{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T21:01:53Z","timestamp":1773262913559,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540310334","type":"print"},{"value":"9783540326489","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11605805_20","type":"book-chapter","created":{"date-parts":[[2005,12,22]],"date-time":"2005-12-22T11:08:03Z","timestamp":1135249683000},"page":"313-331","source":"Crossref","is-referenced-by-count":18,"title":["Block Ciphers Sensitive to Gr\u00f6bner Basis Attacks"],"prefix":"10.1007","author":[{"given":"Johannes","family":"Buchmann","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Andrei","family":"Pyshkin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ralf-Philipp","family":"Weinmann","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"20_CR1","volume-title":"Gr\u00f6bner Bases \u2013 A Computational Approach to Commutative Algebra","author":"T. Becker","year":"1991","unstructured":"Becker, T., Weispfenning, V.: Gr\u00f6bner Bases \u2013 A Computational Approach to Commutative Algebra. Springer, Heidelberg (1991)"},{"key":"20_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1007\/3-540-48285-7_7","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"T. Beth","year":"1994","unstructured":"Beth, T., Ding, C.: On Almost Perfect Nonlinear Permutations. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 65\u201376. Springer, Heidelberg (1994)"},{"key":"20_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1007\/3-540-38424-3_1","volume-title":"Advances in Cryptology - CRYPTO \u201990","author":"E. Biham","year":"1991","unstructured":"Biham, E., Shamir, A.: Differential Cryptanalysis of DES-like Cryptosystems. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol.\u00a0537, pp. 2\u201321. Springer, Heidelberg (1991)"},{"key":"20_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"286","DOI":"10.1007\/3-540-48910-X_20","volume-title":"Advances in Cryptology - EUROCRYPT \u201999","author":"J.H. Cheon","year":"1999","unstructured":"Cheon, J.H., Chee, S., Park, C.: S-boxes with Controllable Nonlinearity. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol.\u00a01592, pp. 286\u2013294. Springer, Heidelberg (1999)"},{"key":"20_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/11593447_18","volume-title":"Advances in Cryptology - ASIACRYPT 2005","author":"C. Cid","year":"2005","unstructured":"Cid, C., Leurent, G.: An Analysis of the XSL Algorithm. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol.\u00a03788, pp. 333\u2013353. Springer, Heidelberg (2005)"},{"key":"20_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/11502760_10","volume-title":"Fast Software Encryption","author":"C. Cid","year":"2005","unstructured":"Cid, C., Murphy, S., Robshaw, M.: Small Scale Variants of the AES. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol.\u00a03557, pp. 145\u2013162. Springer, Heidelberg (2005)"},{"issue":"3\/4","key":"20_CR7","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1006\/jsco.1996.0145","volume":"24","author":"S. Collart","year":"1997","unstructured":"Collart, S., Kalkbrener, M., Mall, D.: Converting Bases with the Gr\u00f6bner Walk. Journal of Symbolic Computation\u00a024(3\/4), 465\u2013469 (1997)","journal-title":"Journal of Symbolic Computation"},{"key":"20_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1007\/11506447_15","volume-title":"Advanced Encryption Standard \u2013 AES","author":"N. Courtois","year":"2005","unstructured":"Courtois, N.: The Inverse S-box, Non-linear Polynomial Relations and Cryptanalysis of Block Ciphers. In: Dobbertin, H., Rijmen, V., Sowa, A. (eds.) AES 2005. LNCS, vol.\u00a03373, pp. 170\u2013188. Springer, Heidelberg (2005)"},{"key":"20_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/3-540-36178-2_17","volume-title":"Advances in Cryptology - ASIACRYPT 2002","author":"N. Courtois","year":"2002","unstructured":"Courtois, N., Pieprzyk, J.: Cryptanalysis of Block Ciphers with Overdefined Systems of Equations. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol.\u00a02501, pp. 267\u2013287. Springer, Heidelberg (2002)"},{"key":"20_CR10","first-page":"536","volume-title":"Ideals, Varieties, and Algorithms","author":"D.A. Cox","year":"1996","unstructured":"Cox, D.A., Little, J.B., O\u2019Shea, D.: Ideals, Varieties, and Algorithms, 2nd edn., p. 536. Springer, Heidelberg (1996)","edition":"2"},{"key":"20_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/BFb0052343","volume-title":"Fast Software Encryption","author":"J. Daemen","year":"1997","unstructured":"Daemen, J., Knudsen, L., Rijmen, V.: The block cipher Square. In: Biham, E. (ed.) FSE 1997. LNCS, vol.\u00a01267, pp. 149\u2013165. Springer, Heidelberg (1997)"},{"key":"20_CR12","volume-title":"The Design of Rijndael: The Wide Trail Strategy","author":"J. Daemen","year":"2001","unstructured":"Daemen, J., Rijmen, V.: The Design of Rijndael: The Wide Trail Strategy. Springer, Heidelberg (2001)"},{"issue":"2","key":"20_CR13","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/s002000050099","volume":"9","author":"H. Dobbertin","year":"1998","unstructured":"Dobbertin, H.: One-to-One Highly Nonlinear Power Functions on GF(2\n                    n\n                  ). Applicable Algebra in Engineering, Communication and Computing\u00a09(2), 139\u2013152 (1998)","journal-title":"Applicable Algebra in Engineering, Communication and Computing"},{"issue":"1-3","key":"20_CR14","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/S0022-4049(99)00005-5","volume":"139","author":"J.-C. Faug\u00e8re","year":"1999","unstructured":"Faug\u00e8re, J.-C.: A New Efficient Algorithm for Computing Gr\u00f6bner bases (F4). Journal of Pure and Applied Algebra\u00a0139(1-3), 61\u201388 (1999)","journal-title":"Journal of Pure and Applied Algebra"},{"issue":"4","key":"20_CR15","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1006\/jsco.1993.1051","volume":"16","author":"J.-C. Faug\u00e8re","year":"1993","unstructured":"Faug\u00e8re, J.-C., Gianni, P., Lazard, D., Mora, T.: Efficient Computation of Zero-Dimensional Gr\u00f6bner Bases by Change of Ordering. Journal of Symbolic Computation\u00a016(4), 329\u2013344 (1993)","journal-title":"Journal of Symbolic Computation"},{"key":"20_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1007\/BFb0052332","volume-title":"Fast Software Encryption","author":"T. Jakobsen","year":"1997","unstructured":"Jakobsen, T., Knudsen, L.: The Interpolation Attack on Block Ciphers. In: Biham, E. (ed.) FSE 1997. LNCS, vol.\u00a01267, pp. 28\u201340. Springer, Heidelberg (1997)"},{"issue":"223","key":"20_CR17","doi-asserted-by":"publisher","first-page":"1179","DOI":"10.1090\/S0025-5718-98-00944-2","volume":"67","author":"E. Kaltofen","year":"1998","unstructured":"Kaltofen, E., Shoup, V.: Subquadratic-time Factoring of Polynomials over Finite FIelds. Mathematics of Computation\u00a067(223), 1179\u20131197 (1998)","journal-title":"Mathematics of Computation"},{"key":"20_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1007\/3-540-44983-3_24","volume-title":"Selected Areas in Cryptography","author":"M. Kanda","year":"2001","unstructured":"Kanda, M.: Practical Security Evaluation against Differential and Linear Cryptanalyses for Feistel Ciphers with SPN Round Function. In: Stinson, D.R., Tavares, S. (eds.) SAC 2000. LNCS, vol.\u00a02012, pp. 324\u2013338. Springer, Heidelberg (2001)"},{"key":"20_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1007\/3-540-58108-1_26","volume-title":"Fast Software Encryption","author":"L.R. Knudsen","year":"1994","unstructured":"Knudsen, L.R.: Practically Secure Feistel Ciphers. In: Anderson, R.J. (ed.) FSE 1993. LNCS, vol.\u00a0809, pp. 211\u2013221. Springer, Heidelberg (1994)"},{"key":"20_CR20","doi-asserted-by":"crossref","unstructured":"Matsui, M.: Linear Cryptanalysis Method for DES Cipher. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol.\u00a0773, pp. 386\u2013387. Springer, Heidelberg (1994)","DOI":"10.1007\/3-540-48285-7_33"},{"key":"20_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-45708-9_1","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"S. Murphy","year":"2002","unstructured":"Murphy, S., Robshaw, M.J.B.: Essential Algebraic Structure within the AES. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.\u00a02442, pp. 1\u201316. Springer, Heidelberg (2002)"},{"key":"20_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1007\/3-540-48285-7_6","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"K. Nyberg","year":"1994","unstructured":"Nyberg, K.: Differentially Uniform Mappings for Cryptography. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 55\u201364. Springer, Heidelberg (1994)"},{"key":"20_CR23","unstructured":"University of Sydney Computational Algebra Group. The Magma Computational Algebra System (2004), \n                    \n                      http:\/\/magma.maths.usyd.edu.au\/magma\/"}],"container-title":["Lecture Notes in Computer Science","Topics in Cryptology \u2013 CT-RSA 2006"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11605805_20.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:05:42Z","timestamp":1619507142000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11605805_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540310334","9783540326489"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/11605805_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006]]}}}