{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T06:53:18Z","timestamp":1769237598260,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540546207","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-46416-6_30","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T14:02:07Z","timestamp":1186408927000},"page":"352-367","source":"Crossref","is-referenced-by-count":65,"title":["An Expanded Set of S-box Design Criteria Based on Information Theory and its Relation to Differential-Like Attacks"],"prefix":"10.1007","author":[{"given":"M. H.","family":"Dawson","sequence":"first","affiliation":[]},{"given":"S. E.","family":"Tavares","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"30_CR1","doi-asserted-by":"crossref","unstructured":"E. Biham and A. Shamir, \u201cDifferential cryptanalysis of DES-like cryptosystems,\u201d in CRYPTO 90 Abstracts. pp. 1\u201319, August, 1990.","DOI":"10.1007\/BF00630563"},{"key":"30_CR2","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C. E. Shannon","year":"1949","unstructured":"C. E. Shannon, \u201cCommunication theory of secrecy systems,\u201d Bell Systems Technical Journal, vol. 28, pp. 656\u2013715, 1949.","journal-title":"Bell Systems Technical Journal"},{"issue":"5","key":"30_CR3","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1038\/scientificamerican0573-15","volume":"228","author":"H. Feistel","year":"1973","unstructured":"H. Feistel, \u201cCryptography and computer privacy,\u201d Scientific American, vol. 228, no. 5. pp. 15\u201323, 1973.","journal-title":"Scientific American"},{"key":"30_CR4","doi-asserted-by":"publisher","first-page":"1545","DOI":"10.1109\/PROC.1975.10005","volume":"63","author":"H. Feistel","year":"1975","unstructured":"H. Feistel. W. Notz, and J. L. Smith, \u201cSome crytptographic techniques for machine-to-machine data communications,\u201d in Proceedins of the IEEE. vol. 63, pp. 1545\u20131554, 1975.","journal-title":"Proceedins of the IEEE"},{"key":"30_CR5","unstructured":"B. den Boer, \u201cCrptanalysis of F. E. A. L.,\u201d in Advances in Cryptology: Proc. of EUROCRYPT 88, pp. 167\u2013173, Springer-Verlag. 1989."},{"key":"30_CR6","doi-asserted-by":"crossref","unstructured":"W. Fumy, \u201cOn the F-function of FEAL,\u201d in Advances in Cryptology:Proc. of CRYPTO 87, pp. 434\u2013437. Springer-Verlag. 1988.","DOI":"10.1007\/3-540-48184-2_38"},{"key":"30_CR7","unstructured":"National Bureau of Standards (U.S.), \u201cData Encryption Standard (DES),\u201d Tech. Rep. Publication 46, Federal Information Processing Standards, 1977."},{"key":"30_CR8","unstructured":"M. E. Hellman and et. al., \u201cResults of an initial attempt to cryptanalyze the NBS Data Encryption Standard,\u201d tech. rep., Information Systems Laboratory, Stanford University, November, 1976."},{"key":"30_CR9","doi-asserted-by":"crossref","unstructured":"A. Shamir, \u201cOn the security of DES,\u201d in Advances in Cryptology. Proc. of CRYPTO 85, pp. 280\u2013281, Springer-Verlag, 1986.","DOI":"10.1007\/3-540-39799-X_22"},{"key":"30_CR10","doi-asserted-by":"crossref","unstructured":"E. F. Brickell, J. H. Moore, and M. R. Purtill. \u201cStructure in the S-boxes of the DES (extended abstract).\u201d in Advances in Cryptology: Proc. of CRYPTO 86, pp. 3\u20138, Springer-Verlag, 1986.","DOI":"10.1007\/3-540-47721-7_1"},{"issue":"3","key":"30_CR11","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1007\/BF00190799","volume":"2","author":"R. Forr\u00e9","year":"1990","unstructured":"R. Forr\u00e9, \u201cMethods and instruments for designing S-boxes,\u201d Journal of Cryrology, vol. 2, no. 3, pp. 115\u2013130, 1990.","journal-title":"Journal of Cryrology"},{"key":"30_CR12","first-page":"325","volume":"135","author":"J. Piepnyk","year":"1988","unstructured":"J. Piepnyk and G. Finkelstein, \u201cTowards effective nonlinear cyptosystem design,\u201d in IEE proceedings, Part E: Computers and Digital Techniques, vol. 135, pp. 325\u2013335, 1988.","journal-title":"IEE proceedings, Part E: Computers and Digital Techniques"},{"key":"30_CR13","doi-asserted-by":"publisher","first-page":"747","DOI":"10.1109\/TC.1979.1675242","volume":"C-28","author":"J. B. Kam","year":"1979","unstructured":"J. B. Kam and G. I. Davida, \u201cStructured design of substituion-permutation encryption networks,\u201d IEEE Transactions on Computers. vol. C-28. pp. 747\u2013753, 1979.","journal-title":"IEEE Transactions on Computers"},{"key":"30_CR14","unstructured":"A. F. Webster, \u201cPlaintext\/ciphertext bit dependencies in cryptographic systems,\u201d Master\u2019s thesis, Queen\u2019s University, 1985."},{"key":"30_CR15","doi-asserted-by":"crossref","unstructured":"B. Preneel, W. VanLeewijck, L. VanLinden, R. Govaerts, and J. Vandewalle, \u201cPropagation characteristics of boolean functions.\u201d in EUROCRYPT 90 \u2014 Abstracts, pp. 155\u2013165, 1990.","DOI":"10.1007\/3-540-46877-3_14"},{"key":"30_CR16","doi-asserted-by":"crossref","unstructured":"S. Lloyd, \u201cProperties of binary functions.\u201d in EUROCRYPT 90 \u2014 Abstracts, pp. 126\u2013135, 1990.","DOI":"10.1007\/3-540-46877-3_11"},{"key":"30_CR17","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/BF00203967","volume":"3","author":"C. M. Adams","year":"1990","unstructured":"C. M. Adams and S. E. Tavares, \u201cThe structured design of cryptographically good S-boxes,\u201d Journal of Cryptology, vol. 3, pp. 27\u201341. 1990.","journal-title":"Journal of Cryptology"},{"key":"30_CR18","doi-asserted-by":"crossref","unstructured":"A. F. Webster and S. E. Tavares, \u201cOn the design of S-boxes,\u201d in Advances in Cryptology: Proc. of CRYPTO 85, (New York), pp. 523\u2013534, Springer-Verlag, 1986.","DOI":"10.1007\/3-540-39799-X_41"},{"key":"30_CR19","unstructured":"M. H. Dawson. \u201cA unified framework for Substitution box design based on information theory,\u201d Master\u2019s thesis, Department of Electrical Engineering, Queens University, April 1991."},{"key":"30_CR20","unstructured":"M. H. Dawson, \u201cAn implementation of the algorithms required to measure the information theoretic properties of an S-box and the algorithms to use these measures to create new S-boxes,\u201d tech. rep., Department of Electrical Engineering. Queen\u2019s University, Feb. 1991."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201991"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-46416-6_30.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,21]],"date-time":"2021-08-21T03:54:30Z","timestamp":1629518070000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-46416-6_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540546207"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/3-540-46416-6_30","relation":{},"subject":[]}}