{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:08:35Z","timestamp":1725484115507},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540440093"},{"type":"electronic","value":"9783540456612"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45661-9_5","type":"book-chapter","created":{"date-parts":[[2007,5,21]],"date-time":"2007-05-21T11:02:03Z","timestamp":1179745323000},"page":"61-75","source":"Crossref","is-referenced-by-count":24,"title":["Improved Cryptanalysis of MISTY1"],"prefix":"10.1007","author":[{"given":"Ulrich","family":"K\u00fchn","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,7,12]]},"reference":[{"key":"5_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1007\/3-540-48519-8_10","volume-title":"Fast Software Encryption, 6th international Workshop","author":"E. Biham","year":"1999","unstructured":"E. Biham, A. Biryukov, and A. Shamir. Miss in the middle attacks on IDEA and Khufu. In L. Knudsen, editor, Fast Software Encryption, 6th international Workshop, volume 1636 of Lecture Notes in Computer Science, pages 124\u2013138, Rome, Italy, 1999. Springer-Verlag."},{"key":"5_CR2","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4613-9314-6","volume-title":"Differential Cryptanalysis of the Data Encryption Standard","author":"E. Biham","year":"1993","unstructured":"E. Biham and A. Shamir. Differential Cryptanalysis of the Data Encryption Standard. Springer Verlag, Berlin, 1993."},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"K. L. Chung. Elementary Probability Theory with Stochastic Processes. Springer Verlag, 1979.","DOI":"10.1007\/978-1-4684-9346-7"},{"key":"5_CR4","unstructured":"ETSI\/SAGE. Specification of the 3GPP Confidentiality and Integrity Algorithms-Document 2: KASUMI Specification, Version 1.0. 3G TS 35.202, December 23, 1999. \n                    http:\/\/www.etsi.org\/dvbandca\/3GPP\/3GPPconditions.html\n                    \n                  ."},{"key":"5_CR5","volume-title":"Technical Report 151","author":"L. R. Knudsen","year":"1998","unstructured":"L. R. Knudsen. DEAL \u2014 A 128-bit block cipher. Technical Report 151, Department of Informatics, University of Bergen, Bergen, Norway, Feb. 1998."},{"key":"5_CR6","unstructured":"L. R. Knudsen and D. Wagner. Integral cryptanalysis. These Proceedings, pages 114\u2013129."},{"key":"5_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/3-540-44987-6_20","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2001","author":"U. K\u00fchn","year":"2001","unstructured":"U. K\u00fchn. Cryptanalysis of Reduced-Round MISTY. In B. Pfitzmann, editor, Advances in Cryptology \u2014 EUROCRYPT 2001, volume 2045 of Lecture Notes in Computer Science, pages 325\u2013339. Springer Verlag, 2001."},{"key":"5_CR8","series-title":"Lect Notes Comput Sci","first-page":"386","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u2019 93","author":"M. Matsui","year":"1993","unstructured":"M. Matsui. Linear cryptanalysis method for DES cipher. In T. Helleseth, editor, Advances in Cryptology \u2014 EUROCRYPT\u2019 93, pages 386\u2013397, Berlin, 1993. Springer-Verlag. Lecture Notes in Computer Science Volume 765."},{"key":"5_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/BFb0052334","volume-title":"Fast Software Encryption: 4th International Workshop","author":"M. Matsui","year":"1997","unstructured":"M. Matsui. New block encryption algorithm MISTY. In E. Biham, editor, Fast Software Encryption: 4th International Workshop, volume 1267 of Lecture Notes in Computer Science, pages 54\u201368, Haifa, Israel, 20\u201322 Jan. 1997. Springer-Verlag."},{"key":"5_CR10","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511814075","volume-title":"Randomized Algorithms","author":"R. Motwani","year":"1995","unstructured":"R. Motwani and P. Raghavan. Randomized Algorithms. Cambridge University Press, New York, NY, 1995."},{"key":"5_CR11","unstructured":"NESSIE. New European Schemes for Signature, Integrity, and Encryption. \n                    http:\/\/www.cryptonessie.org\n                    \n                  ."},{"key":"5_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/3-540-46796-3_22","volume-title":"Proc. Applied algebra, algebraic algorithms, and error-correcting codes: 13th international symposium, AAECC-13","author":"H. Tanaka","year":"1999","unstructured":"H. Tanaka, K. Hisamatsu, and T. Kaneko. Strength of MISTY1 without FL function for higher order differential attack. In M. Fossorier, H. Imai, S. Lin, and A. Poli, editors, Proc. Applied algebra, algebraic algorithms, and error-correcting codes: 13th international symposium, AAECC-13, volume 1719 of Lecture Notes in Computer Science, pages 221\u2013230, Hawaii, USA, 1999. Springer Verlag."}],"container-title":["Lecture Notes in Computer Science","Fast Software Encryption"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45661-9_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,16]],"date-time":"2019-02-16T20:53:14Z","timestamp":1550350394000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45661-9_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540440093","9783540456612"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/3-540-45661-9_5","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}