{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:38:07Z","timestamp":1725550687316},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540289388"},{"type":"electronic","value":"9783540320661"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11554868_19","type":"book-chapter","created":{"date-parts":[[2005,9,27]],"date-time":"2005-09-27T14:49:02Z","timestamp":1127832542000},"page":"263-276","source":"Crossref","is-referenced-by-count":3,"title":["Advanced Slide Attacks Revisited: Realigning Slide on DES"],"prefix":"10.1007","author":[{"given":"Raphael C. -W.","family":"Phan","sequence":"first","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"19_CR1","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E. Biham","year":"1991","unstructured":"Biham, E., Shamir, A.: Differential Cryptanalysis of DES-like Cryptosystems. Journal of Cryptology\u00a04(1), 3\u201372 (1991)","journal-title":"Journal of Cryptology"},{"key":"19_CR2","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/BF00203965","volume":"7","author":"E. Biham","year":"1994","unstructured":"Biham, E.: New Types of Cryptanalytic Attacks Using Related Keys. Journal of Cryptology\u00a07, 229\u2013246 (1994)","journal-title":"Journal of Cryptology"},{"key":"19_CR3","unstructured":"Biryukov, A.: Methods of Cryptanalysis. Ph.D. Dissertation, Technion, Israel (1999)"},{"key":"19_CR4","unstructured":"Biryukov, A., Phan, R.C.-W.: Extended Slide Attacks \u2212 Double and Realigning Slides (2002) (unpublished manuscript)"},{"key":"19_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/3-540-48519-8_18","volume-title":"Fast Software Encryption","author":"A. Biryukov","year":"1999","unstructured":"Biryukov, A., Wagner, D.: Slide Attacks. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol.\u00a01636, pp. 245\u2013259. Springer, Heidelberg (1999)"},{"key":"19_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"589","DOI":"10.1007\/3-540-45539-6_41","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"A. Biryukov","year":"2000","unstructured":"Biryukov, A., Wagner, D.: Advanced Slide Attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 589\u2013606. Springer, Heidelberg (2000)"},{"key":"19_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1007\/3-540-45861-1_17","volume-title":"Information Security and Cryptology - ICISC 2001","author":"S. Furuya","year":"2002","unstructured":"Furuya, S.: Slide Attacks with a Known-Plaintext Cryptanalysis. In: Kim, K.-c. (ed.) ICISC 2001. LNCS, vol.\u00a02288, pp. 214\u2013225. Springer, Heidelberg (2002)"},{"key":"19_CR8","unstructured":"Handschuh, H., Naccache, D.: SHACAL. Submission to the NESSIE project (2000), Available from http:\/\/www.cryptonessie.org"},{"key":"19_CR9","unstructured":"Handschuh, H., Naccache, D.: SHACAL: A Family of Block Ciphers. Submission to the NESSIE project (2002), Available from http:\/\/www.cryptonessie.org"},{"key":"19_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/3-540-36231-2_4","volume-title":"Progress in Cryptology - INDOCRYPT 2002","author":"S. Kavut","year":"2002","unstructured":"Kavut, S., Y\u00fccel, M.D.: Slide Attack on Spectr-H64. In: Menezes, A., Sarkar, P. (eds.) INDOCRYPT 2002. LNCS, vol.\u00a02551, pp. 34\u201347. Springer, Heidelberg (2002)"},{"key":"19_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1007\/3-540-68697-5_19","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"J. Kelsey","year":"1996","unstructured":"Kelsey, J., Schneier, B., Wagner, D.: Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 237\u2013251. Springer, Heidelberg (1996)"},{"key":"19_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/BFb0028479","volume-title":"Information and Communications Security","author":"J. Kelsey","year":"1997","unstructured":"Kelsey, J., Schneier, B., Wagner, D.: Related-Key Cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2 and TEA. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol.\u00a01334, pp. 233\u2013246. Springer, Heidelberg (1997)"},{"key":"19_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"252","DOI":"10.1007\/3-540-68697-5_20","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"J. Kilian","year":"1996","unstructured":"Kilian, J., Rogaway, P.: How to Protect DES Against Exhaustive Key Search. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 252\u2013267. Springer, Heidelberg (1996)"},{"issue":"1","key":"19_CR14","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/s001450010015","volume":"14","author":"J. Kilian","year":"2001","unstructured":"Kilian, J., Rogaway, P.: How to Protect DES Against Exhaustive Key Search (an Analysis of DESX). Journal of Cryptology\u00a014(1), 17\u201335 (2001)","journal-title":"Journal of Cryptology"},{"key":"19_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1007\/BFb0053456","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"L.R. Knudsen","year":"1995","unstructured":"Knudsen, L.R.: New Potentially \u2018Weak\u2019 Keys for DES and LOKI (Extended abstract). In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 419\u2013424. Springer, Heidelberg (1995)"},{"key":"19_CR16","doi-asserted-by":"crossref","unstructured":"Knudsen, L.R.: Block Ciphers \u2212 Analysis, Design and Applications. PhD Thesis, Aarhus University, Denmark (1994)","DOI":"10.7146\/dpb.v23i485.6978"},{"key":"19_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"M. Matsui","year":"1994","unstructured":"Matsui, M.: Linear Cryptanalysis Method for DES Cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 386\u2013397. Springer, Heidelberg (1994)"},{"key":"19_CR18","unstructured":"NBS: Data Encryption Standard, Federal Information Processing Standard (FIPS), Publication 46, U.S. Dept. of Commerce, Washington D.C. (January 1977)"},{"key":"19_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/3-540-45353-9_6","volume-title":"Topics in Cryptology - CT-RSA 2001","author":"P. Onions","year":"2001","unstructured":"Onions, P.: On the Strength of Simply-Iterated Feistel Ciphers with Whitening Keys. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol.\u00a02020, pp. 63\u201369. Springer, Heidelberg (2001)"},{"key":"19_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1007\/3-540-36552-4_10","volume-title":"Information Security and Cryptology - ICISC 2002","author":"R.C.-W. Phan","year":"2003","unstructured":"Phan, R.C.-W., Furuya, S.: Sliding Properties of the DES Key Schedule and Potential Extensions to the Slide Attacks. In: Lee, P.J., Lim, C.H. (eds.) ICISC 2002. LNCS, vol.\u00a02587, pp. 138\u2013148. Springer, Heidelberg (2003)"},{"key":"19_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/978-3-540-39887-5_4","volume-title":"Fast Software Encryption","author":"M.-J.O. Saarinen","year":"2003","unstructured":"Saarinen, M.-J.O.: Cryptanalysis of Block Ciphers Based on SHA-1 and MD5. In: Johansson, T. (ed.) FSE 2003. LNCS, vol.\u00a02887, pp. 36\u201344. Springer, Heidelberg (2003)"},{"key":"19_CR22","unstructured":"Wagner, D.: A Slide Attack on SHA-1 (unpublished manuscript) (June 4, 2001)"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 Mycrypt 2005"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11554868_19.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T19:46:59Z","timestamp":1605642419000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11554868_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540289388","9783540320661"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/11554868_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}