{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T13:32:47Z","timestamp":1744205567073},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540002635"},{"type":"electronic","value":"9783540362319"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-36231-2_5","type":"book-chapter","created":{"date-parts":[[2007,7,2]],"date-time":"2007-07-02T11:21:45Z","timestamp":1183375305000},"page":"48-61","source":"Crossref","is-referenced-by-count":10,"title":["On Differential Properties of Pseudo-Hadamard Transform and Related Mappings (Extended Abstract)"],"prefix":"10.1007","author":[{"given":"Helger","family":"Lipmaa","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,12,18]]},"reference":[{"issue":"1","key":"5_CR1","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E. Biham","year":"1991","unstructured":"Eli Biham and Adi Shamir. Differential Cryptanalysis of DES-like Cryptosystems. Journal of Cryptology, 4(1):3\u201372, 1991.","journal-title":"Journal of Cryptology"},{"key":"5_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1007\/BFb0052332","volume-title":"Fast Software Encryption\u2019 97","author":"T. Jakobsen","year":"1997","unstructured":"Thomas Jakobsen and Lars Knudsen. The Interpolation Attack on Block Ciphers. In Eli Biham, editor, Fast Software Encryption\u2019 97, volume 1267 of Lecture Notes in Computer Science, pages 28\u201340, Haifa, Israel, January 1997. Springer-Verlag."},{"key":"5_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1007\/3-540-45473-X_28","volume-title":"Fast Software Encryption\u2019 2001","author":"H. Lipmaa","year":"2001","unstructured":"Helger Lipmaa and Shiho Moriai. Efficient Algorithms for Computing Differential Properties of Addition. In Mitsuru Matsui, editor, Fast Software Encryption\u2019 2001, volume 2355 of Lecture Notes in Computer Science, pages 336\u2013350, Yokohama, Japan, 2\u20134 April 2001. Springer-Verlag, 2002."},{"key":"5_CR4","series-title":"Lect Notes Comput Sci","first-page":"1","volume-title":"Fast Software Encryption\u2019 93","author":"J. L. Massey","year":"1993","unstructured":"James L. Massey. SAFER K-64: A Byte-Oriented Block-Ciphering Algorithm. In Ross Anderson, editor, Fast Software Encryption\u2019 93, volume 809 of Lecture Notes in Computer Science, pages 1\u201317, Cambridge, UK, 9\u201311 December 1993. Springer-Verlag."},{"issue":"3","key":"5_CR5","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1023\/A:1019991004496","volume":"27","author":"S. Murphy","year":"2002","unstructured":"S. Murphy and M. J. B. Robshaw. Key-dependent S-boxes and Differential Cryptanalysis. Designs, Codes and Cryptography, 27(3):229\u2013255, 2002.","journal-title":"Designs, Codes and Cryptography"},{"key":"5_CR6","series-title":"Lect Notes Comput Sci","isbn-type":"print","first-page":"45","volume-title":"Advances in Cryptology-EUROCRYPT\u2019 92","author":"Schnorr. Claus-Peter","year":"1992","unstructured":"Claus-Peter Schnorr. FFT-Hash II, Efficient Cryptographic Hashing. In Rainer A. Rueppel, editor, Advances in Cryptology-EUROCRYPT\u2019 92, volume 658 of Lecture Notes in Computer Science, pages 45\u201354, Balatonf\u00fcred, Hungary, 24\u201328 May 1992. Springer-Verlag. ISBN 3-540-56413-6.","ISBN":"http:\/\/id.crossref.org\/isbn\/3540564136"},{"key":"5_CR7","unstructured":"Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall, and Niels Ferguson. The Twofish Encryption Algorithm: A 128-Bit Block Cipher. John Wiley & Sons, April 1999. ISBN: 0471353817."}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2014 INDOCRYPT 2002"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36231-2_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,17]],"date-time":"2019-02-17T11:07:32Z","timestamp":1550401652000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36231-2_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540002635","9783540362319"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/3-540-36231-2_5","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}