{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:37:14Z","timestamp":1725496634986},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540545088"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-38424-3_41","type":"book-chapter","created":{"date-parts":[[2007,12,3]],"date-time":"2007-12-03T13:05:56Z","timestamp":1196687156000},"page":"583-600","source":"Crossref","is-referenced-by-count":0,"title":["Nonlinear Parity Circuits and their Cryptographic Applications"],"prefix":"10.1007","author":[{"given":"Kenji","family":"Koyama","sequence":"first","affiliation":[]},{"given":"Routo","family":"Terada","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"41_CR1","volume-title":"Abstract of Auscrypt","author":"L. Brown","year":"1990","unstructured":"Brown, L., J. Pieprzyk and J. Seberry: \u201cLOKI-A cryptographic primitive for authentication and secrecy applications\u201d, Abstract of Auscrypt 90, U. of New South Wales, Sydney, Australia, January (1990)."},{"issue":"5","key":"41_CR2","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1038\/scientificamerican0573-15","volume":"228","author":"H. Feistel","year":"1973","unstructured":"Feistel, H.: \u201cCryptography and computer privacy\u201d, Scientic American, Vol.228, No.5, pp.15\u201323, (1973).","journal-title":"Scientic American"},{"key":"41_CR3","unstructured":"Forre, R.: \u201cThe strict avalanche criterion: spectral properties of Boolean functions and an extended definition\u201d, Proc. of CRYPTO\u201988, (1988)."},{"issue":"10","key":"41_CR4","doi-asserted-by":"publisher","first-page":"747","DOI":"10.1109\/TC.1979.1675242","volume":"28","author":"J. B. Kam","year":"1979","unstructured":"Kam, J. B. and G. I. Davida: \u201cStructured design of substitution-permutation encryption network\u201d, IEEE Trans. on Computers, Vol.28, No.10, pp.747\u2013753, Oct., (1979).","journal-title":"IEEE Trans. on Computers"},{"key":"41_CR5","volume-title":"Cryptography: A Primer","author":"A. G. Konheim","year":"1981","unstructured":"Konheim, A. G.: \u201cCryptography: A Primer\u201d, John Wiley & Sons, New York, (1981)."},{"key":"41_CR6","unstructured":"Lloyd, S.: \u201cCounting functions satisfying a higher order strict avalanche criterion\u201d, Proc. of Eurocrypt\u201989, (1989)."},{"issue":"5","key":"41_CR7","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1109\/5.4440","volume":"76","author":"J. Massey","year":"1988","unstructured":"Massey J.: \u201cAn introduction to contemporary cryptology\u201d, Proc. IEEE, Vol.76, no.5, pp.533\u2013549, May (1988).","journal-title":"Proc. IEEE"},{"key":"41_CR8","unstructured":"Meier, M. and O. Staffelbach: \u201cNonlinearity criteria for cryptographic functions\u201d, Proc. of Eurocrypt\u201989 (1989)."},{"key":"41_CR9","unstructured":"Miyaguchi, S., K. Ohta and M. Iwata:\u201c128-bit hash function (N-Hash)\u201d, Proc. of Securicom\u201990 (1990)."},{"key":"41_CR10","unstructured":"National Bureau of Standards: \u201cData Encryption Standard\u201d, FIPS Publication 46, U. S. Dept. of Commerce, January (1977)."},{"key":"41_CR11","unstructured":"Merkle, R. C.: \u201cA software encryption function\u201d, private communication, (1989)."},{"key":"41_CR12","unstructured":"Miyaguchi, S., A. Shiraishi, and A. Shimizu: \u201cFast data encipherment algorithm FEAL-8\u201d, Review of the Electrical Communication Laboratories, vol. 36-4, (1988)."},{"key":"41_CR13","unstructured":"Quisquarter, J. J. and J. P. Delescaille: \u201cHow easy is collision search? New results and applications to DES\u201d, Proc. of CRYPTO\u201989 (1989)."},{"key":"41_CR14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-82865-2","volume-title":"Analysis and design of stream ciphers","author":"R. A. Rueppel","year":"1986","unstructured":"Rueppel R. A.: \u201cAnalysis and design of stream ciphers\u201d, Springer-Verlag, Berlin, (1986)."},{"key":"41_CR15","unstructured":"Simmons, G. J.: \u201cPredictions for the 1990\u2019s\u201d, IACR Newsletter, vol. 7, No.1, January (1990)."},{"key":"41_CR16","unstructured":"Webster, A. F. and S. E. Tavares.: \u201cOn the design of S-box\u201d, Proc. of CRYPTO\u201985, Springer, (1986)."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology-CRYPT0\u2019 90"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-38424-3_41.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,28]],"date-time":"2021-04-28T01:20:19Z","timestamp":1619572819000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-38424-3_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540545088"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/3-540-38424-3_41","relation":{},"subject":[]}}