{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T19:21:15Z","timestamp":1767986475437,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540440093","type":"print"},{"value":"9783540456612","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45661-9_2","type":"book-chapter","created":{"date-parts":[[2007,5,21]],"date-time":"2007-05-21T11:02:03Z","timestamp":1179745323000},"page":"17-33","source":"Crossref","is-referenced-by-count":37,"title":["Multiplicative Differentials"],"prefix":"10.1007","author":[{"given":"Nikita","family":"Borisov","sequence":"first","affiliation":[]},{"given":"Monica","family":"Chew","sequence":"additional","affiliation":[]},{"given":"Rob","family":"Johnson","sequence":"additional","affiliation":[]},{"given":"David","family":"Wagner","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,7,12]]},"reference":[{"issue":"1","key":"2_CR1","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E. Biham","year":"1991","unstructured":"Eli Biham and Adi Shamir. Differential cryptanalysis of DES-like cryptosystems. Journal of Cryptology, 4(1):3\u201372, 1991.","journal-title":"Journal of Cryptology"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Joan Daemen, Rene Govaerts, and Joos Vandewalle. Weak keys for IDEA. In CRYPTO, pages 224\u2013231, 1993.","DOI":"10.1007\/3-540-48329-2_20"},{"key":"2_CR3","first-page":"111","volume-title":"Thirteenth Symp. on Information Theory in the Benelux","author":"J. Daemen","year":"1992","unstructured":"Joan Daemen, Luc van Linden, Rene Govaerts, and Joos Vandewalle. Propagation properties of multiplication modulo 2n-1. In G. H. L. M. Heideman et.al., editor, Thirteenth Symp. on Information Theory in the Benelux, pages 111\u2013118, Enschede (NL), 1\u20132 1992. Werkgemeen-schap Informatieen Communicatietheorie, Enschede (NL)."},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Vladimir Furman. Differential cryptanalysis of Nimbus. In Fast Software Encryption. Springer-Verlag, 2001.","DOI":"10.1007\/3-540-45473-X_16"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Carlo Harpes, Gerhard G. Kramer, and James L. Massey. A Generalization of Linear Cryptanalysis and the Applicability of Matsui\u2019s Piling-up Lemma. In EUROCRYPT\u2019 95. Springer-Verlag, May 1995.","DOI":"10.1007\/3-540-49264-X_3"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"John Kelsey, Bruce Schneier, and David Wagner. Mod n cryptanalysis, with applications against RC5P and M6. In Fast Software Encryption, pages 139\u2013155, 1999.","DOI":"10.1007\/3-540-48519-8_11"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Xuejia Lai, James L. Massey, and Sean Murphy. Markov ciphers and differential cryptanalysis. In EUROCRYPT\u2019 91. Springer-Verlag, 1991.","DOI":"10.1007\/3-540-46416-6_2"},{"key":"2_CR8","unstructured":"Alexis Warner Machado. The Nimbus cipher: A proposal for NESSIE. NESSIE Proposal, September 2000."},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Mitsuru Matsui. Linear cryptanalysis method for DES cipher. In T. Helleseth, editor, EUROCRYPT\u2019 93, volume 765, pages 386\u2013397, Berlin, 1994. Springer-Verlag.","DOI":"10.1007\/3-540-48285-7_33"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Willi Meier. On the security of the IDEA block cipher. In EUROCRYPT\u2019 93, pages 371\u2013385. Springer-Verlag, 1994.","DOI":"10.1007\/3-540-48285-7_32"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"David M\u2019Raihi, David Naccache, Jacques Stern, and Serge Vaudenay. XMX: a firmware-oriented block cipher based on modular multiplications. In Fast Software Encryption. Springer-Verlag, 1997.","DOI":"10.1007\/BFb0052344"},{"key":"2_CR12","unstructured":"Beale Screamer. Microsoft\u2019s digital rights management scheme\u2014technical details. http:\/\/cryptome.org\/ms-drm.htm , October 2001."}],"container-title":["Lecture Notes in Computer Science","Fast Software Encryption"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45661-9_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T06:23:42Z","timestamp":1556432622000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45661-9_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540440093","9783540456612"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/3-540-45661-9_2","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2002]]}}}