{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T15:14:29Z","timestamp":1742397269861},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540602217"},{"type":"electronic","value":"9783540447504"}],"license":[{"start":{"date-parts":[[1995,1,1]],"date-time":"1995-01-01T00:00:00Z","timestamp":788918400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1995]]},"DOI":"10.1007\/3-540-44750-4_14","type":"book-chapter","created":{"date-parts":[[2007,8,16]],"date-time":"2007-08-16T04:39:53Z","timestamp":1187239193000},"page":"171-184","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":37,"title":["On Differential and Linear Cryptanalysis of the RC5 Encryption Algorithm"],"prefix":"10.1007","author":[{"suffix":"Jr.","given":"Burton S.","family":"Kaliski","sequence":"first","affiliation":[]},{"given":"Yiqun Lisa","family":"Yin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,13]]},"reference":[{"key":"14_CR1","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4613-9314-6","volume-title":"Differential Cryptanalysis of the Data Encryption Standard","author":"E. Biham","year":"1993","unstructured":"E. Biham and A. Shamir. Differential Cryptanalysis of the Data Encryption Standard. Springer-Verlag, New York, 1993."},{"key":"14_CR2","first-page":"26","volume-title":"Advances in Cryptology \u2014 Crypto\u2019 94","author":"B. S. Kaliski Jr.","year":"1994","unstructured":"B. S. Kaliski Jr. and M. J. B. Robshaw. Linear cryptanalysis using multiple approximations. In Y. G. Desmedt, editor, Advances in Cryptology \u2014 Crypto\u2019 94, pages 26\u201339, Springer Verlag, New York, 1994."},{"key":"14_CR3","unstructured":"B. S. Kaliski and Y. L. Yin. On the Security of the RC5 Encryption Algorithm. Technical Report, RSA Laboratories. In preparation."},{"key":"14_CR4","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1007\/3-540-46416-6_2","volume-title":"Advances in Cryptology \u2014 Eurocrypt\u2019 91","author":"X. Lai","year":"1991","unstructured":"X. Lai, J. L. Massey, and S. Murphy. Markov ciphers and differential cryptanalysis. In D. W. Davies, editor, Advances in Cryptology \u2014 Eurocrypt\u2019 91, pages 17\u201338, Springer Verlag, Berlin, 1991."},{"key":"14_CR5","first-page":"17","volume-title":"Advances in Cryptology \u2014 Crypto\u2019 94","author":"S. K. Lanford","year":"1994","unstructured":"S. K. Lanford and M. E. Hellman. Differential-linear cryptanalysis In Y. G. Desmedt, editor, Advances in Cryptology \u2014 Crypto\u2019 94, pages 17\u201325, Springer-Verlag, New York, 1994."},{"key":"14_CR6","first-page":"1","volume-title":"Advances in Cryptology \u2014 Crypto\u2019 94","author":"M. Matsui","year":"1994","unstructured":"M. Matsui. The first experimental cryptanalysis of the Data Encryption Standard. In Y. G. Desmedt, editor, Advances in Cryptology \u2014 Crypto\u2019 94, pages 1\u201311, Springer-Verlag, New York, 1994."},{"key":"14_CR7","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume-title":"Advances in Cryptology \u2014 Eurocrypt\u2019 93","author":"M. Matsui","year":"1994","unstructured":"M. Matsui. Linear cryptanalysis method for DES cipher. In T. Helleseth, editor, Advances in Cryptology \u2014 Eurocrypt\u2019 93, pages 386\u2013397, Springer-Verlag, Berlin, 1994."},{"key":"14_CR8","unstructured":"National Institute of Standards and Technology (NIST). FIPS Publication 46-2: Data Encryption Standard. December 30, 1993."},{"key":"14_CR9","unstructured":"R. L. Rivest. The RC5 encryption algorithm. In Proceedings of the Workshop on Cryptographic Algorithms, K. U. Leuven, December 1994. To appear."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPT0\u2019 95"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44750-4_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,29]],"date-time":"2020-01-29T13:56:56Z","timestamp":1580306216000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44750-4_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995]]},"ISBN":["9783540602217","9783540447504"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/3-540-44750-4_14","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1995]]},"assertion":[{"value":"13 July 2001","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}