{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T07:49:51Z","timestamp":1767858591404,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540440093","type":"print"},{"value":"9783540456612","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45661-9_21","type":"book-chapter","created":{"date-parts":[[2007,5,21]],"date-time":"2007-05-21T11:02:03Z","timestamp":1179745323000},"page":"263-276","source":"Crossref","is-referenced-by-count":57,"title":["Compression and Information Leakage of Plaintext"],"prefix":"10.1007","author":[{"given":"John","family":"Kelsey","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,7,12]]},"reference":[{"key":"21_CR1","doi-asserted-by":"crossref","unstructured":"Benedetto, Caglioti, and Loreto, Physical Review Letters, 28 January 2002.","DOI":"10.1103\/PhysRevLett.90.089804"},{"key":"21_CR2","unstructured":"Usenet group comp.compression FAQ file, available at http:\/\/www.faqs.org\/faqs\/compression-faq\/ , 2001."},{"key":"21_CR3","doi-asserted-by":"crossref","unstructured":"Kocher, Jaffe, Jun, \u201cDifferential power analysis: Leaking secrets,\u201d in Advances in Cryptology-CRYPTO\u201999, Springer-Verlag, 1999","DOI":"10.1007\/3-540-48405-1_25"},{"key":"21_CR4","doi-asserted-by":"crossref","unstructured":"Kocher, \u201cTiming Attack on Implementations of Diffie-Hellman, RSA, DSS and other systems,\u201d in Advances in Cryptology-CRYPTO\u2019 96, Springer-Verlag, 1996.","DOI":"10.1007\/3-540-68697-5_9"},{"key":"21_CR5","unstructured":"Kelsey, Schneier, Wagner, Hall, \u201cSide Channel Cryptanalysis of Product Ciphers,\u201d in Advances in Cryptology-ESORICS 96, Springer-Verlag, 1996."},{"key":"21_CR6","unstructured":"David Salomon, Data Compression: The Complete Reference, Springer-Verlag, 1997."},{"key":"21_CR7","unstructured":"Doug Whiting, personal communication, 2002."}],"container-title":["Lecture Notes in Computer Science","Fast Software Encryption"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45661-9_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T06:23:32Z","timestamp":1556432612000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45661-9_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540440093","9783540456612"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/3-540-45661-9_21","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2002]]}}}