{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T03:21:10Z","timestamp":1761708070227},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540440093"},{"type":"electronic","value":"9783540456612"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45661-9_10","type":"book-chapter","created":{"date-parts":[[2007,5,21]],"date-time":"2007-05-21T11:02:03Z","timestamp":1179745323000},"page":"128-142","source":"Crossref","is-referenced-by-count":10,"title":["Improved Upper Bounds of Differential and Linear Characteristic Probability for Camellia"],"prefix":"10.1007","author":[{"given":"Taizo","family":"Shirai","sequence":"first","affiliation":[]},{"given":"Shoji","family":"Kanamaru","sequence":"additional","affiliation":[]},{"given":"George","family":"Abe","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,7,12]]},"reference":[{"key":"10_CR1","unstructured":"K. Aoki, T. Ichikawa, M. Kanda, M. Matsui, S. Moriai, J. Nakajima and T. Tokita, \u201cSpecification of Camellia-a 128-bit Block Cipher,\u201d submitted to the First Open NESSIE Workshop, 13\u201314 November 2000, Leuven, Belgium-available at http:\/\/cryptonessie.org ."},{"key":"10_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/3-540-44983-3_4","volume-title":"Selected Area in Cryptography, SAC 2000","author":"K. Aoki","year":"2000","unstructured":"K. Aoki, T. Ichikawa, M. Kanda, M. Matsui, S. Moriai, J. Nakajima and T. Tokita, \u201cCamellia: A 128-Bit Block Cipher Suitable for Multiple Platforms-Design and Analysis,\u201d Selected Area in Cryptography, SAC 2000, LNCS 2012, pp. 39\u201356, 2000."},{"key":"10_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1007\/3-540-38424-3_1","volume-title":"CRYPTO\u2019 90","author":"E. Biham","year":"1991","unstructured":"E. Biham and A. Shamir, \u201cDifferential Cryptanalysis of DES-like Cryptosystems,\u201d CRYPTO\u2019 90, LNCS 537, pp. 2\u201321, 1991."},{"key":"10_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1007\/3-540-45600-7_27","volume-title":"Information and Communications Security, ICICS 2001","author":"Y. He","year":"2001","unstructured":"Y. He and S. Qing, \u201cSquare Attack on Reduced Camellia Cipher,\u201d Information and Communications Security, ICICS 2001, LNCS 2229, pp. 238\u2013245, 2001."},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"M. Kanda and T. Matsumoto, \u201cSecurity of Camellia against Truncated Differential Cryptanalysis,\u201d Fast Software Encryption, FSE2001, to appear","DOI":"10.1007\/3-540-45473-X_24"},{"issue":"1","key":"10_CR6","first-page":"48","volume":"E83-A","author":"M. Kanda","year":"2000","unstructured":"M. Kanda, S. Moriai, K. Aoki, H. Ueda, Y. Takashima, K. Ohta and T. Matsumoto, \u201cE2-A New 128-Bit Block Cipher,\u201d IEICE Transactions Fundamentals of Electronics, Communications and Computer Sciences, Vol. E83-A, No. 1, pp. 48\u201359, 2000.","journal-title":"IEICE Transactions Fundamentals of Electronics, Communications and Computer Sciences"},{"key":"10_CR7","unstructured":"T. Kawabata and T. Kaneko, \u201cA study on higher order differential attack of Camellia,\u201d In Proceedings of the 2nd NESSIE workshop, 2001."},{"key":"10_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1007\/3-540-60590-8_16","volume-title":"Fast Software Encryption-Second International Workshop","author":"L.R. Knudsen","year":"1995","unstructured":"L.R. Knudsen, \u201cTruncated and Higher Order Differentials,\u201d Fast Software Encryption-Second International Workshop, LNCS 1008, pp. 196\u2013211, 1995."},{"key":"10_CR9","unstructured":"M. Matsui, \u201cDifferential Path Search of the Block Cipher E2,\u201d Technical Report ISEC99-19, IEICE, 1999.(written in Japanese)"},{"key":"10_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48519-8_6","volume-title":"Fast Software Encryption, FSE\u201999","author":"M. Matsui","year":"1999","unstructured":"M. Matsui and T. Tokita, \u201cCryptanalysis of Reduced Version of the Block Cipher E2,\u201d Fast Software Encryption, FSE\u201999, LNCS 1636, 1999."},{"key":"10_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume-title":"EUROCRYPT\u2019 93","author":"M. Matsui","year":"1994","unstructured":"M. Matsui, \u201cLinear Cryptanalysis of the Data Encryption Standard,\u201d EUROCRYPT\u2019 93, LNCS 765, pp. 386\u2013397, 1994."},{"key":"10_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1007\/3-540-46513-8_8","volume-title":"Selected Areas in Cryptography, SAC\u201999","author":"S. Moriai","year":"2000","unstructured":"S. Moriai, M. Sugita, K. Aoki and M. Kanda, \u201cSecurity of E2 against Truncated Differential Cryptanalysis,\u201d Selected Areas in Cryptography, SAC\u201999, LNCS 1758, pp. 106\u2013117, 2000."},{"key":"10_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1007\/3-540-45682-1_12","volume-title":"ASISCRYPT 2001","author":"M. Sugita","year":"2001","unstructured":"M. Sugita, K. Kobara and H. Imai, \u201cSecurity of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis,\u201d ASISCRYPT 2001, LNCS 2248, pp. 193\u2013207."},{"key":"10_CR14","unstructured":"New European Schemes for Signatures, Integrity, and Encryption, http:\/\/www.cryptonessie.org"},{"key":"10_CR15","unstructured":"CRYPTREC project, http:\/\/www.ipa.go.jp\/security\/enc\/CRYPTREC\/ ."}],"container-title":["Lecture Notes in Computer Science","Fast Software Encryption"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45661-9_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T06:23:29Z","timestamp":1556432609000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45661-9_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540440093","9783540456612"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/3-540-45661-9_10","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}