{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,22]],"date-time":"2025-05-22T09:48:33Z","timestamp":1747907313746},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540438618"},{"type":"electronic","value":"9783540454502"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45450-0_19","type":"book-chapter","created":{"date-parts":[[2007,5,19]],"date-time":"2007-05-19T16:53:10Z","timestamp":1179593590000},"page":"226-240","source":"Crossref","is-referenced-by-count":24,"title":["Strengthening the Key Schedule of the AES"],"prefix":"10.1007","author":[{"given":"Lauren","family":"May","sequence":"first","affiliation":[]},{"given":"Matt","family":"Henricksen","sequence":"additional","affiliation":[]},{"given":"William","family":"Millan","sequence":"additional","affiliation":[]},{"given":"Gary","family":"Carter","sequence":"additional","affiliation":[]},{"given":"Ed","family":"Dawson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,6,21]]},"reference":[{"key":"19_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/BFb0052343","volume-title":"Fast Software Encryption, Fourth International Workshop","author":"J. Daemen","year":"1997","unstructured":"J. Daemen, L. Knudsen and V. Rijmen. The Block Cipher SQUARE, Fast Software Encryption, Fourth International Workshop, LNCS 1267, Springer-Verlag, 1997, pp 149\u2013165."},{"key":"19_CR2","series-title":"Lect Notes Comput Sci","first-page":"398","volume-title":"Advances in Cryptology-EUROCRYPT\u201993","author":"E. Biham","year":"1993","unstructured":"E. Biham. New Types of Cryptanalytic Attacks using Related Keys, Advances in Cryptology-EUROCRYPT\u201993, LNCS 765, Springer-Verlag, 1993, pp 398\u2013409."},{"key":"19_CR3","series-title":"Lect Notes Comput Sci","first-page":"224","volume-title":"Advances in Cryptology-CRYPTO\u201993","author":"J. Daemen","year":"1993","unstructured":"J. Daemen, R. Govaerts and J. Vandewalle. Weak Keys for IDEA, Advances in Cryptology-CRYPTO\u201993, LNCS 773, Springer-Verlag, 1993, pp 224\u2013231."},{"key":"19_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1007\/BFb0053456","volume-title":"Advances in Cryptology-EUROCRYPT\u201994","author":"L. Knudsen","year":"1994","unstructured":"L. Knudsen. New Potentially Weak Keys for DES and LOKI, Advances in Cryptology-EUROCRYPT\u201994, LNCS 950, Springer-Verlag, 1994, pp 419\u2013424."},{"key":"19_CR5","series-title":"Lect Notes Comput Sci","first-page":"196","volume-title":"AUSCRYPT\u201992","author":"L. Knudsen","year":"1992","unstructured":"L. Knudsen. Cryptanalysis of LOKI91, AUSCRYPT\u201992, LNCS 718, Springer-Verlag, 1992, pp 196\u2013208."},{"key":"19_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"274","DOI":"10.1007\/3-540-44750-4_22","volume-title":"Advances in Cryptology-CRYPTO\u201995","author":"L. Knudsen","year":"1995","unstructured":"L. Knudsen. A Key-Schedule Weakness in SAFER K-64, Advances in Cryptology-CRYPTO\u201995, LNCS 963, Springer-Verlag, 1995, pp 274\u2013286."},{"key":"19_CR7","unstructured":"J. Daemen and V. Rijmen. Rijndael, First Advanced Encryption Standard Conference, August, 1998. Available at http:\/\/csrc.nist.gov\/encryption\/aes\/ ."},{"key":"19_CR8","doi-asserted-by":"crossref","unstructured":"C.E. Shannon. Communication Theory of Secrecy Systems, Bell System Technical Journal, ol. 28, October 1949, pp 656\u2013715.","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"19_CR9","series-title":"Lect Notes Comput Sci","first-page":"211","volume-title":"Fast Software Encryption, First International Workshop Proceedings","author":"L. Knudsen","year":"1993","unstructured":"L. Knudsen. Practically Secure Feistel Ciphers, Fast Software Encryption, First International Workshop Proceedings, LNCS 809, Springer-Verlag, 1993, pp 211\u2013221."},{"key":"19_CR10","unstructured":"M. Leech. A Feistel Cipher with Hardened Key Scheduling, Workshop on Selected Areas in Cryptography (SAC\u201996), pp 15\u201329."},{"key":"19_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1007\/3-540-60865-6_47","volume-title":"Fast Software Encryption, Third International Workshop","author":"V. Rijmen","year":"1996","unstructured":"V. Rijmen, J. Daemen, B. Preneel, A. Bosselaers and E. DeWin. The Cipher SHARK, Fast Software Encryption, Third International Workshop, LNCS 1039, Springer-Verlag, 1996, pp 99\u2013111."},{"key":"19_CR12","series-title":"Lect Notes Comput Sci","first-page":"191","volume-title":"Fast Software Encryption, First International Workshop","author":"B. Schneier","year":"1993","unstructured":"B. Schneier. Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish), Fast Software Encryption, First International Workshop, LNCS 809, Springer-Verlag, 1993, pp 191\u2013204."},{"key":"19_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/3-540-44983-3_4","volume-title":"Workshop on Selected Areas in Cryptography (SAC 2000)","author":"K. Aoki","year":"2001","unstructured":"K. Aoki, T. Ichikawa, M. Kanda, M. Matsui, S. Moriai, J. Nakajima and T. Tokita. Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms-Design and Analysis, Workshop on Selected Areas in Cryptography (SAC 2000), LNCS 2012, pp 39\u201356."},{"key":"19_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44706-7_15","volume-title":"Fast Software Encryption, Seventh International Workshop","author":"N. Ferguson","year":"2000","unstructured":"N. Ferguson, J. Kelsey, S. Lucks, B. Schneier, M. Stay, D. Wagner and D. Whiting. Improved Cryptanalysis of Rijndael, Fast Software Encryption, Seventh International Workshop, LNCS 1978, Springer-Verlag, 2000, pp 213\u2013230."},{"key":"19_CR15","doi-asserted-by":"crossref","unstructured":"H. Gustafson, E. Dawson, L. Nielsen and W. Caelli. A Computer Package for Measuring the Strength of Ciphers, Journal of Computers and Security, Vol. 13, No. 8, pp 687\u2013697.","DOI":"10.1016\/0167-4048(94)90051-5"},{"key":"19_CR16","doi-asserted-by":"crossref","unstructured":"L. Bassham. Efficiency Testing of ANSI C Implementations of Round 2 Candidate Algorithms for the Advanced Encryption Standard, Third Advanced Encryption Standard Conference, April 2000. Available at http:\/\/csrc.nist.gov\/encryption\/aes\/","DOI":"10.6028\/NIST.IR.6391"},{"key":"19_CR17","unstructured":"B. Gladman. AES Second Round Implementation Experience, Second Advanced Encryption Standard Conference, Available at http:\/\/www.nist.gov\/aes ."},{"key":"19_CR18","unstructured":"National Institute of Standards and Technology (NIST) (Computer Security Division), Report on the Development of the Advanced Encryption Standard (AES), Available at http:\/\/www.nist.gov\/aes"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45450-0_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T01:39:10Z","timestamp":1556415550000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45450-0_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540438618","9783540454502"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/3-540-45450-0_19","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}