{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T23:22:31Z","timestamp":1769642551644,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540440093","type":"print"},{"value":"9783540456612","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45661-9_1","type":"book-chapter","created":{"date-parts":[[2007,5,21]],"date-time":"2007-05-21T07:02:03Z","timestamp":1179730923000},"page":"1-16","source":"Crossref","is-referenced-by-count":67,"title":["New Results on Boomerang and Rectangle Attacks"],"prefix":"10.1007","author":[{"given":"Eli","family":"Biham","sequence":"first","affiliation":[]},{"given":"Orr","family":"Dunkelman","sequence":"additional","affiliation":[]},{"given":"Nathan","family":"Keller","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,7,12]]},"reference":[{"key":"1_CR1","unstructured":"Ross Anderson, Eli Biham, Lars R. Knudsen, Serpent: A Proposal for the Advanced Encryption Standard, NIST AES Proposal, 1998."},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Eli Biham, Higher Order Differential Cryptanalysis, unpublished paper, 1994.","DOI":"10.1007\/978-1-4613-9314-6_4"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Eli Biham, Adi Shamir, Differential Cryptanalysis of the Data Encryption Standard, Springer-Verlag, 1993.","DOI":"10.1007\/978-1-4613-9314-6"},{"key":"1_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1007\/3-540-48910-X_2","volume-title":"Advances in Cryptology, proceedings of EUROCRYPT\u2019 99","author":"E. Biham","year":"1999","unstructured":"Eli Biham, Alex Biryukov, Adi Shamir, Cryptanalysis of Skipjack reduced to 31 rounds, Advances in Cryptology, proceedings of EUROCRYPT\u2019 99, LNCS 1592, pp. 12\u201323, Springer-Verlag, 1999."},{"key":"1_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1007\/3-540-48519-8_10","volume-title":"proceedings of Fast Software Encryption","author":"E. Biham","year":"1999","unstructured":"Eli Biham, Alex Biryukov, Adi Shamir, Miss in the Middle Attacks on IDEA and Khufu, proceedings of Fast Software Encryption 6, LNCS 1636, pp. 124\u2013138, Springer-Verlag, 1999."},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Eli Biham, Orr Dunkelman, Nathan Keller, Linear Cryptanalysis of Reduced Round Serpent, proceedings of Fast Software Encryption 8, 2001, to appear.","DOI":"10.1007\/3-540-45473-X_2"},{"key":"1_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1007\/3-540-44987-6_21","volume-title":"Advances in Cryptology, proceedings of EUROCRYPT\u2019 01","author":"E. Biham","year":"2001","unstructured":"Eli Biham, Orr Dunkelman, Nathan Keller, The Rectangle Attack-Rectangling the Serpent, Advances in Cryptology, proceedings of EUROCRYPT\u2019 01, LNCS 2045, pp. 340\u2013357, Springer-Verlag, 2001."},{"key":"1_CR8","unstructured":"Orr Dunkelman, Nathan Keller, Boomerang and Rectangle Attacks on SC2000, preproceedings of the NESSIE second workshop, 2001."},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Louis Granboulan, Flaws in Differential Cryptanalysis of Skipjack, proceedings of Fast Software Encryption 8, 2001, to appear.","DOI":"10.1007\/3-540-45473-X_27"},{"key":"1_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/3-540-44706-7_6","volume-title":"proceedings of Fast Software Encryption","author":"J. Kelsey","year":"1999","unstructured":"John Kelsey, Tadayoshi Kohno, Bruce Schneier, Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent, proceedings of Fast Software Encryption 7, LNCS 1978, pp. 75\u201393, Springer-Verlag, 1999."},{"key":"1_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1007\/3-540-60590-8_16","volume-title":"proceedings of Fast Software Encryption","author":"L. Knudsen","year":"1995","unstructured":"Lars Knudsen, Truncated and Higher Order Differentials, proceedings of Fast Software Encryption 2, LNCS 1008, pp. 196\u2013211, Springer-Verlag, 1995."},{"key":"1_CR12","unstructured":"Lars Knudsen, H\u00e5vard Raddum, A Differential Attack on Reduced-Round SC2000, preproceedings of the NESSIE second workshop, 2001."},{"key":"1_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1007\/3-540-48405-1_11","volume-title":"Advances in Cryptology, proceedings of CRYPTO\u2019 99","author":"L. Knudsen","year":"1999","unstructured":"Lars Knudsen, Matt J.B. Robshaw, David Wagner, Truncated Differentials and Skipjack, Advances in Cryptology, proceedings of CRYPTO\u2019 99, LNCS 1666, pp. 165\u2013180, Springer-Verlag, 1999."},{"key":"1_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1007\/3-540-48658-5_3","volume-title":"Advances in Cryptology, proceedings of CRYPTO\u2019 94","author":"S. K. Langford","year":"1994","unstructured":"Suzan K. Langford, Martin E. Hellman, Differential-Linear Cryptanalysis, Advances in Cryptology, proceedings of CRYPTO\u2019 94, LNCS 839, pp. 17\u201325, Springer-Verlag, 1994."},{"key":"1_CR15","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume-title":"Advances in Cryptology, proceedings of EUROCRYPT\u2019 93","author":"M. Matsui","year":"1994","unstructured":"Mitsuru Matsui, Linear Cryptanalysis Method for DES Cipher, Advances in Cryptology, proceedings of EUROCRYPT\u2019 93, LNCS 765, pp. 386\u2013397, Springer-Verlag, 1994."},{"key":"1_CR16","unstructured":"NESSIE-New European Schemes for Signatures, Integrity and Encryption. http:\/\/www.nessie.eu.org\/nessie\/ ."},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Takeshi Shimoyama, Hitoshi Yanami, Kazuhiro Yokoyama, Masahiko Takenaka, Kouichi Itoh, Jun Yajima, Naoya Torii, Hidema Tanaka, The Block Cipher SC2000, proceedings of Fast Software Encryption 8, 2001, to appear.","DOI":"10.1007\/3-540-45473-X_26"},{"key":"1_CR18","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1007\/3-540-48519-8_12","volume-title":"proceedings of Fast Software Encryption","author":"D. Wagner","year":"1999","unstructured":"David Wagner, The Boomerang Attack, proceedings of Fast Software Encryption 6, LNCS 1636, pp. 156\u2013170, Springer-Verlag, 1999."},{"key":"1_CR19","unstructured":"Hitoshi Yanami, Takeshi Shimoyama, Orr Dunkelman, Differential and Linear Cryptanalysis of a Reduced-Round SC2000, these proceedings."}],"container-title":["Lecture Notes in Computer Science","Fast Software Encryption"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45661-9_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T02:23:34Z","timestamp":1556418214000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45661-9_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540440093","9783540456612"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/3-540-45661-9_1","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2002]]}}}