{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T17:37:16Z","timestamp":1760204236468},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540440093"},{"type":"electronic","value":"9783540456612"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45661-9_8","type":"book-chapter","created":{"date-parts":[[2007,5,21]],"date-time":"2007-05-21T11:02:03Z","timestamp":1179745323000},"page":"100-111","source":"Crossref","is-referenced-by-count":10,"title":["Saturation Attacks on Reduced Round Skipjack"],"prefix":"10.1007","author":[{"given":"Kyungdeok","family":"Hwang","sequence":"first","affiliation":[]},{"given":"Wonil","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Sungjae","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Sangjin","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Jongin","family":"Lim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,7,12]]},"reference":[{"key":"8_CR1","unstructured":"E. Biham, A. Biryukov, O. Dunkelmann, E. Richardson and A. Shamir, Initial Observations on the Skipjack Encryption Algorithm, June 25, 1998. Available at http:\/\/www.cs.technion.ac.il\/~biham\/Reports\/Skipjack\/ ."},{"key":"8_CR2","unstructured":"E. Biham, A. Biryukov, O. Dunkelmann, E. Richardson and A. Shamir, Cryptanalysis of Skipjack-3XOR in 220 time and using 29 chosen plaintexts, July 2, 1998. Available at http:\/\/www.cs.technion.ac.il\/~biham\/Reports\/Skipjack\/ ."},{"key":"8_CR3","unstructured":"E. Biham, A. Biryukov, O. Dunkelmann, E. Richardson and A. Shamir, Cryptanalysis of Skipjack-4XOR, June 30, 1998. Available at http:\/\/www.cs. technion.ac.il\/~biham\/Reports\/Skipjack\/ ."},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"E. Biham, A. Biryukov, and A. Shamir, Initial Observations on the Skipjack: Cryptanalysis of Skipjack-3XOR, SAC\u201998, 1998. Available at http:\/\/www.cs. technion.ac.il\/~biham\/Reports\/Skipjack\/ .","DOI":"10.1007\/3-540-48892-8_27"},{"key":"8_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1007\/3-540-48910-X_2","volume-title":"EUROCRYPT\u201999","author":"E. Biham","year":"1999","unstructured":"Eli Biham, Alex Biryukov, and Adi Shamir, Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials, EUROCRYPT\u201999, LNCS 1592, Springer-Verlag, 1999 pp. 12\u201323. Available at http:\/\/www.cs.technion.ac.il\/~biham\/Reports\/Skipjack\/ ."},{"key":"8_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1007\/3-540-48405-1_11","volume-title":"CRYPTO\u201999","author":"L. R. Knudsen","year":"1999","unstructured":"Lars R. Knudsen, M.J.B. Robshaw, and David Wagner, Truncated differentials and Skipjack, CRYPTO\u201999, LNCS 1666, Springer-Verlag, August 1999 pp. 165\u2013180."},{"key":"8_CR7","series-title":"Lect Notes Comput Sci","first-page":"341","volume-title":"Fast Software Encryption Workshop 2001","author":"L. Granboulan","year":"2001","unstructured":"Louis Granboulan, Flaws in differential Cryptanalysis of Skipjack, Fast Software Encryption Workshop 2001, LNCS 1039, Springer-Verlag April, 2001, pp. 341\u2013346."},{"key":"8_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1007\/3-540-47745-4","volume-title":"Fast Software Encryption Workshop 2001","author":"S. Lucks","year":"2001","unstructured":"S. Lucks, The Saturation Attack-a Bait for Twofish, Fast Software Encryption Workshop 2001, LNCS 1039, Springer-Verlag, 2001, pp. 189\u2013203"},{"key":"8_CR9","unstructured":"National Institute of Standards and Technology, Skipjack and KEA Algorithm Specifications, version 2.0, Available at http:\/\/crsc.nist.gov\/encryption\/skipjack-kea.htm ."},{"key":"8_CR10","unstructured":"National Institute of Standards and Technology, NSA Releases Fortezza Algorithms, Available at http:\/\/crsc.nist.gov\/encryption\/encryption\/nsa-press.pdf ."}],"container-title":["Lecture Notes in Computer Science","Fast Software Encryption"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45661-9_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T06:23:34Z","timestamp":1556432614000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45661-9_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540440093","9783540456612"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/3-540-45661-9_8","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}