{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T17:38:04Z","timestamp":1760204284785},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540006220"},{"type":"electronic","value":"9783540364924"}],"license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36492-7_11","type":"book-chapter","created":{"date-parts":[[2007,10,23]],"date-time":"2007-10-23T23:36:10Z","timestamp":1193182570000},"page":"147-159","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Square-like Attacks on Reduced Rounds of IDEA"],"prefix":"10.1007","author":[{"given":"H\u00fcseyin","family":"Demirci","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,2,17]]},"reference":[{"key":"11_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1007\/3-540-48519-8_10","volume-title":"Miss in the Middle Attacks on IDEA and Khufu","author":"E. Biham","year":"1999","unstructured":"E. Biham, A. Biryukov, A. Shamir, Miss in the Middle Attacks on IDEA and Khufu, LNCS 1636, Proceedings of Fast Software Encryption-6th International Workshop, FSE\u2019 99, pp. 124\u2013138, Springer-Verlag, 1999."},{"key":"11_CR2","series-title":"Lect Notes Comput Sci","first-page":"394","volume-title":"Structural Cryptanalysis of SASAS","author":"A. Biryukov","year":"2001","unstructured":"A. Biryukov, A. Shamir, Structural Cryptanalysis of SASAS, LNCS 2045, Advances in Cryptology-Proceedings of EUROCRYPT\u20192001, pp. 394\u2013405, Springer-Verlag, 2001."},{"key":"11_CR3","series-title":"Lect Notes Comput Sci","first-page":"1","volume-title":"Two Attacks on Reduced IDEA (extended abstract)","author":"J. Borst","year":"1997","unstructured":"J. Borst, L. R. Knudsen, V. Rijmen, Two Attacks on Reduced IDEA (extended abstract), LNCS 1223, Advances in Cryptology-Proceedings of EUROCRYPT\u201997, pp. 1\u201313, Springer-Verlag, 1997."},{"key":"11_CR4","unstructured":"J. Daemen, R. Govaerts, J. Vandewalle, Cryptanalysis of 2.5 round of IDEA (extended abstract), Technical Report ESAC-COSIC Technical Report 93\/1, Department Of Electrical Engineering, Katholieke Universiteit Leuven, March 1993."},{"key":"11_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1007\/BFb0052343","volume-title":"FSE\u201997","author":"J. Daemen","year":"1997","unstructured":"J. Daemen, L. Knudsen and V. Rijmen, The Block Cipher SQUARE, LNCS 1267, FSE\u201997, pp. 149\u2013165, Springer-Verlag, 1997."},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"K. Hwang, W. Lee, S. Lee, S. Lee, J. Lim, Saturation Attacks on Reduced Round Skipjack, FSE\u20192002, Pre-Proceedings.","DOI":"10.1007\/3-540-45661-9_8"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"L. Knudsen, D. Wagner, Integral Cryptanalysis, FSE\u20192002, Pre-Proceedings.","DOI":"10.1007\/3-540-45661-9_9"},{"key":"11_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1007\/3-540-46877-3_35","volume-title":"A Proposal for a New Block Encryption Standard","author":"X. Lai","year":"1991","unstructured":"X. Lai, J. L. Massey, A Proposal for a New Block Encryption Standard, LNCS 473, Advances in Cryptology-Proceedings of EUROCRYPT\u201990, pp. 389\u2013404, Springer-Verlag, 1991."},{"key":"11_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1007\/3-540-46416-6_2","volume-title":"Markov Ciphers and Differential Cryptanalysis","author":"X. Lai","year":"1991","unstructured":"X. Lai, J. L. Massey and S. Murphy, Markov Ciphers and Differential Cryptanalysis, LNCS 547, Advances in Cryptology-Proceedings of EUROCRYPT\u201991, pp. 17\u201338,Springer-Verlag, 1991."},{"key":"11_CR10","unstructured":"X. Lai, On the Design and Security of the Block Ciphers, ETH Series in Information Processing, Volume 1, Hartung-Gorre Verlag Konstanz, 1995."},{"key":"11_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1007\/3-540-47745-4","volume-title":"FSE\u20192001","author":"S. Lucks","year":"2001","unstructured":"S. Lucks, The Saturation Attack-a Bait for Twofish, LNCS 1039, FSE\u20192001, pp. 189\u2013203, Springer-Verlag, 2001."},{"key":"11_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1007\/3-540-48285-7_32","volume-title":"On the Security of the IDEA Block Cipher","author":"W. Meier","year":"1994","unstructured":"W. Meier, On the Security of the IDEA Block Cipher, LNCS 765, Advances in Cryptology-Proceedings of EUROCRYPT\u201993, pp. 371\u2013385, Springer-Verlag, 1994."},{"key":"11_CR13","unstructured":"J. Nakahara Jr., P.S.L.M. Barreto, B. Preneel, J. Vandewalle, H.Y. Kim, SQUARE Attacks Against Reduced-Round PES and IDEA Block Ciphers, IACR Cryptology ePrint Archive, Report 2001\/068, 2001."}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36492-7_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,16]],"date-time":"2020-01-16T08:03:19Z","timestamp":1579161799000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36492-7_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540006220","9783540364924"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/3-540-36492-7_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]},"assertion":[{"value":"17 February 2003","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}