{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T16:34:22Z","timestamp":1776184462301,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540430261","type":"print"},{"value":"9783540453253","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45325-3_20","type":"book-chapter","created":{"date-parts":[[2007,10,27]],"date-time":"2007-10-27T03:51:25Z","timestamp":1193457085000},"page":"222-238","source":"Crossref","is-referenced-by-count":128,"title":["The Wide Trail Design Strategy"],"prefix":"10.1007","author":[{"given":"Joan","family":"Daemen","sequence":"first","affiliation":[]},{"given":"Vincent","family":"Rijmen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,12,4]]},"reference":[{"key":"20_CR1","unstructured":"R. Anderson, E. Biham, and L. R. Knudsen. Serpent. In Proceedings of the first AES candidate conference, Ventura, August 1998."},{"issue":"1","key":"20_CR2","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E. Biham","year":"1991","unstructured":"E. Biham and A. Shamir. Differential cryptanalysis of DES-like cryptosystems. Journal of Cryptology, 4(1):3\u201372, 1991.","journal-title":"Journal of Cryptology"},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"J. Daemen, R. Govaerts, and J. Vandewalle. Anew approach to block cipher design. In Vaudenay [10], pages 18\u201332.","DOI":"10.1007\/3-540-58108-1_2"},{"issue":"1","key":"20_CR4","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1023\/A:1008303310011","volume":"22","author":"J. Daemen","year":"2001","unstructured":"J. Daemen, L. R. Knudsen, and V. Rijmen. Linear frameworks for block ciphers. Designs, Codes and Cryptography, 22(1):65\u201387, January 2001.","journal-title":"Designs, Codes and Cryptography"},{"key":"20_CR5","unstructured":"J. Daemen, M. Peeters, G. V. Assche, and V. Rijmen. Noekeon. In First open NESSIE Workshop, Leuven, November2000."},{"key":"20_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1007\/3-540-60590-8_16","volume-title":"Fast Software Encryption\u2019 94","author":"L. R. Knudsen","year":"1995","unstructured":"L. R. Knudsen. Truncated and higher order differentials. In B. Preneel, editor, Fast Software Encryption\u2019 94, volume 1008 of Lecture Notes in Computer Science, pages 196\u2013211. Springer-Verlag, 1995."},{"key":"20_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume-title":"Advances in Cryptology, Proceedings of Eurocrypt\u2019 93","author":"M. Matsui","year":"1994","unstructured":"M. Matsui. Linear cryptanalysis method for DES cipher. In T. Helleseth, editor, Advances in Cryptology, Proceedings of Eurocrypt\u2019 93, volume 765 of Lecture Notes in Computer Science, pages 386\u2013397. Springer-Verlag, 1994."},{"key":"20_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1007\/BFb0053460","volume-title":"Advances in Cryptology, Proceedings of Eurocrypt\u2019 94","author":"K. Nyberg","year":"1995","unstructured":"K. Nyberg. Linear approximation of block ciphers. In A. D. Santis, editor, Advances in Cryptology, Proceedings of Eurocrypt\u2019 94, volume 950 of Lecture Notes in Computer Science, pages 439\u2013444. Springer-Verlag, 1995."},{"key":"20_CR9","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C. E. Shannon","year":"1949","unstructured":"C. E. Shannon. Communication theory of secrecy systems. Bell Syst. Tech. Journal, 28:656\u2013715, 1949.","journal-title":"Bell Syst. Tech. Journal"},{"key":"20_CR10","series-title":"Lect Notes Comput Sci","volume-title":"Fast Software Encryption\u2019 98","year":"1998","unstructured":"S. Vaudenay, editor. Fast Software Encryption\u2019 98, volume 1372 of Lecture Notes in Computer Science. Springer-Verlag, 1998."}],"container-title":["Lecture Notes in Computer Science","Cryptography and Coding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45325-3_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,3]],"date-time":"2019-05-03T22:08:25Z","timestamp":1556921305000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45325-3_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540430261","9783540453253"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/3-540-45325-3_20","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2001]]}}}