{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T20:41:59Z","timestamp":1771706519324,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540545088","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-38424-3_39","type":"book-chapter","created":{"date-parts":[[2007,12,3]],"date-time":"2007-12-03T13:05:56Z","timestamp":1196687156000},"page":"565-574","source":"Crossref","is-referenced-by-count":9,"title":["A Recursive Construction Method of S-boxes Satisfying Strict Avalanche Criterion"],"prefix":"10.1007","author":[{"given":"Kwangjo","family":"Kim","sequence":"first","affiliation":[]},{"given":"Tsutomu","family":"Matsumoto","sequence":"additional","affiliation":[]},{"given":"Hideki","family":"Imai","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"39_CR1","volume-title":"Data Encryption Standard(DES)","author":"NBS","year":"1977","unstructured":"NBS, \u201cData Encryption Standard(DES)\u201d, FIPS PUB 46, US National Burcau of Standards, Washinston DC, Jan., 1977."},{"issue":"4\/5","key":"39_CR2","first-page":"321","volume":"37","author":"S. Miyaguchi","year":"1988","unstructured":"S. Miyaguchi, A. Shiraishi and A. Shimizu, \u201cFast data encryption algorithm FEAL-8 (in Japanese )\u201d, Electr. Comm. Lab. Tech. J., NTT, Vol.37, No.4\/5, pp.321\u2013327, 1988.","journal-title":"Electr. Comm. Lab. Tech. J."},{"key":"39_CR3","doi-asserted-by":"crossref","unstructured":"L. Brown, J. Pieprzyk and J. Seberry, \u201cLOKI-a cryptographic primitive for authentication and secrecy\u201d, Proc. of AUSCRYPT90, 1990.","DOI":"10.1007\/BFb0030364"},{"issue":"10","key":"39_CR4","doi-asserted-by":"publisher","first-page":"747","DOI":"10.1109\/TC.1979.1675242","volume":"C-28","author":"J.B. Kam","year":"1979","unstructured":"J.B. Kam and G.I. Davida, \u201cStructured design of substitution-permutation encryption network\u201d, IEEE Trans, on Comput., Vol.C-28, No.10, pp.747\u2013753, Oct., 1979.","journal-title":"IEEE Trans, on Comput."},{"key":"39_CR5","unstructured":"A.F. Webster and S.E. Tavares, \u201cOn the design of S-boxes\u201d, Proc. of CRYPTO85, Springer-Verlag, 1985."},{"issue":"5","key":"39_CR6","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1038\/scientificamerican0573-15","volume":"228","author":"H. Feistel","year":"1973","unstructured":"H. Feistel, \u201cCryptography and computer privacy\u201d, Scientific American, Vol.228, No.5, pp 15\u201323, 1973.","journal-title":"Scientific American"},{"key":"39_CR7","unstructured":"R. Forr\u00e9, \u201cThe strict avalanche criterion: spectral properties of Boolean functions and an extended definition\u201d, Proc.of CRYPTO88, Springer-Verlag, 1988."},{"key":"39_CR8","unstructured":"S. Lloyd, \u201cCounting functions satisfying a higher order strict avalanche criterion\u201d, Proc. of EUROCYRPT89, Springer-Verlag, 1989."},{"key":"39_CR9","doi-asserted-by":"crossref","unstructured":"J.A. Gordon and H. Retkin, \u201cAre big S-boxes best?\u201d, IEEE workshop on computer security, pp.257\u2013262, 1981.","DOI":"10.1007\/3-540-39466-4_18"},{"issue":"5","key":"39_CR10","first-page":"195","volume":"129","author":"F. Ayoub","year":"1982","unstructured":"F. Ayoub, \u201cProbabilistic completeness of substitution-permutation encryption networks\u201d, IEE, Vol.129, E, 5, pp195\u2013199, Sep., 1982.","journal-title":"IEE"},{"key":"39_CR11","unstructured":"J.P. Pieprzyk, \u201cNon-linearity of exponent permutations\u201d, Proc. of EURO-CRYPTO89, Springer-Verlag, 1989."},{"issue":"7","key":"39_CR12","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1049\/el:19900299","volume":"26","author":"S. Babbage","year":"1990","unstructured":"S. Babbage, \u201cOn the relevance of the strict avalanche criterion\u201d, Electronics Letters, Vol.26, No.7, pp.461\u2013462, 29th Max., 1990.","journal-title":"Electronics Letters"},{"key":"39_CR13","unstructured":"M. Hellman, R. Merkle, R. Schroeppel, L. Washington, W. Diffie, S. Pohlig and P. Schweitzer, \u201cResults of an initial attempt to analyze the NBS data encryption standard\u201d, Information Systems Laboratory Report, Stanford University, 1976."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology-CRYPT0\u2019 90"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-38424-3_39.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,28]],"date-time":"2021-04-28T01:20:18Z","timestamp":1619572818000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-38424-3_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540545088"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/3-540-38424-3_39","relation":{},"subject":[]}}