{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:40:28Z","timestamp":1725493228081},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540420699"},{"type":"electronic","value":"9783540449836"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-44983-3_6","type":"book-chapter","created":{"date-parts":[[2007,10,27]],"date-time":"2007-10-27T18:33:17Z","timestamp":1193509997000},"page":"72-88","source":"Crossref","is-referenced-by-count":18,"title":["The Block Cipher Hierocrypt"],"prefix":"10.1007","author":[{"given":"Kenji","family":"Ohkuma","sequence":"first","affiliation":[]},{"given":"Hirofumi","family":"Muratani","sequence":"additional","affiliation":[]},{"given":"Fumihiko","family":"Sano","sequence":"additional","affiliation":[]},{"given":"Shinichi","family":"Kawamura","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,4,25]]},"reference":[{"key":"6_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"286","DOI":"10.1007\/3-540-60590-8_22","volume-title":"Cryptanalysis of MD4 and SAFER. Fast Software Encryption","author":"S. Vaudenay","year":"1995","unstructured":"S. Vaudenay, \u201cOn the need for multipermutations\u201d: Cryptanalysis of MD4 and SAFER. Fast Software Encryption(2), LNCS 1008, pp.286\u2013297, 1995."},{"key":"6_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1007\/3-540-60865-6_47","volume-title":"Fast Software Encryption","author":"V. Rijmen","year":"1996","unstructured":"V. Rijmen, J. Daemen, B. Preneel, A. Bosselaers, E. DcWin, \u201cThe Cipher SHARK,\u201d Fast Software Encryption(3), LNCS 1039, pp.99\u2013112, 1996."},{"key":"6_CR3","unstructured":"A.M. Youssef, S. Mister, and S.E. Tavres, \u201cOn the Design of Linear Transformations for Substitution Permutation Encryption Networks,\u201d Selected Areas in Cryptography, SAC\u201997, Workshop Report, \n                    http:\/\/saturn.ee.queensu.ca:8000\/sac\/sac97\/papers\/paper29.ps\n                    \n                  ."},{"key":"6_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/BFb0052343","volume-title":"Fast Software Encryption","author":"J. Daemen","year":"1997","unstructured":"J. Daemen, L.R. Knudsen, V. Rijmen, \u201cThe block cipher Square,\u201d Fast Software Encryption(4), LNCS 1267, pp.149\u2013165, 1997."},{"key":"6_CR5","unstructured":"J. Daemen, V. Rijmen, \u201cAES Proposal: Rijndael,\u201d \n                    http:\/\/www.esat.kuleuven.ac.be\/~rijmen\/rijndael\/rijndaeldocV2.zip"},{"issue":"1","key":"6_CR6","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E. Biham","year":"1991","unstructured":"E. Biham and A. Shamir, \u201cDifferential cryptanalysis of DES-like cryptosystems,\u201d Journal of Cryptology, 4 No.1, pp.3\u201372, 1991.","journal-title":"Journal of Cryptology"},{"key":"6_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume-title":"Eurocrypt\u201993","author":"M. Matsui","year":"1994","unstructured":"M. Matsui, \u201cLinear cryptanalysis method for DES cipher,\u201d Eurocrypt\u201993, LNCS 765, pp.386\u2013397, 1994."},{"key":"6_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1007\/3-540-60590-8_16","volume-title":"Fast Software Encryption","author":"L.R. Knudsen","year":"1995","unstructured":"L.R. Knudsen, \u201cTruncated and higher order differentials,\u201d Fast Software Encryption(2), LNCS 1008, pp.196\u2013211, 1995."},{"key":"6_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1007\/3-540-48519-8_4","volume-title":"Fast Software Encryption","author":"C. D\u2019Halluin","year":"1999","unstructured":"C. D\u2019Halluin, G. Bijnens, V. Rijmen, B. Preneel, \u201cAttack on 6 rounds of Crypton,\u201d Fast Software Encryption(6), LNCS.1636, pp.46\u201359, 1999."}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44983-3_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,24]],"date-time":"2019-01-24T19:57:41Z","timestamp":1548359861000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44983-3_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540420699","9783540449836"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/3-540-44983-3_6","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]}}}