{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:21:47Z","timestamp":1725488507962},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540421030"},{"type":"electronic","value":"9783540451167"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45116-1_23","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T13:22:00Z","timestamp":1186406520000},"page":"230-241","source":"Crossref","is-referenced-by-count":4,"title":["Controlled Operations as a Cryptographic Primitive"],"prefix":"10.1007","author":[{"given":"Boris V.","family":"Izotov","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Alexander A.","family":"Moldovyan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nick A.","family":"Moldovyan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2001,5,8]]},"reference":[{"key":"23_CR1","unstructured":"Becker, W.: Method and System for Machine Enciphering and Deciphering. U.S.Patent. 4157454 (1979)"},{"key":"23_CR2","unstructured":"Madryga, W.E.: A High Performance Encryption Algorithm. Computer security: a global challenge, Elsevier Science Publishers (1984) 557\u2013570"},{"key":"23_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1007\/3-540-60590-8_7","volume-title":"Fast Software Encryption \u2014 FSE\u201994 Proceedings","author":"R.L. Rivest","year":"1995","unstructured":"Rivest, R.L.: The RC5 Encryption Algorithm. Fast Software Encryption \u2014 FSE\u201994 Proceedings. Springer-Verlag LNCS. Vol. 1008 (1995) 86\u201396"},{"key":"23_CR4","unstructured":"Rivest, R.L., Robshaw, M.J.B., Sidney, R. and Yin, Y.L.: The RC6 Block Cipher. Proceedings of the 1st Advanced Encryption Standard Candidate Conference. Venture, California (Aug. 20\u201322, 1998) (\n                    http:\/\/www.nist.gov\/aes\n                    \n                  )"},{"key":"23_CR5","unstructured":"Burwick, C., Coppersmith, D., D\u2019Avingnon, E., Gennaro, R., Halevi, Sh., Jutla, Ch., Matyas,Jr. S.M., O\u2019Connor, L., Peyravian, M., Safford, D., and Zunic, N.: MARS \u2014 a Candidate Cipher for AES. Proceedings of 1st Advanced Encryption Standard Candidate Conference. Venture, California (Aug. 20\u201322, 1998)"},{"key":"23_CR6","volume-title":"Mathematical Theory of Connecting Networks and Telephone Traffic","author":"V.E. Benes","year":"1965","unstructured":"Benes, V.E.: Mathematical Theory of Connecting Networks and Telephone Traffic, Academic Press, New York (1965)"},{"issue":"1","key":"23_CR7","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1145\/321439.321449","volume":"15.","author":"A.A. Waksman","year":"1968","unstructured":"Waksman, A.A.: Permutation Network. Journal of the ACM, Vol. 15.1 (1968) 159\u2013163","journal-title":"Journal of the ACM"},{"key":"23_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"302","DOI":"10.1007\/3-540-46416-6_26","volume-title":"Advances in Cryptology-EUROCRYT\u201991 Proceedings","author":"M. Portsa","year":"1991","unstructured":"Portsa, M.: On the Use of Interconnection Networks in Cryptography. Advances in Cryptology-EUROCRYT\u201991 Proceedings. Springer Verlag LNCS, Vol. 547. (1991) 302\u2013315"},{"key":"23_CR9","series-title":"Lect Notes Comput Sci","volume-title":"International Workshop Mathematical Methods, Models and Architectures for Computer Network Security \u2014 MMM-2001 Proceedings","author":"N.D. Goots","year":"2001","unstructured":"Goots, N.D., Moldovyan, A.A., Moldovyan, A.A.: Fast Encryptuion Algorithm SPECTRH64. International Workshop Mathematical Methods, Models and Architectures for Computer Network Security \u2014 MMM-2001 Proceedings. Springer Verlag LNCS. This vol. (2001)"},{"key":"23_CR10","unstructured":"Moldovyan, A.A., Moldovyan, N.A. and Moldovyanu, P.A.: A Method of the Block Cryptographical Transformation of the Binary Information. Russian patent 2141729. Bull. no 32 (1999)"},{"key":"23_CR11","unstructured":"Maslovsky, V.M., Moldovyan, A.A., and Moldovyan, N.A.: A Method of the Block Encryption of Discrete Data. Russian patent 2140710. Bull. no 30 (1999)"},{"key":"23_CR12","unstructured":"Goots, N.D., Izotov, B.V., Moldovyan, A.A., Moldovyan, N.A.: Design of the Controlled Two-place Operations for Fast Flexible Cryptosystems, Security of the Information Technologies, MIPhI, 4 (2000, in Russian)"},{"key":"23_CR13","doi-asserted-by":"crossref","unstructured":"Biham, E., and Shamir, A.: Differential Cryptanalysis of the Data Encryption Standard, Springer Verlag (1993)","DOI":"10.1007\/978-1-4613-9314-6"},{"key":"23_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1007\/3-540-48285-7_6","volume-title":"Advances in Cryptology-EUROCRYT\u201993 Proceedings","author":"K. Nyberg","year":"1994","unstructured":"Nyberg, K.: Differentially Uniform Mappings for Cryptography. Advances in Cryptology-EUROCRYT\u201993 Proceedings. Springer Verlag LNCS. Vol. 765 (1994) 55\u201364"},{"key":"23_CR15","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume-title":"Advances in Cryptology \u2014 EUROCRYT\u201993 Proceedings","author":"M. Matsui","year":"1994","unstructured":"Matsui, M.: Linear Cryptoanalysis Method for DES Cipher. Advances in Cryptology \u2014 EUROCRYT\u201993 Proceedings. Springer Verlag LNCS. Vol. 765 (1994) 386\u2013397"},{"key":"23_CR16","series-title":"Lect Notes Comput Sci","first-page":"139","volume-title":"Advances in Cryptology \u2014 EUROCRYT\u201994 Proceedings","author":"K. Nyberg","year":"1994","unstructured":"Nyberg, K.: Linear Approximations of Block Ciphers. Advances in Cryptology \u2014 EUROCRYT\u201994 Proceedings. Springer Verlag LNCS. Vol. 950 (1994) 139\u2013144"},{"key":"23_CR17","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1007\/3-540-46877-3_13","volume-title":"Advances in Cryptology-EUROCRYT\u201990 Proceedings","author":"K. Nyberg","year":"1991","unstructured":"Nyberg, K.: Constructions of Bent Functions and Difference Sets. Advances in Cryptology-EUROCRYT\u201990 Proceedings. Springer Verlag LNCS. Vol. 473 (1991) 151\u2013160"},{"key":"23_CR18","series-title":"Lect Notes Comput Sci","first-page":"434","volume-title":"Advances in Cryptology-EUROCRYT\u201997 Proceedings","author":"K. Kurosawa","year":"1998","unstructured":"Kurosawa, K., Satoh T.: Desigh of SAC\/PC(l) of Order k Boolean Functions and Three Other Cryptographic Criteria. Advances in Cryptology-EUROCRYT\u201997 Proceedings. Springer Verlag LNCS (1998) 434\u2013449"},{"key":"23_CR19","series-title":"Lect Notes Comput Sci","first-page":"566","volume-title":"Advances in Cryptology \u2014 CRYPTO\u201992 Proceedings","author":"K. Nyberg","year":"1994","unstructured":"Nyberg, K., Knudsen, L.: Provable Security Against a Differential Attack. Advances in Cryptology \u2014 CRYPTO\u201992 Proceedings. Springer Verlag LNCS. Vol. 740 (1994) 566\u2013574"},{"key":"23_CR20","series-title":"Lect Notes Comput Sci","first-page":"17","volume-title":"Advances in Cryptology-EUROCRYT\u201991 Proceedings","author":"X. Lai","year":"1992","unstructured":"Lai, X., Massey, J.L.: Markov Ciphers and Differential Cryptanalysis. Advances in Cryptology-EUROCRYT\u201991 Proceedings. Springer Verlag LNCS. Vol. 547 (1992) 17\u201338"}],"container-title":["Lecture Notes in Computer Science","Information Assurance in Computer Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45116-1_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,20]],"date-time":"2019-02-20T19:56:45Z","timestamp":1550692605000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45116-1_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540421030","9783540451167"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/3-540-45116-1_23","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]}}}