{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,4]],"date-time":"2024-08-04T00:15:40Z","timestamp":1722730540877},"reference-count":26,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"8","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Fundamentals"],"published-print":{"date-parts":[[2024,8,1]]},"DOI":"10.1587\/transfun.2023eap1149","type":"journal-article","created":{"date-parts":[[2024,2,7]],"date-time":"2024-02-07T22:13:03Z","timestamp":1707343983000},"page":"1186-1195","source":"Crossref","is-referenced-by-count":0,"title":["SAT-Based Analysis of Related-Key Impossible Distinguishers on Piccolo and (Tweakable) TWINE"],"prefix":"10.1587","volume":"E107.A","author":[{"given":"Shion","family":"UTSUMI","sequence":"first","affiliation":[{"name":"Univercity of Hyogo"}]},{"given":"Kosei","family":"SAKAMOTO","sequence":"additional","affiliation":[{"name":"Univercity of Hyogo"},{"name":"Mitsubishi Electric Corporation"}]},{"given":"Takanori","family":"ISOBE","sequence":"additional","affiliation":[{"name":"Univercity of Hyogo"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"publisher","unstructured":"[1] K. Shibutani, T. Isobe, H. Hiwatari, A. Mitsuda, T. Akishita, and T. Shirai, \u201cPiccolo: An ultra-lightweight blockcipher,\u201d CHES, Lecture Notes in Computer Science, vol.6917, pp.342-357, Springer, 2011. 10.1007\/978-3-642-23951-9_23","DOI":"10.1007\/978-3-642-23951-9_23"},{"key":"2","doi-asserted-by":"publisher","unstructured":"[2] T. Suzaki, K. Minematsu, S. Morioka, and E. Kobayashi, \u201cTWINE: A lightweight block cipher for multiple platforms,\u201d Selected Areas in Cryptography, Lecture Notes in Computer Science, vol.7707, pp.339-354, Springer, 2012. 10.1007\/978-3-642-35999-6_22","DOI":"10.1007\/978-3-642-35999-6_22"},{"key":"3","doi-asserted-by":"crossref","unstructured":"[3] S.A. Azimi, Z. Ahmadian, J. Mohajeri, and M.R. Aref, \u201cImpossible differential cryptanalysis of piccolo lightweight block cipher,\u201d ISCISC, pp.89-94, IEEE, 2014. 10.1109\/iscisc.2014.6994028","DOI":"10.1109\/ISCISC.2014.6994028"},{"key":"4","doi-asserted-by":"publisher","unstructured":"[4] M. Minier, \u201cOn the security of piccolo lightweight block cipher against related-key impossible differentials,\u201d INDOCRYPT, Lecture Notes in Computer Science, vol.8250, pp.308-318, Springer, 2013. 10.1007\/978-3-319-03515-4_21","DOI":"10.1007\/978-3-319-03515-4_21"},{"key":"5","doi-asserted-by":"crossref","unstructured":"[5] X. Zheng and K. Jia, \u201cImpossible differential attack on reduced-round TWINE,\u201d ICISC, Lecture Notes in Computer Science, vol.8565, pp.123-143, Springer, 2013. 10.1007\/978-3-319-12160-4_8","DOI":"10.1007\/978-3-319-12160-4_8"},{"key":"6","doi-asserted-by":"crossref","unstructured":"[6] A. Biryukov, P. Derbez, and L. Perrin, \u201cDifferential analysis and meet-in-the-middle attack against round-reduced TWINE,\u201d FSE, Lecture Notes in Computer Science, vol.9054, pp.3-27, Springer, 2015. 10.1007\/978-3-662-48116-5_1","DOI":"10.1007\/978-3-662-48116-5_1"},{"key":"7","doi-asserted-by":"publisher","unstructured":"[7] Y. Wei, P. Xu, and Y. Rong, \u201cRelated-key impossible differential cryptanalysis on lightweight cipher TWINE,\u201d J. Ambient Intell. Humaniz. Comput., vol.10, no.2, pp.509-517, 2019. 10.1007\/s12652-017-0675-1","DOI":"10.1007\/s12652-017-0675-1"},{"key":"8","doi-asserted-by":"crossref","unstructured":"[8] E. Biham, A. Biryukov, and A. Shamir, \u201cMiss in the middle attacks on IDEA and Khufu,\u201d FSE, Lecture Notes in Computer Science, vol.1636, pp.124-138, Springer, 1999. 10.1007\/3-540-48519-8_10","DOI":"10.1007\/3-540-48519-8_10"},{"key":"9","doi-asserted-by":"publisher","unstructured":"[9] J. Kim, S. Hong, J. Sung, C. Lee, and S. Lee, \u201cImpossible differential cryptanalysis for block cipher structures,\u201d INDOCRYPT, Lecture Notes in Computer Science, vol.2904, pp.82-96, Springer, 2003. 10.1007\/978-3-540-24582-7_6","DOI":"10.1007\/978-3-540-24582-7_6"},{"key":"10","doi-asserted-by":"publisher","unstructured":"[10] Y. Luo, X. Lai, Z. Wu, and G. Gong, \u201cA unified method for finding impossible differentials of block cipher structures,\u201d Inf. Sci., vol.263, pp.211-220, 2014. 10.1016\/j.ins.2013.08.051","DOI":"10.1016\/j.ins.2013.08.051"},{"key":"11","doi-asserted-by":"publisher","unstructured":"[11] L. Sun, D. G\u00e9rault, W. Wang, and M. Wang, \u201cOn the usage of deterministic (related-key) truncated differentials and multidimensional linear approximations for SPN ciphers,\u201d IACR Trans. Symmetric Cryptol., vol.2020, no.3, pp.262-287, 2020. 10.46586\/tosc.v2020.i3.262-287","DOI":"10.46586\/tosc.v2020.i3.262-287"},{"key":"12","doi-asserted-by":"crossref","unstructured":"[12] Y. Sasaki and Y. Todo, \u201cNew impossible differential search tool from design and cryptanalysis aspects: Revealing structural properties of several ciphers,\u201d EUROCRYPT (3), Lecture Notes in Computer Science, vol.10212, pp.185-215, 2017. 10.1007\/978-3-319-56617-7_7","DOI":"10.1007\/978-3-319-56617-7_7"},{"key":"13","doi-asserted-by":"publisher","unstructured":"[13] L. Sun, W. Wang, and M. Wang, \u201cAccelerating the search of differential and linear characteristics with the SAT method,\u201d IACR Trans. Symmetric Cryptol., vol.2021, no.1, pp.269-315, 2021. 10.46586\/tosc.v2021.i1.269-315","DOI":"10.46586\/tosc.v2021.i1.269-315"},{"key":"14","doi-asserted-by":"crossref","unstructured":"[14] M. Tolba, M. ElSheikh, and A.M. Youssef, \u201cImpossible differential cryptanalysis of reduced-round tweakable TWINE,\u201d AFRICACRYPT, Lecture Notes in Computer Science, vol.12174, pp.91-113, Springer, 2020. 10.1007\/978-3-030-51938-4_5","DOI":"10.1007\/978-3-030-51938-4_5"},{"key":"15","doi-asserted-by":"crossref","unstructured":"[15] G. Jakimoski and Y. Desmedt, \u201cRelated-key differential cryptanalysis of 192-bit key AES variants,\u201d Selected Areas in Cryptography, Lecture Notes in Computer Science, vol.3006, pp.208-221, Springer, 2003. 10.1007\/978-3-540-24654-1_15","DOI":"10.1007\/978-3-540-24654-1_15"},{"key":"16","unstructured":"[16] L. Knudsen, \u201cDeal-a 128-bit block cipher,\u201d Complexity, vol.258, no.2, 1998."},{"key":"17","doi-asserted-by":"crossref","unstructured":"[17] E. Biham, A. Biryukov, and A. Shamir, \u201cCryptanalysis of skipjack reduced to 31 rounds using impossible differentials,\u201d EUROCRYPT, Lecture Notes in Computer Science, vol.1592, pp.12-23, Springer, 1999. 10.1007\/3-540-48910-x_2","DOI":"10.1007\/3-540-48910-X_2"},{"key":"18","doi-asserted-by":"publisher","unstructured":"[18] E. Biham, \u201cNew types of cryptanalytic attacks using related keys,\u201d J. Cryptology, vol.7, no.4, pp.229-246, 1994. 10.1007\/bf00203965","DOI":"10.1007\/BF00203965"},{"key":"19","doi-asserted-by":"crossref","unstructured":"[19] N. Mouha, Q. Wang, D. Gu, and B. Preneel, \u201cDifferential and linear cryptanalysis using mixed-integer linear programming,\u201d Inscrypt, Lecture Notes in Computer Science, vol.7537, pp.57-76, Springer, 2011. 10.1007\/978-3-642-34704-7_5","DOI":"10.1007\/978-3-642-34704-7_5"},{"key":"20","doi-asserted-by":"crossref","unstructured":"[20] F. Liu, G. Wang, S. Sarkar, R. Anand, W. Meier, Y. Li, and T. Isobe, \u201cAnalysis of RIPEMD-160: New collision attacks and finding characteristics with MILP,\u201d EUROCRYPT (4), Lecture Notes in Computer Science, vol.14007, pp.189-219, Springer, 2023. 10.1007\/978-3-031-30634-1_7","DOI":"10.1007\/978-3-031-30634-1_7"},{"key":"21","doi-asserted-by":"crossref","unstructured":"[21] Y. Liu, Z. Xiang, S. Chen, S. Zhang, and X. Zeng, \u201cA novel automatic technique based on MILP to search for impossible differentials,\u201d ACNS (1), Lecture Notes in Computer Science, vol.13905, pp.119-148, Springer, 2023. 10.1007\/978-3-031-33488-7_5","DOI":"10.1007\/978-3-031-33488-7_5"},{"key":"22","doi-asserted-by":"publisher","unstructured":"[22] J. Erlacher, F. Mendel, and M. Eichlseder, \u201cBounds for the security of ascon against differential and linear cryptanalysis,\u201d IACR Trans. Symmetric Cryptol., vol.2022, no.1, pp.64-87, 2022. 10.46586\/tosc.v2022.i1.64-87","DOI":"10.46586\/tosc.v2022.i1.64-87"},{"key":"23","doi-asserted-by":"publisher","unstructured":"[23] L. Sun, W. Wang, and M. Wang, \u201cLinear cryptanalyses of three aeads with GIFT-128 as underlying primitives,\u201d IACR Trans. Symmetric Cryptol., vol.2021, no.2, pp.199-221, 2021. 10.46586\/tosc.v2021.i2.199-221","DOI":"10.46586\/tosc.v2021.i2.199-221"},{"key":"24","doi-asserted-by":"crossref","unstructured":"[24] S. Banik, Z. Bao, T. Isobe, H. Kubo, F. Liu, K. Minematsu, K. Sakamoto, N. Shibata, and M. Shigeri, \u201cWARP: Revisiting GFN for lightweight 128-bit block cipher,\u201d SAC, Lecture Notes in Computer Science, vol.12804, pp.535-564, Springer, 2020. 10.1007\/978-3-030-81652-0_21","DOI":"10.1007\/978-3-030-81652-0_21"},{"key":"25","doi-asserted-by":"publisher","unstructured":"[25] S. Banik, T. Isobe, F. Liu, K. Minematsu, and K. Sakamoto, \u201cOrthros: A low-latency PRF,\u201d IACR Trans. Symmetric Cryptol., vol.2021, no.1, pp.37-77, 2021. 10.46586\/tosc.v2021.i1.37-77","DOI":"10.46586\/tosc.v2021.i1.37-77"},{"key":"26","doi-asserted-by":"publisher","unstructured":"[26] T. Isobe, R. Ito, F. Liu, K. Minematsu, M. Nakahashi, K. Sakamoto, and R. Shiba, \u201cAreion: Highly-efficient permutations and its applications to hash functions for short input,\u201d IACR Trans. Cryptogr. Hardw. Embed. Syst., vol.2023, no.2, pp.115-154, 2023. 10.46586\/tches.v2023.i2.115-154","DOI":"10.46586\/tches.v2023.i2.115-154"}],"container-title":["IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transfun\/E107.A\/8\/E107.A_2023EAP1149\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,3]],"date-time":"2024-08-03T03:31:36Z","timestamp":1722655896000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transfun\/E107.A\/8\/E107.A_2023EAP1149\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,1]]},"references-count":26,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2024]]}},"URL":"https:\/\/doi.org\/10.1587\/transfun.2023eap1149","relation":{},"ISSN":["0916-8508","1745-1337"],"issn-type":[{"type":"print","value":"0916-8508"},{"type":"electronic","value":"1745-1337"}],"subject":[],"published":{"date-parts":[[2024,8,1]]},"article-number":"2023EAP1149"}}