{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T08:45:09Z","timestamp":1769849109520,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540438694","type":"print"},{"value":"9783540454731","type":"electronic"}],"license":[{"start":{"date-parts":[[2002,1,1]],"date-time":"2002-01-01T00:00:00Z","timestamp":1009843200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45473-x_26","type":"book-chapter","created":{"date-parts":[[2007,5,13]],"date-time":"2007-05-13T09:28:04Z","timestamp":1179048484000},"page":"312-327","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["The Block Cipher SC2000"],"prefix":"10.1007","author":[{"given":"Takeshi","family":"Shimoyama","sequence":"first","affiliation":[]},{"given":"Hitoshi","family":"Yanami","sequence":"additional","affiliation":[]},{"given":"Kazuhiro","family":"Yokoyama","sequence":"additional","affiliation":[]},{"given":"Masahiko","family":"Takenaka","sequence":"additional","affiliation":[]},{"given":"Kouichi","family":"Itoh","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Yajima","sequence":"additional","affiliation":[]},{"given":"Naoya","family":"Torii","sequence":"additional","affiliation":[]},{"given":"Hidema","family":"Tanaka","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,6,21]]},"reference":[{"key":"26_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1007\/BFb0052352","volume-title":"Fast Software Encryption, 4th International Workshop Proceedings","author":"E. Biham","year":"1997","unstructured":"E. Biham, \u201cA Fast New DES Implementation in Software,\u201d Fast Software Encryption, 4th International Workshop Proceedings, Springer-Verlag LNCS 1267, 1997, pp. 260\u2013272."},{"key":"26_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1007\/3-540-69710-1_15","volume-title":"Fast Software Encryption, 5th International Workshop Proceedings","author":"E. Biham","year":"1998","unstructured":"E. Biham, R. Anderson, and L. Knudsen, \u201cSerpent: A New Block Cipher Proposal,\u201d Fast Software Encryption, 5th International Workshop Proceedings, Springer-Verlag LNCS 1372, 1998, pp. 222\u2013238."},{"key":"26_CR3","unstructured":"B. Gladman, \u201cSerpent S Boxes as Boolean Functions,\u201d \n                    http:\/\/www.btinternet.com\/~brian.gladman\/cryptography_technology\/serpent\/index.html\n                    \n                  , 2000."},{"key":"26_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1007\/BFb0052343","volume-title":"FSE4","author":"J. Daemen","year":"1997","unstructured":"J. Daemen, L. Knudsen. V. Rijmen, \u201cThe Block Cipher Square,\u201d FSE4, LNCS pp. 149\u2013165, 1997."},{"key":"26_CR5","unstructured":"J. Daemen, V. Rijmen, \u201cAES Proposal: Rijndael,\u201d NIST AES Proposal, Jun 1998."},{"key":"26_CR6","unstructured":"Fujitsu, \u201cCE71 Series,\u201d DATA SHEET DS06-20108-1, \n                    http:\/\/edevice.fujitsu.com\/fj\/CATALOG\/AD00\/00-00001\/10e-5b-2.html"},{"key":"26_CR7","series-title":"Lect Notes Comput Sci","first-page":"264","volume-title":"Cryptography, SAC\u201998","author":"M. Kanda","year":"1998","unstructured":"M. Kanda, Y. Takashima, T. Matsumoto, K. Aoki, K. Ohta \u201cA strategy for constructing fast found functions with practical security agaist differential and linear cryptanalysis,\u201d Selected Areas in Cryptography, SAC\u201998, LNCS 1556, pp. 264\u2013279, 1998."},{"key":"26_CR8","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/BF00204800","volume":"8","author":"K. Nyberg","year":"1995","unstructured":"K. Nyberg and L.R. Knudsen, \u201cProvable Security Against Differential Cryptanalysis,\u201d Journal of Cryptology, v. 8, n. 1, 1995, pp. 27\u201337.","journal-title":"Journal of Cryptology"},{"key":"26_CR9","unstructured":"D.A. Osvik \u201cSpeeding up Serpent,\u201d Proceedings of The Third AEC Conference, pp 317\u2013329."},{"key":"26_CR10","volume-title":"The Twofish Encryption Algorithm","author":"B. Schneier","year":"1999","unstructured":"B. Schneier, J. Kelsey, D. Whiting, D. Wagner, C. Hall, N. Ferguson, \u201cThe Twofish Encryption Algorithm,\u201d John Wiley and Sons, Inc. New York, 1999."}],"container-title":["Lecture Notes in Computer Science","Fast Software Encryption"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45473-X_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T09:13:49Z","timestamp":1558257229000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45473-X_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540438694","9783540454731"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/3-540-45473-x_26","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2002]]},"assertion":[{"value":"21 June 2002","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}