{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T13:58:31Z","timestamp":1775829511740,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540440093","type":"print"},{"value":"9783540456612","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45661-9_9","type":"book-chapter","created":{"date-parts":[[2007,5,21]],"date-time":"2007-05-21T07:02:03Z","timestamp":1179730923000},"page":"112-127","source":"Crossref","is-referenced-by-count":321,"title":["Integral Cryptanalysis"],"prefix":"10.1007","author":[{"given":"Lars","family":"Knudsen","sequence":"first","affiliation":[]},{"given":"David","family":"Wagner","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,7,12]]},"reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"P. Barreto, V. Rijmen, J. Nakahara Jr., B. Preneel, J. Vandewalle, and H.Y. Kim. \u201cImproved SQUARE attacks against reduced-round HIEROCRYPT\u201d. Fast Software Encryption 2001, Springer-Verlag, to appear.","DOI":"10.1007\/3-540-45473-X_14"},{"key":"9_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1007\/3-540-48910-X_2","volume-title":"Advances in Cryptology: EUROCRYPT\u201999","author":"E. Biham","year":"1999","unstructured":"E. Biham, A. Biryukov, A. Shamir, \u201cCryptanalysis of Skipjack reduced to 31 rounds using impossible differentials,\u201d In J. Stern, editor, Advances in Cryptology: EUROCRYPT\u201999, LNCS 1592, pp. 12\u201323. Springer Verlag, 1999."},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"E. Biham, A. Shamir, Differential Cryptanalysis of the Data Encryption Standard, Springer-Verlag, 1993.","DOI":"10.1007\/978-1-4613-9314-6"},{"key":"9_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"394","DOI":"10.1007\/3-540-44987-6_24","volume-title":"Advances in Cryptology-EUROCRYPT 2001","author":"A. Biryukov","year":"2001","unstructured":"A. Biryukov, A. Shamir, \u201cStructural Cryptanalysis of SASAS, \u201d Advances in Cryptology-EUROCRYPT 2001, LNCS 2045, Springer-Verlag, pp. 394\u2013405, 2001."},{"key":"9_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1007\/BFb0052343","volume-title":"Fast Software Encryption, Fourth International Workshop, Haifa, Israel, January 1997","author":"J. Daemen","year":"1997","unstructured":"J. Daemen, L. Knudsen, and V. Rijmen. The block cipher Square. In E. Biham, editor, Fast Software Encryption, Fourth International Workshop, Haifa, Israel, January 1997, LNCS 1267, pages 149\u2013165. Springer Verlag, 1997."},{"issue":"1","key":"9_CR6","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1023\/A:1008303310011","volume":"22","author":"J. Daemen","year":"2001","unstructured":"J. Daemen, L.R. Knudsen, and V. Rijmen, \u201cLinear Frameworks for Block Ciphers,\u201d Designs, Codes and Cryptography, Volume 22, No 1, 2001, pp. 65\u201387.","journal-title":"Designs, Codes and Cryptography"},{"key":"9_CR7","unstructured":"J. Daemen, V. Rijmen, \u201cAES Proposal: Rijndael,\u201d AES Round 1 Technical Evaluation CD-1: Documentation, National Institute of Standards and Technology, Aug 1998."},{"key":"9_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1007\/3-540-48519-8_4","volume-title":"Fast Software Encryption, Sixth International Workshop, Rome, Italy, March 1999","author":"C. D\u2019Halluin","year":"1999","unstructured":"C. D\u2019Halluin, G. Bijnens, V. Rijmen, and B. Preneel. Attack on Six Rounds of Crypton. In L. Knudsen, editor, Fast Software Encryption, Sixth International Workshop, Rome, Italy, March 1999, LNCS 1636, pages 46\u201359. Springer Verlag, 1999."},{"key":"9_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44706-7_15","volume-title":"Fast Software Encryption, 7th International Workshop","author":"N. Ferguson","year":"2001","unstructured":"N. Ferguson, J. Kelsey, B. Schneier, M. Stay, D. Wagner, and D. Whiting. Improved cryptanalysis of Rijndael. In B. Schneier, editor, Fast Software Encryption, 7th International Workshop, FSE 2000, New York, USA, April 2000, LNCS 1978, pages 213\u2013230. Springer Verlag, 2001."},{"key":"9_CR10","series-title":"Lect Notes Comput Sci","volume-title":"ICICS 2001","author":"Y. He","year":"2001","unstructured":"Y. He, S. Qing, \u201cSquare Attack on Reduced Camellia Cipher\u201d, ICICS 2001, LNCS 2229, Springer-Verlag."},{"key":"9_CR11","unstructured":"I.N. Herstein, Topics in Algebra, 2nd ed., John Wiley & Sons, 1975."},{"issue":"17","key":"9_CR12","doi-asserted-by":"publisher","first-page":"1458","DOI":"10.1049\/el:19990979","volume":"35","author":"Y. Hu","year":"1999","unstructured":"Y. Hu, Y. Zhang, and G. Xiao, \u201cIntegral cryptanalysis of SAFER+\u201d, Electronics Letters, vol. 35, (no. 17), IEE, 19 Aug. 1999, p. 1458\u20131459.","journal-title":"Electronics Letters"},{"key":"9_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1007\/BFb0052332","volume-title":"Fast Software Encryption, Fourth International Workshop, Haifa, Israel, January 1997","author":"T. Jakobsen","year":"1997","unstructured":"T. Jakobsen and L. Knudsen. The interpolation attack on block ciphers. In E. Biham, editor, Fast Software Encryption, Fourth International Workshop, Haifa, Israel, January 1997, LNCS 1267, pages 28\u201340. Springer Verlag, 1997."},{"key":"9_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1007\/BFb0055730","volume-title":"Advances in Cryptology: CRYPTO\u201998","author":"T. Jakobsen","year":"1998","unstructured":"T. Jakobsen, Cryptanalysis of block ciphers with probabilistic non-linear relations of low degree. In H. Krawczyk, editor, Advances in Cryptology: CRYPTO\u201998, LNCS 1462, pages 212\u2013222. Springer Verlag, 1998."},{"key":"9_CR15","series-title":"Lect Notes Comput Sci","first-page":"15","volume-title":"Fast Software Encryption, Third International Workshop, Cambridge, UK, February 1996","author":"L.R. Knudsen","year":"1995","unstructured":"L.R. Knudsen and T. Berson. Truncated differentials of SAFER. In Gollmann D., editor, Fast Software Encryption, Third International Workshop, Cambridge, UK, February 1996, LNCS 1039, pages 15\u201326. Springer Verlag, 1995."},{"key":"9_CR16","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1007\/3-540-60590-8_16","volume-title":"Fast Software Encryption-Second International Workshop, Leuven, Belgium","author":"L.R. Knudsen","year":"1995","unstructured":"L.R. Knudsen. Truncated and higher order differentials. In B. Preneel, editor, Fast Software Encryption-Second International Workshop, Leuven, Belgium, LNCS 1008, pages 196\u2013211. Springer Verlag, 1995."},{"key":"9_CR17","volume-title":"Copies of transparencies for lecture at the International Course on State of the Art and Evolution of Computer Security and Industrial Cryptography","author":"L.R. Knudsen","year":"1997","unstructured":"L.R. Knudsen, \u201cBlock Ciphers: State of the Art\u201d. Copies of transparencies for lecture at the International Course on State of the Art and Evolution of Computer Security and Industrial Cryptography, Katholieke Universiteit Leuven, Belgium, June, 1997."},{"issue":"4","key":"9_CR18","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1007\/s001450010004","volume":"3","author":"L.R. Knudsen","year":"2000","unstructured":"L.R. Knudsen, \u201cA Detailed Analysis of SAFER K\u201d, Journal of Cryptology, vol. 3, no. 4, Springer-Verlag, 2000, pp. 417\u2013436.","journal-title":"Journal of Cryptology"},{"key":"9_CR19","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1007\/3-540-44987-6_20","volume-title":"Advances in Cryptology-EUROCRYPT\u20192001","author":"U. K\u00fchn","year":"2001","unstructured":"U. K\u00fchn. Cryptanalysis of reduced-round MISTY. In B. Pfitzmann, editor, Advances in Cryptology-EUROCRYPT\u20192001, LNCS 2045, pages 325\u2013339. Springer Verlag, 2001."},{"key":"9_CR20","unstructured":"U. K\u00fchn, \u201cImproved Cryptanalysis of MISTY1,\u201d These proceedings."},{"key":"9_CR21","doi-asserted-by":"crossref","unstructured":"X. Lai, \u201cHigher Order Derivations and Differential Cryptanalysis,\u201d Communications and Cryptography: Two Sides of One Tapestry, Kluwer Academic Publishers, 1994, pp. 227\u2013233.","DOI":"10.1007\/978-1-4615-2694-0_23"},{"key":"9_CR22","doi-asserted-by":"crossref","unstructured":"S. Lucks, \u201cThe Saturation Attack\u2014a Bait for Twofish\u201d, Fast Software Encryption 2001, Springer-Verlag, to appear.","DOI":"10.1007\/3-540-45473-X_1"},{"key":"9_CR23","series-title":"Lect Notes Comput Sci","first-page":"1","volume-title":"Fast Software Encryption-Proc. Cambridge Security Workshop, Cambridge, U.K.","author":"J.L. Massey","year":"1994","unstructured":"J.L. Massey. SAFER K-64: A byte-oriented block-ciphering algorithm. In R. Anderson, editor, Fast Software Encryption-Proc. Cambridge Security Workshop, Cambridge, U.K., LNCS 809, pages 1\u201317. Springer Verlag, 1994."},{"key":"9_CR24","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1007\/BFb0052334","volume-title":"Fast Software Encryption, Fourth International Workshop, Haifa, Israel, January 1997","author":"M. Matsui","year":"1997","unstructured":"M. Matsui. New block encryption algorithm MISTY. In E. Biham, editor, Fast Software Encryption, Fourth International Workshop, Haifa, Israel, January 1997, LNCS 1267, pages 54\u201368. Springer Verlag, 1997."},{"key":"9_CR25","unstructured":"J. Nakahara Jr., P.S.L.M. Barreto, B. Preneel, J. Vandewalle, H.Y. Kim, \u201cSQUARE Attacks Against Reduced-Round PES and IDEA Block Ciphers\u201d, IACR Cryptology ePrint Archive, Report 2001\/068, 2001."},{"key":"9_CR26","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/BFb0034838","volume-title":"Advances in Cryptology-ASIACRYPT\u201996","author":"K. Nyberg","year":"1996","unstructured":"K. Nyberg. Generalized Feistel networks. In Kwangjo Kim and Tsutomu Matsumoto, editors, Advances in Cryptology-ASIACRYPT\u201996, LNCS 1163, pages 91\u2013104. Springer Verlag, 1996."},{"key":"9_CR27","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1007\/3-540-60865-6_47","volume-title":"Fast Software Encryption, Third International Workshop, Cambridge, UK, February 1996","author":"V. Rijmen","year":"1996","unstructured":"V. Rijmen, J. Daemen, B. Preneel, A. Bosselaers, and E. De Win. The cipher SHARK. In Gollmann D., editor, Fast Software Encryption, Third International Workshop, Cambridge, UK, February 1996, LNCS 1039, pages 99\u2013112. Springer Verlag, 1996."},{"issue":"1","key":"9_CR28","first-page":"19","volume":"E80-A","author":"K. Sakurai","year":"1997","unstructured":"K. Sakurai and Y. Zheng, \u201cOn Non-Pseudorandomness from Block Ciphers with Provable Immunity against Linear Cryptanalysis\u201d, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science, Vol. E80-A, No. 1, 1997, pp. 19\u201324.","journal-title":"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science"}],"container-title":["Lecture Notes in Computer Science","Fast Software Encryption"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45661-9_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T02:23:49Z","timestamp":1556418229000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45661-9_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540440093","9783540456612"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/3-540-45661-9_9","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2002]]}}}