{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T03:22:15Z","timestamp":1761708135839,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540006220"},{"type":"electronic","value":"9783540364924"}],"license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36492-7_10","type":"book-chapter","created":{"date-parts":[[2007,10,23]],"date-time":"2007-10-23T23:36:10Z","timestamp":1193182570000},"page":"129-146","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["Higher Order Differential Attack of Camellia(II)"],"prefix":"10.1007","author":[{"given":"Yasuo","family":"Hatano","sequence":"first","affiliation":[]},{"given":"Hiroki","family":"Sekine","sequence":"additional","affiliation":[]},{"given":"Toshinobu","family":"Kaneko","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,2,17]]},"reference":[{"issue":"1","key":"10_CR1","first-page":"11","volume":"E85-A","author":"K. Aoki","year":"2002","unstructured":"K. Aoki, T. Ichikawa, M. Kanda, M. Matsui, S. Moriai, J. Nakajima, and T. Tokita, \u201cThe 128-Bit Block Cipher Camellia,\u201d IEIEC Trans. Fundamentals, Vol.E85-A, No.1, pp.11\u201324, Jan, 2002.","journal-title":"IEIEC Trans. Fundamentals"},{"key":"10_CR2","unstructured":"K. Aoki, T. Ichikawa, M. Kanda, M. Matsui, S. Moriai, J. Nakajima, and T. Tokita, \u201cCamellia \u2014A 128-Bit Block Cipher Camellia,\u201dTechnical Report of IEICE, ISEC2000."},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"N. Furguson, J. Kelsey, S. Luck, B. Schneier, M. Stay, D. Wagner, and D. Whiting, \u201cImproved Cryptanalysis of Rijndael,\u201d Seventh Fast Software Encryption Workshop, 2000.","DOI":"10.1007\/3-540-44706-7_15"},{"key":"10_CR4","series-title":"Lect Notes Comput Sci","first-page":"213","volume-title":"Square Attack on Reduced Round Camemllia Cipher","author":"Y. He","year":"2000","unstructured":"Y. He, and S. Quing, \u201cSquare Attack on Reduced Round Camemllia Cipher,\u201d ICISC 2001, LNCS 2229, Springer-Verlag, pp.213\u2013230, 2000."},{"key":"10_CR5","unstructured":"T. Iwata, and K. Kurosawa,\u201cProbabilistic Higher Order Differential Attack and Secure Boolean Functions\u201d,The 2000 Symposium on Cryptography and Information Security, SCIS2000-A-46, Okinawa, Japan, Jan.26\u201328, 2000."},{"issue":"1","key":"10_CR6","first-page":"25","volume":"E85-A","author":"M. Kanda","year":"2002","unstructured":"M. Kanda, and T. Matsumoto, \u201cOn the Security of Feistel Cipher with SPN Round Function against Differential, Linear, and Truncated Differential Cryptanalysis,\u201d IEIEC Trans. Fundamentals, Vol.E85-A, No.1, pp.25\u201337, Jan, 2002.","journal-title":"IEIEC Trans. Fundamentals"},{"key":"10_CR7","unstructured":"T. Kawabata, and T. Kaneko, \u201cA Study on Higher Order Differential Attack of Camellia,\u201d Second Open, NESSIE Workshop, Londom, U.K, Sep. 2001."},{"key":"10_CR8","series-title":"Lect Notes Comput Sci","volume-title":"The Interpolation Attack on Block Cipher","author":"L. R. Knudsen","year":"1996","unstructured":"Lar R. Knudsen \u201cThe Interpolation Attack on Block Cipher,\u201d Fast Software Encryption 4-th International Workshop, LNCS.1008, Springer-Verlag. Berlin, 1996."},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"X. Lai, \u201cHigher Order Derivatives and Differential Cryptanalysis,\u201d Communications and Cryptography, pp.227\u2013233, Kluwer Academic Publishers, 1994.","DOI":"10.1007\/978-1-4615-2694-0_23"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"S. Lee, S. Hong, S. Lee, J. Lim, and S. Yoon, \u201cTruncated Differential Cryptanalysis of Camellia,\u201d ICISC2001.","DOI":"10.1007\/3-540-45861-1_3"},{"key":"10_CR11","series-title":"Lect Notes Comput Sci","volume-title":"Higher Order Differential Attack of a CAST Cipher","author":"T. Shimoyama","year":"1996","unstructured":"T. Shimoyama, S. Moriai, and T. Kaneko, \u201cHigher Order Differential Attack of a CAST Cipher,\u201d Fast Software Encryption 4-th International Workshop, LNCS.1372, Springer-Verlag. Berlin, 1996."},{"key":"10_CR12","first-page":"123","volume-title":"Fast Software Encryption","author":"T. Shirai","year":"2002","unstructured":"T. Shirai, S, Kanamaru, and G. Abe, \u201cImproved Upper Bounds of Differential and Linear Characteristic Probability for Camellia\u201d Fast Software Encryption 2002, FSE2002, pp.123\u2013137, Lenven, Belgium, Feb, 2002."},{"key":"10_CR13","unstructured":"M. Takeda, and T. Kaneko, \u201cA Study for Controled Higher Order Differential Cryptanalysis of Camellia,\u201d The 2002 Symposium on Cryptography and Information Security, SCIS2002, Shirahama, Japan, Jan.29\u2013Feb.1, 2002. (in Japanese)."},{"key":"10_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1007\/3-540-46796-3_22","volume-title":"Strength ofMISTY1 without FL function for Higher Order Differential Attack","author":"H. Tanaka","year":"1999","unstructured":"H. Tanaka, K. Hisamatsu, and T. Kaneko, \u201cStrength ofMISTY1 without FL function for Higher Order Differential Attack,\u201d Applied Algebra, Algebraic Algorithm and Error Correcting Codes Symposium(AAECC13), LNCS.1719 pp.221\u2013230, 1999."},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Y. Yeom, S. Park, and I. Kim, \u201cOn the Security of Camellia against the Square Attack,\u201d Fast Software Encryption 2002, FSE2002, pp.84\u201393, Lenven, Belgium, Feb, 2002.","DOI":"10.1007\/3-540-45661-9_7"}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36492-7_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T21:10:01Z","timestamp":1737493801000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36492-7_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540006220","9783540364924"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/3-540-36492-7_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]},"assertion":[{"value":"17 February 2003","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}