{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:46:17Z","timestamp":1750225577320},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540365976"},{"type":"electronic","value":"9783540365983"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11799313_5","type":"book-chapter","created":{"date-parts":[[2006,10,5]],"date-time":"2006-10-05T14:02:13Z","timestamp":1160056933000},"page":"57-77","source":"Crossref","is-referenced-by-count":14,"title":["Pseudorandom Permutation Families over Abelian Groups"],"prefix":"10.1007","author":[{"given":"Louis","family":"Granboulan","sequence":"first","affiliation":[]},{"given":"\u00c9ric","family":"Levieil","sequence":"additional","affiliation":[]},{"given":"Gilles","family":"Piret","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1007\/978-3-540-30539-2_31","volume-title":"Advances in Cryptology - ASIACRYPT 2004","author":"T. Baign\u00e8res","year":"2004","unstructured":"Baign\u00e8res, T., Junod, P., Vaudenay, S.: How Far Can We Go Beyond Linear Cryptanalysis? In: Lee, P.J. (ed.) ASIACRYPT 2004, vol.\u00a03329, pp. 432\u2013450. Springer, Heidelberg (2004), \n                    \n                      http:\/\/lasecwww.epfl.ch\/php_code\/publications\/search.php?ref=BJV04"},{"key":"5_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1007\/3-540-38424-3_1","volume-title":"Advances in Cryptology - CRYPTO \u201990","author":"E. Biham","year":"1991","unstructured":"Biham, E., Shamir, A.: Differential Cryptanalysis of DES-like cryptosystems. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol.\u00a0537, pp. 2\u201321. Springer, Heidelberg (1991)"},{"key":"5_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/3-540-45760-7_9","volume-title":"Topics in Cryptology - CT-RSA 2002","author":"J. Black","year":"2002","unstructured":"Black, J., Rogaway, P.: Ciphers with Arbitrary Finite Domains. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol.\u00a02271, pp. 114\u2013130. Springer, Heidelberg (2002)"},{"key":"5_CR4","unstructured":"Borisov, N., Chew, M., Johnson, R., Wagner, D.: Cryptanalysis of Multiswap (2001), \n                    \n                      http:\/\/www.cs.berkeley.edu\/~rtjohnso\/multiswap\/"},{"key":"5_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1007\/BFb0053450","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"F. Chabaud","year":"1995","unstructured":"Chabaud, F., Vaudenay, S.: Links between differential and linear cryptalysis. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 356\u2013365. Springer, Heidelberg (1995)"},{"key":"5_CR6","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The Design of Rijndael: AES- the Advanced Encryption Standard","author":"J. Daemen","year":"2002","unstructured":"Daemen, J., Rijmen, V.: The Design of Rijndael: AES- the Advanced Encryption Standard. Springer, Heidelberg (2002)"},{"key":"5_CR7","volume-title":"First Advanced Encryption Standard (AES) Conference","author":"J. Daemen","year":"1998","unstructured":"Daemen, J., Rijmen, V.: AES proposal: Rijndael. In: First Advanced Encryption Standard (AES) Conference, Canada National Institute of Standards and Technology, Ventura (1998)"},{"key":"5_CR8","unstructured":"Daemen, J.: Rijmen. Statistics of Correlation and Differentials in Block Ciphers. Cryptology ePrint Archive, Report 2005\/212 (2005), \n                    \n                      http:\/\/eprint.iacr.org\/2005\/212"},{"key":"5_CR9","volume-title":"Projective Geometries Over Finite Fields","author":"J.W.P. Hirschfeld","year":"1979","unstructured":"Hirschfeld, J.W.P.: Projective Geometries Over Finite Fields. Oxford University Press, Oxford (1979)"},{"key":"5_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1007\/3-540-46416-6_2","volume-title":"Advances in Cryptology - EUROCRYPT \u201991","author":"X. Lai","year":"1991","unstructured":"Lai, X., Massey, J.L., Murphy, S.: Markov ciphers and differential cryptanalysis. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol.\u00a0547, pp. 17\u201338. Springer, Heidelberg (1991)"},{"key":"5_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1007\/978-3-540-25937-4_20","volume-title":"Fast Software Encryption","author":"H. Lipmaa","year":"2004","unstructured":"Lipmaa, H., Wall\u00e9n, J., Dumas, P.: On the Additive Differential Probability of Exclusive-Or. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol.\u00a03017, pp. 317\u2013331. Springer, Heidelberg (2004)"},{"key":"5_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"M. Matsui","year":"1994","unstructured":"Matsui, M.: Linear cryptanalysis method for DES cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 386\u2013397. Springer, Heidelberg (1994)"},{"key":"5_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1007\/3-540-48285-7_6","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"K. Nyberg","year":"1994","unstructured":"Nyberg, K.: Differentially uniform mappings for cryptography. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 55\u201364. Springer, Heidelberg (1994)"},{"key":"5_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1007\/BFb0053460","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"K. Nyberg","year":"1995","unstructured":"Nyberg, K.: Linear Approximation of Block Ciphers. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 439\u2013444. Springer, Heidelberg (1995)"},{"key":"5_CR15","unstructured":"Parker, M.G., Raddum, H.: Z4-Linear Cryptanalysis. NESSIE Internal Report, 27\/06\/2002: NES\/DOC\/UIB\/WP5\/018\/1"},{"key":"5_CR16","unstructured":"Schneier, B., Kelsey, J., Whiting, D., Wagner, D., Hall, C., Ferguson, N.: New Results on the Twofish Encryption Algorithm. Second AES Candidate Conference (April 1999)"},{"key":"5_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/3-540-47555-9_7","volume-title":"Advances in Cryptology - EUROCRYPT \u201992","author":"M. Matsui","year":"1993","unstructured":"Matsui, M., Yamagishi, A.: A New Method for Known Plaintext Attack of FEAL Cipher. In: Rueppel, R.A. (ed.) EUROCRYPT 1992. LNCS, vol.\u00a0658, pp. 81\u201391. Springer, Heidelberg (1993)"},{"key":"5_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1007\/3-540-46766-1_12","volume-title":"Advances in Cryptology - CRYPTO \u201991","author":"A. Tardy-Corfdir","year":"1992","unstructured":"Tardy-Corfdir, A., Gilbert, H.: A Known Plaintext Attack of FEAL-4 and FEAL-6. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol.\u00a0576, pp. 172\u2013182. Springer, Heidelberg (1992)"}],"container-title":["Lecture Notes in Computer Science","Fast Software Encryption"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11799313_5.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:24:33Z","timestamp":1619508273000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11799313_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540365976","9783540365983"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/11799313_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}