{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T12:56:17Z","timestamp":1772024177197,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540440093","type":"print"},{"value":"9783540456612","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45661-9_4","type":"book-chapter","created":{"date-parts":[[2007,5,21]],"date-time":"2007-05-21T11:02:03Z","timestamp":1179745323000},"page":"49-60","source":"Crossref","is-referenced-by-count":41,"title":["Impossible Differential Cryptanalysis of Reduced Round XTEA and TEA"],"prefix":"10.1007","author":[{"given":"Dukjae","family":"Moon","sequence":"first","affiliation":[]},{"given":"Kyungdeok","family":"Hwang","sequence":"additional","affiliation":[]},{"given":"Wonil","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Sangjin","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Jongin","family":"Lim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,7,12]]},"reference":[{"key":"4_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1007\/3-540-38424-3_1","volume-title":"Advances in Cryptology \u2014 CRYPTO\u201990","author":"E. Biham","year":"1991","unstructured":"E. Biham and A. Shamir, Differential Cryptanalysis of DES-like cryptosystems, Advances in Cryptology \u2014 CRYPTO\u201990, LNCS 537, Springer-Verlag, 1991, pp. 2\u201321."},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"E. Biham, New Types of Cryptanalytic Attacks Using Related Keys, Advances in Cryptology \u2014 EUROCRYT\u201993, Springer-Verlag, 1994, pp. 398\u2013409.","DOI":"10.1007\/3-540-48285-7_34"},{"key":"4_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1007\/3-540-48910-X_2","volume-title":"Advances in Cryptology-EUROCRYT\u201999","author":"E. Biham","year":"1999","unstructured":"E. Biham, A. Biryukov and A. Shamir, Cryptanalysis of skipjack reduced to 31 round using impossible differentiala, Advances in Cryptology-EUROCRYT\u201999, LNCS 1592, Springer-Verlag, 1999, pp. 12\u201323. Available at http:\/\/www.cs.technion.ac.il\/ biham\/Reports\/Skipjack\/ ."},{"key":"4_CR4","series-title":"Lect Notes Comput Sci","first-page":"229","volume-title":"Fast Software Encrytion Workshop 94","author":"L. R. Knudsen","year":"1995","unstructured":"L. R. Knudsen, Truncated and Higher Order Differential, Fast Software Encrytion Workshop 94, LNCS 1008, Springer-Verlag, 1995, pp. 229\u2013236."},{"key":"4_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1007\/3-540-69710-1_2","volume-title":"Software Encrytion Workshop 98","author":"S. Moriai","year":"1998","unstructured":"S. Moriai, T. Shimoyama and T. Kaneko, Higher Order Differential Attack of a CAST cipher,Fast Software Encrytion Workshop 98, LNCS 1372, Springer-Verlag, 1998, pp. 17\u201331."},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"D. Wheeler and R. Needham, TEA, a Tiny Encryption Algorithm, Fast Software Encryption, Second International Workshop Proceedings, Springer-Verlag, 1995, pp. 97\u2013110.","DOI":"10.1007\/3-540-60590-8_29"},{"key":"4_CR7","unstructured":"D. Wheeler and R. Needham, TEA Extensions, October 1997."},{"key":"4_CR8","series-title":"Lect Notes Comput Sci","volume-title":"Information and Communications Security-Proceedings of ICICS 1997","author":"J. Kelsey","year":"1997","unstructured":"J. Kelsey, B. Schneier and D. Wagner, Related-Key Cryptanalysis of 3-WAY, BihamDES, CAST, DES-X, NewDES, RC2, and TEA, In Information and Communications Security-Proceedings of ICICS 1997, Lecture Notes in Computer Science 1334, Springer-Verlag, 1997."}],"container-title":["Lecture Notes in Computer Science","Fast Software Encryption"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45661-9_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T06:23:27Z","timestamp":1556432607000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45661-9_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540440093","9783540456612"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/3-540-45661-9_4","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2002]]}}}