{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T12:09:45Z","timestamp":1770293385901,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540004097","type":"print"},{"value":"9783540364009","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36400-5_34","type":"book-chapter","created":{"date-parts":[[2007,9,2]],"date-time":"2007-09-02T19:59:37Z","timestamp":1188763177000},"page":"470-483","source":"Crossref","is-referenced-by-count":69,"title":["A New Class of Invertible Mappings"],"prefix":"10.1007","author":[{"given":"Alexander","family":"Klimov","sequence":"first","affiliation":[]},{"given":"Adi","family":"Shamir","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,2,17]]},"reference":[{"key":"34_CR1","unstructured":"V. S. Anashin, \u201cUniformly distributed sequences over p-adic integers\u201d, Proceedings of the Int\u2019l Conference on Number Theoretic and Algebraic Methods in Computer Science (A. J. van der Poorten, I. Shparlinsky and H. G. Zimmer, eds.), World Scientific, 1995."},{"key":"34_CR2","doi-asserted-by":"crossref","unstructured":"E. Biham, \u201cA Fast New DES Implementation in Software\u201d, Fast Software Encryption Workshop, 1997","DOI":"10.1007\/BFb0052352"},{"issue":"5","key":"34_CR3","first-page":"15","volume":"228","author":"H. Feistel","year":"1973","unstructured":"H. Feistel, \u201cCryptography and Computer Privacy,\u201d Scientific American, v. 228, n. 5, May 1973, pp. 15\u201323.","journal-title":"Cryptography and Computer Privacy"},{"key":"34_CR4","doi-asserted-by":"crossref","unstructured":"V. Furman, \u201cDifferential Cryptanalysis of Nimbus\u201d, Fast Software Encryption Workshop, 2001","DOI":"10.1007\/3-540-45473-X_16"},{"key":"34_CR5","doi-asserted-by":"crossref","unstructured":"H. Lipmaa, S. Moriai, \u201cEfficient Algorithms for Computing Differential Properties of Addition\u201d, 2001. Available from http:\/\/citeseer.nj.nec.com\/lipmaa01efficient.html","DOI":"10.1007\/3-540-45473-X_28"},{"key":"34_CR6","unstructured":"A. W. Machado, \u201cThe nimbus cipher: A proposal for NESSIE\u201d, NESSIE Proposal, 2000."},{"key":"34_CR7","unstructured":"National Bureau of Standards, NBS FIPS PUB 46, \u201cData Encryption Standard,\u201d National Bureau of Standards, U.S. Department of Commerce, Jan 1977."},{"key":"34_CR8","unstructured":"J. Daemen, V. Rijmen, \u201cAES Proposal: Rijndael\u201d, version 2, 1999"},{"key":"34_CR9","unstructured":"R. Rivest, M. Robshaw, R. Sidney, and Y. L. Yin, \u201cThe RC6 block cipher\u201d. Available from http:\/\/www.rsa.com\/rsalabs\/rc6\/"},{"key":"34_CR10","unstructured":"R. Rivest, \u201cPermutation Polynomials Modulo 2\u03c9\u201d, 1999."},{"key":"34_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1007\/BFb0028319","volume-title":"Unbalanced Feistel Networks and Block Cipher Design","author":"B. Schneier","year":"1997","unstructured":"B. Schneier and J. Kelsey, \u201cUnbalanced Feistel Networks and Block Cipher Design\u201d, in Proceedings of the Third International Workshop on Fast Software Encryption, Cambridge, UK, February 1996, Springer, LNCS 1039, pp.121\u2013144."},{"key":"34_CR12","series-title":"Lect Notes Comput Sci","first-page":"1","volume-title":"Efficient Signature Schemes Based on Birational Permutations","author":"A. Shamir","year":"1996","unstructured":"A. Shamir, \u201cEfficient Signature Schemes Based on Birational Permutations\u201d, in Proceedings of CRYPTO 93, LNCS 773, 1\u201312."}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems - CHES 2002"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36400-5_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T15:39:50Z","timestamp":1556811590000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36400-5_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540004097","9783540364009"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/3-540-36400-5_34","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2003]]}}}