{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T09:33:42Z","timestamp":1648805622856},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2018,11,16]],"date-time":"2018-11-16T00:00:00Z","timestamp":1542326400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Syst Sci Complex"],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1007\/s11424-018-7170-4","type":"journal-article","created":{"date-parts":[[2018,11,20]],"date-time":"2018-11-20T07:56:21Z","timestamp":1542700581000},"page":"970-984","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A New Distinguishing Attack on Grain-V1 with 111 Initialization Rounds"],"prefix":"10.1007","volume":"32","author":[{"given":"Zhen","family":"Ma","sequence":"first","affiliation":[]},{"given":"Tian","family":"Tian","sequence":"additional","affiliation":[]},{"given":"Wenfeng","family":"Qi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,16]]},"reference":[{"issue":"1","key":"7170_CR1","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1504\/IJWMC.2007.013798","volume":"2","author":"M Hell","year":"2007","unstructured":"Hell M, Johansson T, and Meier W, Grain: A stream cipher for constrained environments, International Journal of Wireless and Mobile Computing (IJWMC), 2007, 2(1): 86\u201393.","journal-title":"International Journal of Wireless and Mobile Computing (IJWMC)"},{"key":"7170_CR2","volume-title":"Cryptanalysis of Grain using Time\/Memory\/Data tradeoffs","author":"T E Bj\u00f8rstad","year":"2008","unstructured":"Bj\u00f8rstad T E, Cryptanalysis of Grain using Time\/Memory\/Data tradeoffs, 2008, available at: \n http:\/\/www.ecrypt.eu.org\/stream\/grainp3.html\n \n , 2016."},{"issue":"2","key":"7170_CR3","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1049\/iet-ifs.2011.0107","volume":"6","author":"M J Mihaljevi\u0107","year":"2012","unstructured":"Mihaljevi\u0107 M J, Gangopadhyay S, Paul G, et al., Internal state recovery of Grain-v1 employing normality order of the filter function, IET Inf. Secur., 2012, 6(2): 55\u201364.","journal-title":"IET Inf. Secur."},{"issue":"11","key":"7170_CR4","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1109\/CC.2016.7781728","volume":"13","author":"L Ding","year":"2016","unstructured":"Ding L, Jin C H, Guan J, et al, New state recovery attacks on the Grain v1 stream cipher, China Communications, 2016, 13(11): 180\u2013188.","journal-title":"China Communications"},{"issue":"4","key":"7170_CR5","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1049\/iet-ifs.2014.0239","volume":"10","author":"M Rahimi","year":"2016","unstructured":"Rahimi M, Barmshory M, Mansouri M H, et al., Dynamic cube attack on Grain-v1, IET Inf. Secur., 2016, 10(4): 165\u2013172.","journal-title":"IET Inf. Secur."},{"key":"7170_CR6","first-page":"130","volume":"2010","author":"S Knellwolf","year":"2010","unstructured":"Knellwolf S, Meier W and Naya-Plasencia M, Conditional differential cryptanalysis of NLFSRbased cryptosystems, Proc. Advances in Cryptology \u2014 ASIACRYPT 2010, 2010(LNCS 6477): 130\u2013145.","journal-title":"Proc. Advances in Cryptology \u2014 ASIACRYPT"},{"key":"7170_CR7","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1007\/978-3-319-08344-5_3","volume":"2014","author":"S Banik","year":"2014","unstructured":"Banik S, Some insights into differential cryptanalysis of Grain v1, Proc. Information Security and Privacy \u2014 19th Australasian Conf., ACISP, 2014, 2014(LNCS 8544): 34\u201349.","journal-title":"Proc. Information Security and Privacy \u2014 19th Australasian Conf., ACISP"},{"issue":"1","key":"7170_CR8","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/s12095-015-0146-5","volume":"8","author":"S Banik","year":"2016","unstructured":"Banik S, Conditional differential cryptanalysis of 105 round Grain v1, Cryptogr. Commun., 2016, 8(1): 113\u2013137.","journal-title":"Cryptogr. Commun."},{"key":"7170_CR9","volume-title":"Proc. 11th Int. Conf. Informatino System Security","author":"S Sarkar","year":"2015","unstructured":"Sarkar S, A new distinguisher on Grain v1 for 106 rounds, Proc. 11th Int. Conf. Informatino System Security, India, 2015."},{"issue":"1","key":"7170_CR10","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1049\/iet-ifs.2015.0427","volume":"11","author":"Z Ma","year":"2017","unstructured":"Ma Z, Tian T, and Qi W F, Improved conditional differential attacks on Grain v1, IET Inf. Secur., 2017, 11(1): 46\u201353.","journal-title":"IET Inf. Secur."},{"key":"7170_CR11","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1109\/AsiaJCIS.2016.26","volume":"00","author":"Y Watanabe","year":"2016","unstructured":"Watanabe Y, Todo Y, and Morii M, New conditional differential cryptanalysis for NLFSR-based stream ciphers and application to Grain v1, 2016 11th Asia Joint Conference on Information Security (AsiaJCIS), 2016, 00: 115\u2013123, doi: 10.1109\/AsiaJCIS.2016.26.","journal-title":"2016 11th Asia Joint Conference on Information Security (AsiaJCIS)"},{"key":"7170_CR12","first-page":"518","volume":"2013","author":"B Zhang","year":"2013","unstructured":"Zhang B, Li Z, Feng D, et al., Near collision attack on the Grain v1 stream cipher, Proc. 20th Int. Workshop, FSE 2013, Singapore, 2013, 2013(LNCS 8424): 518\u2013538.","journal-title":"Proc. 20th Int. Workshop, FSE 2013, Singapore"},{"key":"7170_CR13","first-page":"122","volume":"2012","author":"S Banik","year":"2012","unstructured":"Banik S, Maitra S, and Sarkar S, A differential fault attack on the Grain family of stream ciphers, Proc. Cryptographic Hardware and Embedded Systems \u2014 CHES 2012, Belgium, 2012, 2012(LNCS 7428): 122\u2013139.","journal-title":"Proc. Cryptographic Hardware and Embedded Systems \u2014 CHES"},{"key":"7170_CR14","first-page":"191","volume":"2012","author":"S Banik","year":"2012","unstructured":"Banik S, Maitra S, and Sarkar S, A differential fault attack on the Grain family under reasonable assumptions, Proc. Progress in Cryptology \u2014 INDOCRYPT 2012, India, 2012, 2012(LNCS 7668): 191\u2013208.","journal-title":"Proc. Progress in Cryptology \u2014 INDOCRYPT"},{"issue":"6","key":"7170_CR15","first-page":"1647","volume":"64","author":"S Banik","year":"2016","unstructured":"Banik S, Maitra S, and Sarkar S, Differential fault attack against Grain family with very few faults and minimal assumptions, IEEE T. Comput., 2016, 64(6): 1647\u20131657.","journal-title":"IEEE T. Comput."},{"key":"7170_CR16","first-page":"276","volume":"2008","author":"C D Canni\u00e9re","year":"2008","unstructured":"Canni\u00e9re C D, K\u00fc\u00e7\u00fc K \u00d6, and Preneel B, Analysis of Grain\u2019s initialization algorithm, Proc. Progress in Cryptology \u2014 AFRICACRYPT 2008, Morocco, 2008, 2008(LNCS 5023): 276\u2013289.","journal-title":"Proc. Progress in Cryptology \u2014 AFRICACRYPT"},{"key":"7170_CR17","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1007\/978-3-540-70500-0_24","volume":"2008","author":"Y Lee","year":"2008","unstructured":"Lee Y, Jeong K, Sung J, et al., Related-key chosen IV attacks on Grain-v1 and Grain-128, Proc. Inormation Security and Privacy, 13th Australasian Conf., ACISP 2008, Australia, 2008, 2008(LNCS 5107): 321\u2013335.","journal-title":"Proc. Inormation Security and Privacy, 13th Australasian Conf., ACISP"}],"container-title":["Journal of Systems Science and Complexity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11424-018-7170-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11424-018-7170-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11424-018-7170-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,15]],"date-time":"2019-11-15T19:39:42Z","timestamp":1573846782000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11424-018-7170-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,16]]},"references-count":17,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,6]]}},"alternative-id":["7170"],"URL":"https:\/\/doi.org\/10.1007\/s11424-018-7170-4","relation":{},"ISSN":["1009-6124","1559-7067"],"issn-type":[{"value":"1009-6124","type":"print"},{"value":"1559-7067","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,11,16]]},"assertion":[{"value":"16 May 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 October 2017","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 November 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}