{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,6]],"date-time":"2026-05-06T10:59:39Z","timestamp":1778065179792,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540545088","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-38424-3_1","type":"book-chapter","created":{"date-parts":[[2007,12,3]],"date-time":"2007-12-03T13:05:56Z","timestamp":1196687156000},"page":"2-21","source":"Crossref","is-referenced-by-count":493,"title":["Differential Cryptanalysis of DES-like Cryptosystems"],"prefix":"10.1007","author":[{"given":"Eli","family":"Biham","sequence":"first","affiliation":[]},{"given":"Adi","family":"Shamir","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"E. F. Brickell, J. H. Moore, M. R. Purtill, Structure in the S-Boxes of the DES, Advances in cryptology, proceedings of CRYPTO 86, pp. 3\u20137, 1986.","DOI":"10.1007\/3-540-47721-7_1"},{"key":"1_CR2","unstructured":"David Chaum, Jan-Hendrik Evertse, Cryptanalysis of DES with a reduced number of rounds, Sequences of linear factors in block ciphers, technical report, 1987."},{"key":"1_CR3","unstructured":"D. W. Davies, private communications."},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Bert Den Boer, Cryptanalysis of F. E. A. L., Advances in cryptology, proceedings of EUROCRYPT 88, 1988.","DOI":"10.1007\/3-540-45961-8_27"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Yvo Desmedt, Jean-Jacque Quisquater, Marc Davio, Dependence of output on input in DES: small avalanche characteristics, Advances in cryptology, proceedings of CRYPTO 84, pp. 359\u2013376, 1984.","DOI":"10.1007\/3-540-39568-7_28"},{"issue":"6","key":"1_CR6","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/C-M.1977.217750","volume":"10","author":"W. Diffie","year":"1977","unstructured":"W. Diffie and M. E. Hellman, Exhaustive cryptanalysis of the NBS Data Encryption Standard, Computer, Vol. 10, No. 6, pp. 74\u201384, June 1977.","journal-title":"Computer"},{"issue":"5","key":"1_CR7","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1038\/scientificamerican0573-15","volume":"228","author":"H. Feistel","year":"1973","unstructured":"H. Feistel, Cryptography and data security, Scientific american, Vol 228, No. 5, pp. 15\u201323, May 1973.","journal-title":"Scientific american"},{"issue":"4","key":"1_CR8","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1109\/TIT.1980.1056220","volume":"26","author":"M. E. Hellman","year":"1980","unstructured":"M. E. Hellman, A Cryptanalytic Time-Memory Tradeoff, IEEE Trans. Inform. Theory, Vol. 26, No. 4, pp. 401\u2013406, July 1980.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"1_CR9","unstructured":"M. E. Hellman, R. Merkle, R. Schroppel, L. Washington, W. Diffie, S. Pohlig and P. Schweitzer, Results of an Initial Attempt to Cryptanalyze the NBS Data Encryption Standard, Stanford university, September 1976."},{"key":"1_CR10","unstructured":"Ralph C. Merkle, technical report, March 1990."},{"key":"1_CR11","unstructured":"Shoji Miyaguchi, Feal-N specifications."},{"key":"1_CR12","unstructured":"S. Miyaguchi, K. Ohta, M. Iwata, 128-bit hash function (N-Hash), proceedings of SECURICOM90, March 1990."},{"key":"1_CR13","unstructured":"Shoji Miyaguchi, Akira Shiraishi, Akihiro Shimizu, Fast data encryption algorithm Feal-8, Review of electrical communications laboratories, Vol. 36 No. 4, 1988."},{"key":"1_CR14","unstructured":"National Bureau of Standards, Data Encryption Standard, U.S. Department of Commerce, FIPS pub. 46, January 1977."},{"key":"1_CR15","unstructured":"Ingrid Schaumuller-Bichl, Zur Analyse des Data Encryption Standard und Synthese Verwandter Chiffriersysteme, thesis, May 1981."},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Ingrid Schaumuller-Bichl, Cryptanalysis of the Data Encryption Standard by the Method of Formal Coding, Cryptologia, proceedings of CRYPTO 82, pp. 235\u2013255, 1982.","DOI":"10.1007\/3-540-39466-4_17"},{"key":"1_CR17","unstructured":"Ingrid Schaumuller-Bichl, On the Design and Analysis of New Cipher Systems Related to the DES, technical report, 1983."},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Akihiro Shimizu, Shoji Miyaguchi, Fast Data Encryption Algorithm Feal, Advances in cryptology. proceedings of EUROCRYPT 87. pp. 267, 1957.","DOI":"10.1007\/3-540-39118-5_24"},{"key":"1_CR19","unstructured":"Akihiro Shimizu, Shoji Miyaguchi. Fast Data Encryption Algorithm Feal, Abstracts of EUROCRYPT 87. Amsterdam, April 1987."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology-CRYPT0\u2019 90"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-38424-3_1.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,28]],"date-time":"2021-04-28T01:20:04Z","timestamp":1619572804000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-38424-3_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540545088"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/3-540-38424-3_1","relation":{},"subject":[]}}