{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T20:19:10Z","timestamp":1771705150391,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540440505","type":"print"},{"value":"9783540457084","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45708-9_1","type":"book-chapter","created":{"date-parts":[[2007,10,19]],"date-time":"2007-10-19T08:48:16Z","timestamp":1192783696000},"page":"1-16","source":"Crossref","is-referenced-by-count":97,"title":["Essential Algebraic Structure within the AES"],"prefix":"10.1007","author":[{"given":"Sean","family":"Murphy","sequence":"first","affiliation":[]},{"given":"Matthew J.B.","family":"Robshaw","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,9,13]]},"reference":[{"key":"1_CR1","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4613-9314-6","volume-title":"Differential Cryptanalysis of the Data Encryption Standard","author":"E. Biham","year":"1993","unstructured":"E. Biham and A. Shamir. Differential Cryptanalysis of the Data Encryption Standard. Springer-Verlag, New York, 1993."},{"key":"1_CR2","unstructured":"D. Coppersmith. Personal communication, 30 April 2002."},{"key":"1_CR3","series-title":"Lect Notes Comput Sci","first-page":"282","volume-title":"Quartz, 128-bit long digital signatures","year":"2001","unstructured":"N. Courtois, L. Goubin, and J. Patarin. Quartz, 128-bit long digital signatures. In D. Naccache, editor, Proceedings of Cryptographers\u2019 Track RSA Conference 2001, LNCS 2020, pages 282\u2013297, Springer-Verlag, 2001."},{"key":"1_CR4","series-title":"Lect Notes Comput Sci","first-page":"211","volume-title":"Solving underdefined systems of multivariate quadratic equations","year":"2002","unstructured":"N. Courtois, L. Goubin, W. Meier, and J. Tacier. Solving underdefined systems of multivariate quadratic equations. In D. Paillier, editor, Proceedings of Public Key Cryptography 2002, LNCS 2274, pages 211\u2013227, Springer-Verlag, 2002."},{"key":"1_CR5","series-title":"Lect Notes Comput Sci","first-page":"392","volume-title":"Efficient algorithms for solving overdefined systems of multivariate polynomial equations","year":"2000","unstructured":"N. Courtois, A. Klimov, J. Patarin, and A. Shamir. Efficient algorithms for solving overdefined systems of multivariate polynomial equations. In B. Preneel, editor, Proceedings of Eurocrypt 2000, LNCS 1807, pages 392\u2013407, Springer-Verlag, 2000."},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"N. Courtois and J. Pieprzyk. Cryptanalysis of block ciphers with overdefined systems of equations. IACR eprint server http:\/\/www.iacr.org , April 2002.","DOI":"10.1007\/3-540-36178-2_17"},{"key":"1_CR7","unstructured":"J. Daemen and V. Rijmen. AES Proposal: Rijndael (Version 2). NIST AES website http:\/\/www.csrc.nist.gov\/encryption\/aes , 1999."},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"J. Daemen and V. Rijmen. The Design of Rijndael: AES-The Advanced Encryption Standard. Springer-Verlag, 2002.","DOI":"10.1007\/978-3-662-04722-4"},{"key":"1_CR9","unstructured":"J. Daemen and V. Rijmen. Answers to \u201cNew Observations on Rijndael\u201d. NIST AES website http:\/\/www.csrc.nist.gov\/encryption\/aes , August 2000."},{"key":"1_CR10","series-title":"Lect Notes Comput Sci","first-page":"213","volume-title":"Proceedings of Fast Software Encryption 2000","author":"N. Ferguson","year":"2000","unstructured":"N. Ferguson, J. Kelsey, B. Schneier, M. Stay, D. Wagner, and D. Whiting. Improved cryptanalysis of Rijndael. In B. Schneier, editor, Proceedings of Fast Software Encryption 2000, LNCS, pages 213\u2013230, Springer-Verlag, 2000."},{"key":"1_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1007\/3-540-45537-X_8","volume-title":"Proceedings of Selected Areas in Cryptography","author":"N. Ferguson","year":"2001","unstructured":"N. Ferguson, R. Shroeppel, and D. Whiting. A simple algebraic representation of Rijndael. In S. Vaudenay and A. Youssef, editors, Proceedings of Selected Areas in Cryptography, LNCS, pages 103\u2013111, Springer-Verlag, 2001."},{"key":"1_CR12","unstructured":"H. Gilbert and M. Minier. A collision attack on seven rounds of Rijndael. Third AES Conference, NIST AES website http:\/\/www.csrc.nist.gov\/encryption\/aes , April 2000."},{"key":"1_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1007\/BFb0052332","volume-title":"Proceedings of Fast Software Encryption 1997","author":"T. Jakobsen","year":"1997","unstructured":"T. Jakobsen and L.R. Knudsen. The interpolation attack on block ciphers. In E. Biham, editor, Proceedings of Fast Software Encryption 1997, LNCS 1267, pages 28\u201340, Springer-Verlag, 1997."},{"key":"1_CR14","series-title":"Lect Notes Comput Sci","first-page":"19","volume-title":"Cryptanalysis of the HFE Public Key Cryptosystem be Relinearization","year":"1999","unstructured":"A. Kipnis and A. Shamir. Cryptanalysis of the HFE Public Key Cryptosystem be Relinearization. In M. Wiener, editor, Proceedings of Crypto\u2019 99, LNCS 1666, pages 19\u201330, Springer-Verlag, 1999."},{"key":"1_CR15","unstructured":"L. Knudsen and H. Raddum. Recommendation to NIST for the AES. NIST second round comment, NIST AES website http:\/\/www.csrc.nist.gov\/encryption\/aes\/ , 2000."},{"key":"1_CR16","unstructured":"R. Lidl and H. Niederreiter. Introduction to Finite Fields and Their Applications. Cambridge University Press, 1984."},{"key":"1_CR17","unstructured":"S. Lucks. Attacking seven rounds of Rijndael under 192-bit and 256-bit keys. In Proceedings of Third AES Conference and also via NIST AES website http:\/\/www.csrc.nist.gov\/encryption\/aes , April 2000."},{"key":"1_CR18","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume-title":"Proceedings of Eurocrypt\u2019 93","author":"M. Matsui","year":"1994","unstructured":"M. Matsui. Linear cryptanalysis method for DES cipher. In T. Helleseth, editor, Proceedings of Eurocrypt\u2019 93, LNCS 765, pages 386\u2013397, Springer-Verlag, 1994."},{"key":"1_CR19","unstructured":"S. Murphy and M.J.B. Robshaw. New observations on Rijndael. NIST AES website http:\/\/www.csrc.nist.gov\/encryption\/aes , August 2000."},{"key":"1_CR20","unstructured":"S. Murphy and M.J.B. Robshaw. Further comments on the structure of Rijndael. NIST AES website http:\/\/www.csrc.nist.gov\/encryption\/aes , August 2000."},{"key":"1_CR21","unstructured":"National Institute of Standards and Technology. Advanced Encryption Standard. FIPS 197. 26 November 2001."},{"key":"1_CR22","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1007\/3-540-68339-9_4","volume-title":"Proceedings of Eurocrypt\u2019 96","author":"J. Patarin","year":"1996","unstructured":"J. Patarin. Hidden field equations (HFE) and isomorphisms of polynomials (IP): Two new families of asymmetric algorithms. In U. Maurer, editor, Proceedings of Eurocrypt\u2019 96, LNCS 1070, pages 33\u201348, Springer-Verlag, 1996."},{"key":"1_CR23","unstructured":"R. Schroeppel. Second round comments to NIST. NIST second round comment, NIST AES website http:\/\/www.csrc.nist.gov\/encryption\/aes\/ , 2000."},{"key":"1_CR24","series-title":"Lect Notes Comput Sci","volume-title":"Proceedings of Fast Software Encryption","author":"R. Wernsdorf","year":"2002","unstructured":"R. Wernsdorf. The round functions of Rijndael generate the alternating group. In V. Rijmen, editor, Proceedings of Fast Software Encryption, LNCS, Springer-Verlag, to appear."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO 2002"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45708-9_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,3]],"date-time":"2019-05-03T21:27:41Z","timestamp":1556918861000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45708-9_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540440505","9783540457084"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/3-540-45708-9_1","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2002]]}}}