{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T16:01:43Z","timestamp":1725552103257},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540306849"},{"type":"electronic","value":"9783540322672"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11593447_23","type":"book-chapter","created":{"date-parts":[[2005,11,15]],"date-time":"2005-11-15T06:37:16Z","timestamp":1132036636000},"page":"425-442","source":"Crossref","is-referenced-by-count":5,"title":["New Improvements of Davies-Murphy Cryptanalysis"],"prefix":"10.1007","author":[{"given":"S\u00e9bastien","family":"Kunz-Jacques","sequence":"first","affiliation":[]},{"given":"Fr\u00e9d\u00e9ric","family":"Muller","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1007\/978-3-540-30539-2_31","volume-title":"Advances in Cryptology - ASIACRYPT 2004","author":"T. Baign\u00e8res","year":"2004","unstructured":"Baign\u00e8res, T., Junod, P., Vaudenay, S.: How Far Can We Go Beyond Linear Cryptanalysis? In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol.\u00a03329, pp. 432\u2013450. Springer, Heidelberg (2004)"},{"key":"23_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1007\/BFb0053449","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"E. Biham","year":"1995","unstructured":"Biham, E.: On Matsui\u2019s Linear Cryptanalysis. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 341\u2013355. Springer, Heidelberg (1995)"},{"key":"23_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1007\/BFb0053464","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"E. Biham","year":"1995","unstructured":"Biham, E., Biryukov, A.: An Improvement of Davies\u2019 Attack on DES. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 461\u2013467. Springer, Heidelberg (1995)"},{"key":"23_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"487","DOI":"10.1007\/3-540-48071-4_34","volume-title":"Advances in Cryptology - CRYPTO \u201992","author":"E. Biham","year":"1993","unstructured":"Biham, E., Shamir, A.: Differential Cryptanalysis of the Full 16-round DES. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol.\u00a0740, pp. 487\u2013496. Springer, Heidelberg (1993)"},{"key":"23_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1007\/978-3-540-28628-8_2","volume-title":"Advances in Cryptology \u2013 CRYPTO 2004","author":"N. Courtois","year":"2004","unstructured":"Courtois, N.: Feistel Schemes and Bi-linear Cryptanalysis. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol.\u00a03152, pp. 23\u201340. Springer, Heidelberg (2004)"},{"issue":"1","key":"23_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BF00204799","volume":"8","author":"D. Davies","year":"1995","unstructured":"Davies, D., Murphy, S.: Pairs and Triplets of DES S-Boxes. Journal of Cryptology\u00a08(1), 1\u201325 (1995)","journal-title":"Journal of Cryptology"},{"key":"23_CR7","unstructured":"DES Cracker Project, See \n                    \n                      http:\/\/www.eff.org\/Privacy\/Crypto\/Crypto_misc\/DESCracker\/"},{"key":"23_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/3-540-45537-X_16","volume-title":"Selected Areas in Cryptography","author":"P. Junod","year":"2001","unstructured":"Junod, P.: On the complexity of matsui\u2019s attack. In: Vaudenay, S., Youssef, A.M. (eds.) SAC 2001. LNCS, vol.\u00a02259, pp. 199\u2013211. Springer, Heidelberg (2001)"},{"key":"23_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1007\/3-540-44706-7_18","volume-title":"Fast Software Encryption","author":"L. Knudsen","year":"2001","unstructured":"Knudsen, L., Mathiassen, J.-E.: A Chosen-Plaintext Linear Attack on DES. In: Schneier, B. (ed.) FSE 2000. LNCS, vol.\u00a01978, pp. 262\u2013272. Springer, Heidelberg (2001)"},{"key":"23_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1007\/978-3-540-30539-2_32","volume-title":"Advances in Cryptology - ASIACRYPT 2004","author":"S. Kunz-Jacques","year":"2004","unstructured":"Kunz-Jacques, S., Muller, F., Valette, F.: The Davies-Murphy Power Attack. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol.\u00a03329, pp. 451\u2013467. Springer, Heidelberg (2004)"},{"key":"23_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"M. Matsui","year":"1994","unstructured":"Matsui, M.: Linear Cryptanalysis Method for DES Cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 386\u2013397. Springer, Heidelberg (1994)"},{"key":"23_CR12","unstructured":"National Bureau of Standards (NBS), U.S. FIPS 46, Data Encryption Standard, Federal Information Processing Standards Publication 46 (1977)"},{"key":"23_CR13","unstructured":"National\u00a0Institute of\u00a0Standards and Technology (NIST). Advanded Encryption Standard (AES) FIPS Publication 197 (November 2001), Available at \n                    \n                      http:\/\/csrc.nist.gov\/publications\/fips\/fips197\/fips-197.pdf"},{"key":"23_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1007\/3-540-49649-1_13","volume-title":"Advances in Cryptology - ASIACRYPT\u201998","author":"T. Pornin","year":"1998","unstructured":"Pornin, T.: Optimal Resistance Against the Davies and Murphy Attack. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol.\u00a01514, pp. 148\u2013159. Springer, Heidelberg (1998)"},{"key":"23_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1007\/BFb0055729","volume-title":"Advances in Cryptology - CRYPTO \u201998","author":"T. Shimoyama","year":"1998","unstructured":"Shimoyama, T., Kaneko, T.: Quadratic Relation of S-box and Its Application to the Linear Attack of Full Round DES. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol.\u00a01462, pp. 200\u2013211. Springer, Heidelberg (1998)"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology - ASIACRYPT 2005"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11593447_23.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:51:46Z","timestamp":1619506306000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11593447_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540306849","9783540322672"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/11593447_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}