(6), 815\u2013834 (2019)"},{"key":"1277_CR18","doi-asserted-by":"crossref","unstructured":"Zhao B., Dong X., Jia K.: New related-tweakey boomerang and rectangle attacks on deoxys-bc including BDT effect. IACR Trans. Symmetric Cryptol. 2019(3), 121\u2013151 (2019)","DOI":"10.46586\/tosc.v2019.i3.121-151"},{"key":"1277_CR19","doi-asserted-by":"crossref","unstructured":"Zhao, B., Dong, X., Jia, K., Meier, W.: Improved related-tweakey rectangle attacks on reduced-round deoxys-bc-384 and deoxys-i-256-128. IACR Cryptol. Arch. p. 103 (2020)","DOI":"10.1007\/978-3-030-35423-7_7"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-023-01277-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10623-023-01277-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-023-01277-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,4]],"date-time":"2023-11-04T12:04:38Z","timestamp":1699099478000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10623-023-01277-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,5]]},"references-count":19,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2023,12]]}},"alternative-id":["1277"],"URL":"https:\/\/doi.org\/10.1007\/s10623-023-01277-7","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"type":"print","value":"0925-1022"},{"type":"electronic","value":"1573-7586"}],"subject":[],"published":{"date-parts":[[2023,8,5]]},"assertion":[{"value":"27 April 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 July 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 July 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 August 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}