{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T10:08:28Z","timestamp":1742378908570},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540433194"},{"type":"electronic","value":"9783540458616"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45861-1_17","type":"book-chapter","created":{"date-parts":[[2007,10,28]],"date-time":"2007-10-28T02:40:01Z","timestamp":1193539201000},"page":"214-225","source":"Crossref","is-referenced-by-count":23,"title":["Slide Attacks with a Known-Plaintext Cryptanalysis"],"prefix":"10.1007","author":[{"given":"Soichi","family":"Furuya","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,4,23]]},"reference":[{"issue":"1","key":"17_CR1","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E. Biham","year":"1991","unstructured":"E. Biham, A. Shamir, \u201cDifferential Cryptanalysis of DES-like Cryptosystems,\u201d Journal of Cryptology, Vol.4, No.1, pp. 3\u201372, 1991. (The extended abstract was presented at CRYPTO\u201990.","journal-title":"Journal of Cryptology"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"E. Biham, A. Shamir, \u201cDifferential Cryptanalysis of the Data Encryption Standard,\u201d Springer-Verlag, 1993.","DOI":"10.1007\/978-1-4613-9314-6"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"A. Biryukov, D. Wagner, \u201cSlide attacks,\u201d Preproceedings of FSE6, Fast Software Encryption Workshop 1999, 1999.","DOI":"10.1007\/3-540-48519-8_18"},{"key":"17_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45539-6_41","volume-title":"Advances in Cryptology,-EUROCRYPT2000","author":"A. Biryukov","year":"2000","unstructured":"A. Biryukov, D. Wagner, \u201cAdvanced Slide attacks,\u201d Advances in Cryptology,-EUROCRYPT2000, LNCS Vol. 1807, Springer-Verlag, 2000."},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"D.W. Davies, \u201cSome Regular Properties of the \u2018Data Encryption Standard\u2019 algorithm,\u201d Advances in Cryptology: Proceedings of CRYPTO82, Plenum Press, 1983.","DOI":"10.1007\/978-1-4757-0602-4_8"},{"key":"17_CR6","unstructured":"FIPS 46, \u201cData Encryption Standard,\u201d Federal Information Processing Standards Publication 46, U.S. Department of Commerce\/National Bureau of Standards, National Technical Information Service, Springfield, Virginia, 1977 (revised as FIPS 46-1:1988, FIPS46-2:1993, FIPS46-3:1999)."},{"key":"17_CR7","unstructured":"GOST, Gosudarstvennyi Standard 28147-89, \u201cCryptographic Protection for Data Processing Systems,\u201d Government Committee for the USSR for Standards, 1989. (In Russian.)"},{"key":"17_CR8","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology,-ASIACRYPT\u201991","author":"L. R. Knudsen","year":"1991","unstructured":"L. R. Knudsen, \u201cCryptanalysis of LOKI91,\u201d Advances in Cryptology,-ASIACRYPT\u201991, LNCS Vol. 739, Springer-Verlag, 1991."},{"key":"17_CR9","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology,-CRYPTO\u201994","author":"B. S. Kaliski","year":"1994","unstructured":"B. S. Kaliski, M. J. B. Robshaw, \u201cLinear Cryptanalysis Using Multiple Approximations,\u201d Advances in Cryptology,-CRYPTO\u201994, LNCS Vol. 839, Springer-Verlag, 1994."},{"key":"17_CR10","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology,-EUROCRYPT\u201996","author":"L. R. Knudsen","year":"1996","unstructured":"L. R. Knudsen, M. J. B. Robshaw, \u201cNon-linear Approximations in Linear Cryptanalysis,\u201d Advances in Cryptology,-EUROCRYPT\u201996, LNCS Vol. 1070, Springer-Verlag, 1996."},{"key":"17_CR11","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology,-CRYPTO\u201996","author":"J. Kelsey","year":"1996","unstructured":"J. Kelsey, B. Schneier, D. Wagner, \u201cKey-Schedule Cryptanalysis of 3-WAY, IDEA, G-DES, RC4, SAFER, and Triple-DES,\u201d Advances in Cryptology,-CRYPTO\u201996, LNCS Vol. 1109, Springer-Verlag, 1996."},{"key":"17_CR12","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology,-CRYPTO\u201994","author":"S. K. Langford","year":"1994","unstructured":"S. K. Langford, M. E. Hellman, \u201cDifferential-Linear Cryptanalysis,\u201d Advances in Cryptology,-CRYPTO\u201994, LNCS Vol. 839, Springer-Verlag, 1994."},{"key":"17_CR13","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology,-EUROCRYPT\u201993","author":"M. Matsui","year":"1993","unstructured":"M. Matsui, \u201cLinear Cryptanalysis Method for DES Cipher,\u201d Advances in Cryptology,-EUROCRYPT\u201993, LNCS Vol. 765, Springer-Verlag, 1993."},{"key":"17_CR14","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology,-CRYPTO\u201994","author":"M. Matsui","year":"1994","unstructured":"M. Matsui, \u201cThe First Experimental Cryptanalysis of the Data Encryption Standard,\u201d Advances in Cryptology,-CRYPTO\u201994, LNCS Vol.839, Springer-Verlag, 1994."},{"key":"17_CR15","series-title":"Lect Notes Comput Sci","volume-title":"New Block Encryption Algorithm MISTY","author":"M. Matsui","year":"1997","unstructured":"M. Matsui, \u201cNew Block Encryption Algorithm MISTY,\u201d Fast Software Encryption, 4th International Workshop, FSE'97, LNCS Vol. 1267, Springer-Verlag, 1997."},{"key":"17_CR16","unstructured":"M. J. Saarinen, \u201cA chosen key attack against the secret S-boxes of GOST,\u201d unpublished, available at http:\/\/www.jyu.fi\/~mjos\/gost_cka.ps ."},{"key":"17_CR17","unstructured":"B. Schneier, \u201cThe GOST Encryption Algorithm,\u201d Dr. Dobb\u2019s Journal, Vol. 20, No. 2, 1995."},{"key":"17_CR18","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","DOI":"10.1007\/BFb0028319","volume-title":"Fast Software Encryption: Designing Encryption Algorithms for Optimal Software Speed on the Intel Pentium Processor","author":"B. Schneier","year":"1997","unstructured":"B. Schneier, D. Whiting \u201cFast Software Encryption: Designing Encryption Algorithms for Optimal Software Speed on the Intel Pentium Processor,\u201d Fast Software Encryption, 4th International Workshop, FSE\u201997, LNCS Vol. 1267, Springer-Verlag, 1997."},{"key":"17_CR19","doi-asserted-by":"crossref","unstructured":"S. Vaudenay, \u201cAn experiment on DES statistical cryptanalysis,\u201d Proc. of 3rd ACM CCCS, 1996.","DOI":"10.1145\/238168.238206"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology \u2014 ICISC 2001"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45861-1_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,3]],"date-time":"2019-05-03T22:29:39Z","timestamp":1556922579000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45861-1_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540433194","9783540458616"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/3-540-45861-1_17","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}