{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:09:34Z","timestamp":1725484174276},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540440093"},{"type":"electronic","value":"9783540456612"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45661-9_3","type":"book-chapter","created":{"date-parts":[[2007,5,21]],"date-time":"2007-05-21T07:02:03Z","timestamp":1179730923000},"page":"34-48","source":"Crossref","is-referenced-by-count":4,"title":["Differential and Linear Cryptanalysis of a Reduced-Round SC2000"],"prefix":"10.1007","author":[{"given":"Hitoshi","family":"Yanami","sequence":"first","affiliation":[]},{"given":"Takeshi","family":"Shimoyama","sequence":"additional","affiliation":[]},{"given":"Orr","family":"Dunkelman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,7,12]]},"reference":[{"key":"3_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1007\/3-540-38424-3_1","volume-title":"CRYPTO\u2019 90","author":"E. Biham","year":"1991","unstructured":"E. Biham and A. Shamir, Differential Cryptanalysis of DES-like Cryptosystems, CRYPTO\u2019 90, LNCS 537, pp. 2\u201321, 1991."},{"key":"3_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"487","DOI":"10.1007\/3-540-48071-4_34","volume-title":"CRYPTO\u2019 92","author":"E. Biham","year":"1993","unstructured":"E. Biham and A. Shamir, Differential Cryptanalysis of the Full 16-round DES, CRYPTO\u2019 92, LNCS 740, pp. 487\u2013496, 1993."},{"key":"3_CR3","unstructured":"CRYPTREC project-Evaluation of Cryptographic Techniques. ( http:\/\/www.ipa.go.jp\/security\/enc\/CRYPTREC\/index-e.html )"},{"key":"3_CR4","unstructured":"O. Dunkelman and N. Keller, Boomerang and Rectangle Attack on SC2000, Proceedings of Second Open NESSIE Workshop, September 12\u201313, 2001."},{"key":"3_CR5","unstructured":"L. R. Knudsen and H. Raddum, A first report on Whirlpool, NUSH, SC2000, Noekeon, Two-Track-Mac and RC6, 2001. ( http:\/\/www.cosic.esat.kuleuven.ac.be\/nessie\/reports\/ )"},{"key":"3_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1007\/3-540-47555-9_7","volume-title":"EUROCRYPT\u2019 92","author":"M. Matsui","year":"1993","unstructured":"M. Matsui and A. Yamagishi, A new method for known plaintext attack of FEAL cipher, EUROCRYPT\u2019 92, LNCS 658, pp. 81\u201391, 1993."},{"key":"3_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume-title":"EUROCRYPT\u2019 93","author":"M. Matsui","year":"1994","unstructured":"M. Matsui, Linear Cryptanalysis Method for DES Cipher, EUROCRYPT\u2019 93, LNCS 765, pp. 386\u2013397, 1994."},{"key":"3_CR8","series-title":"Lect Notes Comput Sci","first-page":"1","volume-title":"CRYPTO\u2019 94","author":"M. Matsui","year":"1994","unstructured":"M. Matsui, The First Experimental Cryptanalysis of the Data Encryption Standard, CRYPTO\u2019 94, LNCS 839, pp. 1\u201311, 1994."},{"key":"3_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1007\/BFb0053451","volume-title":"EUROCRYPT\u2019 94","author":"M. Matsui","year":"1995","unstructured":"M. Matsui, On Correlation Between the Order of S-boxes and the Strength of DES, EUROCRYPT\u2019 94, LNCS 950, pp. 366\u2013375, 1995."},{"issue":"3","key":"3_CR10","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/BF00190801","volume":"2","author":"S. Murphy","year":"1990","unstructured":"S. Murphy, The cryptanalysis of FEAL-4 with 20 chosen plaintexts, Journal of Cryptology 2(3), pp. 145\u2013154, 1990.","journal-title":"Journal of Cryptology"},{"key":"3_CR11","unstructured":"NESSIE-New European Schemes for Signatures, Integrity and Encryption. ( http:\/\/www.nessie.eu.org\/nessie )"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"H. Raddum, L. Knudsen, A Differential Attack on Reduced-Round SC2000 Proceedings of Second Open NESSIE Workshop, September 12\u201313, 2001.","DOI":"10.1007\/3-540-45537-X_15"},{"key":"3_CR13","unstructured":"T. Shimoyama, H. Yanami, K. Yokoyama, M. Takenaka, K. Itoh, J. Yajima, N. Torii, H. Tanaka, The SC2000 Block Cipher, Proceedings of First Open NESSIE Workshop, November 13\u201314, 2000."},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"T. Shimoyama, H. Yanami, K. Yokoyama, M. Takenaka, K. Itoh, J. Yajima, N. Torii, H. Tanaka, The Block Cipher SC2000, Preproceedings of 8th Fast Software Encryption Workshop, April 2\u20134, 2001.","DOI":"10.1007\/3-540-45473-X_26"},{"key":"3_CR15","unstructured":"H. Yanami, T. Shimoyama, Differential\/Linear Characteristics of the SC2000 Block Cipher, Proceedings of the 2001 Symposium on Cryptography and Information Security, SCIS2001-12A-2, pp. 653\u2013658, 2001, in Japanese."},{"key":"3_CR16","unstructured":"H. Yanami, T. Shimoyama, Differential\/Linear Characteristics of the SC2000 Block Cipher (II), IEICE Technical Report, ISEC2001-10, pp. 63\u201370, 2001, in Japanese."},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"H. Yanami, T. Shimoyama, Differential and Linear Cryptanalysis of Reduced-Round SC2000, Proceedings of Second Open NESSIE Workshop, September 12\u201313, 2001.","DOI":"10.1007\/3-540-45661-9_3"}],"container-title":["Lecture Notes in Computer Science","Fast Software Encryption"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45661-9_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T02:23:44Z","timestamp":1556418224000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45661-9_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540440093","9783540456612"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/3-540-45661-9_3","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}