{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:24:37Z","timestamp":1725488677699},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540546207"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-46416-6_26","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T14:02:07Z","timestamp":1186408927000},"page":"302-315","source":"Crossref","is-referenced-by-count":5,"title":["On the Use of Interconnection Networks in Cryptography"],"prefix":"10.1007","author":[{"given":"Michael","family":"Portz","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"26_CR1","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1137\/0215025","volume":"15","author":"L. Blum","year":"1986","unstructured":"L. Blum, M. Blum, M. Shub: \u201cA simple unpredictable pseudo-random number generator\u201d, SIAM Journal on Computing, Vol. 15, 1986, pp. 364\u2013383","journal-title":"SIAM Journal on Computing"},{"key":"26_CR2","volume-title":"Mathematical theory of connecting networks and telephone traffic","author":"V.E. Benes","year":"1965","unstructured":"V.E. Benes: \u201cMathematical theory of connecting networks and telephone traffic\u201d, Academic Press, New York, 1965"},{"key":"26_CR3","unstructured":"T. Beth, P. Horster, M. Portz: \u201cVerbindungsnetzwerke in der Kryptologie\u201d; to appear as report of the European Institute for System Security (E.I.S.S.)"},{"key":"26_CR4","doi-asserted-by":"crossref","unstructured":"Tse-yun Feng: \u201cA survey of interconnection networks\u201d; Computer: IE3; Dec 1981, pp. 12\u201327","DOI":"10.1109\/C-M.1981.220290"},{"issue":"4","key":"26_CR5","doi-asserted-by":"publisher","first-page":"792","DOI":"10.1145\/6490.6503","volume":"33","author":"O. Goldreich","year":"1986","unstructured":"O. Goldreich, S. Goldwasser, S. Micali: \u201cHow to construct random functions\u201d; Journal of the ACM, Vol. 33, No. 4, Oct. 1986, pp. 792\u2013807","journal-title":"Journal of the ACM"},{"key":"26_CR6","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology-EUROCRYPT\u2019 89","author":"S. Lloyd","year":"1990","unstructured":"S. Lloyd: \u201cCounting Functions satisfying a higher order strict avalanche criterion\u201d; Advances in Cryptology-EUROCRYPT\u2019 89, Lecture Notes in Computer Science 434, Springer Verlag, 1990"},{"key":"26_CR7","doi-asserted-by":"crossref","unstructured":"M. Luby, C. Rackoff: \u201cPseudo-random permutation generators and cryptographic composition\u201d; Proceedings of the 18th ACM Symposium on the Theory of Computing, ACM, 1986, pp. 356\u2013363","DOI":"10.1145\/12130.12167"},{"issue":"2","key":"26_CR8","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1137\/0217022","volume":"17","author":"M. Luby","year":"1988","unstructured":"M. Luby, C. Rackoff: \u201cHow to construct pseudo-random permutations from pseudorandom functions\u201d; SIAM Journal of Computing, Vol. 17(2), 1988, pp. 373\u2013386","journal-title":"SIAM Journal of Computing"},{"issue":"5","key":"26_CR9","doi-asserted-by":"crossref","first-page":"1579","DOI":"10.1002\/j.1538-7305.1971.tb02569.x","volume":"50","author":"D.C. Opferman","year":"1971","unstructured":"D.C. Opferman, N.T. Tsao-Wu: \u201cOn a class of rearrangeable switching networks\u201d \u201cPart I: Control Algorithm\u201d; The Bell System Technical Journal, Vol. 50, No. 5, May\u2013June 1971, pp. 1579\u20131600; \u201cPart II: Enumeration Studies and Fault Diagnosis\u201d; The Bell System Technical Journal, Vol. 50, No. 5, May\u2013June 1971, pp. 1601\u20131618","journal-title":"The Bell System Technical Journal"},{"key":"26_CR10","volume-title":"A study on data security","author":"Y. Ohnishi","year":"1988","unstructured":"Y. Ohnishi: \u201cA study on data security\u201d; Master Thesis (in Japanese); Tohoku University, Japan, 1988"},{"key":"26_CR11","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology-EUROCRYPT\u2019 90","author":"J. Pieprzyk","year":"1991","unstructured":"J. Pieprzyk: \u201cHow to construct pseudorandom permutations from single pseudorandom functions\u201d; Advances in Cryptology-EUROCRYPT\u2019 90, Lecture Notes in Computer Science 473, Springer Verlag, 1991"},{"key":"26_CR12","unstructured":"M. Portz: \u201cA new class of cryptosystems based on interconnection networks\u201d; Aachener Informatik-Berichte, Nr. 91-4, RWTH Aachen, Fachgruppe Informatik; ISSN 0935-3232, 1991"},{"key":"26_CR13","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology-EUROCRYPT\u2019 88","author":"C.P. Schnorr","year":"1989","unstructured":"C.P. Schnorr: \u201cOn the construction of random number generators and random function generators\u201d; Advances in Cryptology-EUROCRYPT\u2019 88, Lecture Notes in Computer Science 330, Springer Verlag, 1989"},{"issue":"1","key":"26_CR14","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1145\/321439.321449","volume":"15","author":"A. Waksman","year":"1968","unstructured":"A. Waksman: \u201cA permutation network\u201d; Journal of the ACM, Vol. 15, No. 1, Jan. 1968, pp. 159\u2013163","journal-title":"Journal of the ACM"},{"key":"26_CR15","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-34805-0_42","volume-title":"Advances in Cryptology-CRYPTO 89","author":"Y. Zheng","year":"1990","unstructured":"Y. Zheng, T. Matsumoto, H. Imai: \u201cOn the construction of block ciphers provably secure and not relying on any unproved hypothesis\u201d; Advances in Cryptology-CRYPTO 89; Lecture Notes in Computer Science 435; Springer; 1990"},{"key":"26_CR16","doi-asserted-by":"crossref","unstructured":"A.C. Yao: \u201cTheory and application of trapdoor functions\u201d; Proceedings of the 23rd IEEE Symposium on Foundation of Computer Science, New York, 1982","DOI":"10.1109\/SFCS.1982.45"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201991"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-46416-6_26.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T16:11:26Z","timestamp":1605629486000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-46416-6_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540546207"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/3-540-46416-6_26","relation":{},"subject":[]}}