{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T14:27:12Z","timestamp":1725460032080},"publisher-location":"Boston","reference-count":10,"publisher":"Kluwer Academic Publishers","isbn-type":[{"type":"print","value":"1402081405"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/1-4020-8141-3_5","type":"book-chapter","created":{"date-parts":[[2006,2,21]],"date-time":"2006-02-21T15:15:11Z","timestamp":1140534911000},"page":"23-36","source":"Crossref","is-referenced-by-count":0,"title":["Looking Inside A\u03b5s and B\u03b5s"],"prefix":"10.1007","author":[{"given":"Ilia","family":"Toli","sequence":"first","affiliation":[]},{"given":"Alberto","family":"Zanoni","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","volume-title":"An Introduction to Computational Algebraic Geometry and Commutative Algebra","author":"D. A. Cox","year":"1992","unstructured":"D. A. Cox, J. Little, D. O\u2019Shea. Ideals, Varieties, and Algorithms, An Introduction to Computational Algebraic Geometry and Commutative Algebra. Springer-Verlag, New York, 1992."},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"N. Courtois, J. Pieprzyk. Cryptanalysis of block ciphers with overdefined systems of equations. IACR eprint server www.iacr.org, 2002.","DOI":"10.1007\/3-540-36178-2_17"},{"key":"5_CR3","unstructured":"J. Daemen, V. Rijmen. AES proposal: Rijndael (Version 2). NIST AES website: http:\/\/csrc.nist.gov\/encryption\/aes , 1999."},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"J. Daemen, V. Rijmen. The design of Rijndael: AES-The Advanced Encryption Standard. Springer-Verlag, 2002.","DOI":"10.1007\/978-3-662-04722-4"},{"key":"5_CR5","unstructured":"National Institute of Standards and Technology. Advanced Encryption Standard. FIPS 197. 26 November 2001."},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"N. Ferguson, R. Schroeppel, D. Whiting. A simple algebraic representation of Rijndael. In Selected Areas in Cryptography, Proc. SAC 2001, Lecture Notes in Computer Science 2259, pp. 103\u2013111, Springer Verlag, 2001.","DOI":"10.1007\/3-540-45537-X_8"},{"key":"5_CR7","unstructured":"G.-M. Greuel, G. Pfister, H. Sch\u00f6nemann. SINGULAR 2-0-3. A Computer Algebra System for Polynomial Computations. Center for Computer Algebra, University of Kaiserslautern, 2003. www.singular.uni-kl.de."},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"S. Murphy, M.J.B. Robshaw. Essential Algebraic Structure within the AES. M. Yung (ed.): CRYPTO 2002, LNCS 2242, pp. 1\u201316, Springer-Verlag 2002.","DOI":"10.1007\/3-540-45708-9_1"},{"key":"5_CR9","unstructured":"E. Oswald, J. Daemen, and V. Rijmen. The State of the Art of Rijndael\u2019s Security. Technical report. www.a-sit.at\/technologieb\/evaluation\/aes_report_e.pdf"},{"key":"5_CR10","unstructured":"D. R. Stinson. CRYPTOGRAPHY, Theory and Practice. Chapman & Hall\/CRC, 2002. Second edition."}],"container-title":["IFIP International Federation for Information Processing","Exploring New Frontiers of Theoretical Informatics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/1-4020-8141-3_5.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T20:28:25Z","timestamp":1619555305000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/1-4020-8141-3_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["1402081405"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/1-4020-8141-3_5","relation":{},"subject":[]}}