{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:56:54Z","timestamp":1725487014367},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540002635"},{"type":"electronic","value":"9783540362319"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-36231-2_1","type":"book-chapter","created":{"date-parts":[[2007,7,2]],"date-time":"2007-07-02T11:21:45Z","timestamp":1183375305000},"page":"1-11","source":"Crossref","is-referenced-by-count":5,"title":["Security of a Wide Trail Design"],"prefix":"10.1007","author":[{"given":"Joan","family":"Daemen","sequence":"first","affiliation":[]},{"given":"Vincent","family":"Rijmen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,12,18]]},"reference":[{"key":"1_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1007\/3-540-48910-X_2","volume-title":"Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials","author":"E. Biham","year":"1999","unstructured":"Eli Biham, Alex Biryukov, and Adi Shamir. Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials. In Jacques Stern, editor, Advances in Cryptology, Proceedings of Eurocrypt\u2019 99, volume 1592 of Lecture Notes in Computer Science, pages12\u201324. Springer-Verlag, 1999."},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Eli Biham, Orr Dunkelmann, and Nathan Keller. New results on boomerang and rectangle attacks. In Daemen and Rijmen [DR02b], pages 1\u201316.","DOI":"10.1007\/3-540-45661-9_1"},{"issue":"1","key":"1_CR3","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E. Biham","year":"1991","unstructured":"Eli Biham and Adi Shamir. Differential cryptanalysis of DES-like cryptosystems. Journal of Cryptology, 4(1):3\u201372, 1991.","journal-title":"Journal of Cryptology"},{"key":"1_CR4","series-title":"Lect Notes Comput Sci","first-page":"394","volume-title":"Journal of Cryptology","author":"A. Biryukov","year":"2001","unstructured":"Alex Biryukov and Adi Shamir. Structural cryptanalysis of SASAS. In Birgit Pfitzmann, editor, Advances in Cryptology, Proceedings of Eurocrypt\u2019 01, volume 2045 of Lecture Notes in Computer Science, pages 394\u2013405. Springer-Verlag, 2001."},{"key":"1_CR5","series-title":"Lect Notes Comput Sci","volume-title":"CHES 2001","year":"2001","unstructured":"David Naccache \u00c7etin K. Ko\u00e7 and Christophe Paar, editors. CHES 2001, volume 2162 of Lecture Notes in Computer Science. Springer-Verlag, 2001."},{"key":"1_CR6","unstructured":"Nicolas T. Courtoisan and Josef Pieprzyk. Cryptanalysis of block ciphers with overdefined systems of equations. Available from IACR\u2019s e-Print server."},{"key":"1_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/BFb0052343","volume-title":"Fast Software Encryption\u2019 97","author":"J. Daemen","year":"1997","unstructured":"Joan Daemen, Lars R. Knudsen, and Vincent Rijmen. The block cipher Square. In Eli Biham, editor, Fast Software Encryption\u2019 97, volume 1267 of Lecture Notes in Computer Science, pages 149\u2013165. Springer-Verlag, 1997."},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Joan Daemen and Vincent Rijmen. The design of Rijndael, AES-the advanced encryption standard. Springer-Verlag, 2002.","DOI":"10.1007\/978-3-662-04722-4"},{"key":"1_CR9","series-title":"Lect Notes Comput Sci","volume-title":"Fast Software Encryption\u2019 02","year":"2002","unstructured":"Joan Daemen and Vincent Rijmen, editors. Fast Software Encryption\u2019 02, volume 2365 of Lecture Notes in Computer Science. Springer-Verlag, 2002."},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Niels Ferguson, John Kelsey, Bruce Schneier, Mike Stay, David Wagner, and Doug Whiting. Improved cryptanalysis of Rijndael. In AES3 [AES00], pages 213\u2013231.","DOI":"10.1007\/3-540-44706-7_15"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Joanne Fuller and William Millan. On linear redundancy in the AES S-box. draft, 2002.","DOI":"10.1007\/978-3-540-39887-5_7"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"Niels Ferguson, Richard Schroeppel, and Doug Whiting. A simple algebraic representation of Rijndael. draft, 2001.","DOI":"10.1007\/3-540-45537-X_8"},{"key":"1_CR13","unstructured":"Cees Jansen. Personal communication, 2001."},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Henry Kuo and Ingrid Verbauwhede. Architectural optimization for a 1.82gbit\/sec vlsi implementation of the AES Rijndael algorithm. In \u00c7etin K. Ko\u00e7 and Paar [\u00c7KKP01], pages 51\u201364.","DOI":"10.1007\/3-540-44709-1_6"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Lars Knudsen and David Wagner. Integral cryptanalysis. In Daemen and Rijmen [DR02b], pages 112\u2013127.","DOI":"10.1007\/3-540-45661-9_9"},{"key":"1_CR16","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1007\/3-540-46416-6_2","volume-title":"Markov ciphers and differential cryptanalysis","author":"X. Lai","year":"1991","unstructured":"Xuija Lai, James Massey, and Sean Murphy. Markov ciphers and differential cryptanalysis. In Donald W. Davies, editor, Advances in Cryptology, Proceedings of Eurocrypt\u2019 91, volume 547 of Lecture Notes in Computer Science, pages 17\u201338. Springer-Verlag, 1991."},{"key":"1_CR17","unstructured":"Stefan Lucks. Attacking 7 rounds of Rijndael under 192-bit and 256-bit keys. In AES3 [AES00], pages 215\u2013229."},{"key":"1_CR18","unstructured":"Sean Murphy and Matt J. B. Robshaw. New observations on rijndael. http:\/\/www.isg.rhbnc.ac.uk\/~sean\/rijn newobs.pdf , August 2000."},{"key":"1_CR19","series-title":"Lect Notes Comput Sci","volume-title":"Essential algebraic structure within the aes","author":"S. Murphy","year":"2002","unstructured":"Sean Murphy and Matt J. B. Robshaw. Essential algebraic structure within the aes. In Moti Yung, editor, Advances in Cryptology, Proceedings of Crypto 2002, Lecture Notes in Computer Science. Springer-Verlag, 2002."},{"key":"1_CR20","doi-asserted-by":"crossref","unstructured":"Atri Rudra, Pradeep K. Dubey, Charanjit S. Jutla, Vijay Kumar, Josyula R. Rao, and Pankaj Rohatgi. Efficient Rijndael encryption implementation with composite field arithmetic. In \u00c7etin K. Ko\u00e7 and Paar [\u00c7KKP01], pages 171\u2013184.","DOI":"10.1007\/3-540-44709-1_16"},{"key":"1_CR21","unstructured":"Vincent Rijmen. Efficient implementation of the Rijndael S-box. http:\/\/www.esat.kuleuven.ac.be\/\u223crijmen\/rijndael\/sbox.pdf , 2000."},{"key":"1_CR22","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/3-540-45682-1_15","volume-title":"A compact Rijndael hardware architecture with S-box optimization","author":"A. Satoh","year":"2001","unstructured":"Akashi Satoh, Sumio Morioka, Kohji Takano, and Seiji Munetoh. A compact Rijndael hardware architecture with S-box optimization. In Colin Boyd, editor, Advances in Cryptology, Proceedings of Asiacrypt 2001, volume 2248 of Lecture Notes in Computer Science, pages 239\u2013254. Springer-Verlag, 2001."},{"key":"1_CR23","doi-asserted-by":"crossref","unstructured":"Ralph Wernsdorf. The round functions of Rijndael generate the alternating group. In Daemen and Rijmen [DR02b], pages 143\u2013148.","DOI":"10.1007\/3-540-45661-9_11"},{"key":"1_CR24","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/3-540-45760-7_6","volume-title":"Topics in Cryptology-CT-RSA 2002","author":"J. Wolkerstorfer","year":"2002","unstructured":"Johannes Wolkerstorfer, Elisabeth Oswald, and Mario Lamberger. An ASIC implementation of the AES S-boxes. In Bart Preneel, editor, Topics in Cryptology-CT-RSA 2002, Lecture Notes in Computer Science, pages 67\u201378. Springer-Verlag, 2002."}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2014 INDOCRYPT 2002"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36231-2_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,29]],"date-time":"2019-04-29T21:26:35Z","timestamp":1556573195000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36231-2_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540002635","9783540362319"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/3-540-36231-2_1","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}