{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:24:40Z","timestamp":1725488680865},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540546207"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-46416-6_31","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T14:02:07Z","timestamp":1186408927000},"page":"368-377","source":"Crossref","is-referenced-by-count":5,"title":["Enumerating Nondegenerate Permutations"],"prefix":"10.1007","author":[{"given":"Luke","family":"O\u2019Connor","sequence":"first","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"31_CR1","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/BF00203967","volume":"3","author":"A. Adams","year":"1990","unstructured":"A. Adams and S. Tavares. The structured design of cryptographically good S-boxes. Journal of Cryptology, 3(1):27\u201341, 1990.","journal-title":"Journal of Cryptology"},{"key":"31_CR2","first-page":"196","volume":"129","author":"F. Ayoub","year":"1982","unstructured":"F. Ayoub. Probabilistic completeness of substitution-permutation encryption networks. IEE proceedings, 129, part E(5):196\u2013199, 1982.","journal-title":"IEE proceedings"},{"key":"31_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1007\/3-540-39799-X_16","volume-title":"Advances in Cryptology, CRYPTO 85","author":"D. Chaum","year":"1986","unstructured":"D. Chaum and J. H. Everste. Cryptanalysis of DES with a reduced number of rounds. Advances in Cryptology, CRYPTO 85, H. C. Williams ed., Lecture Notes in Computer Science, vol. 218, Springer-Verlag, pages 192\u2013211, 1986."},{"issue":"4","key":"31_CR4","doi-asserted-by":"publisher","first-page":"624","DOI":"10.1137\/0129051","volume":"29","author":"D. Coppersmith","year":"1974","unstructured":"D. Coppersmith and E. Grossman. Generators for certain alternating groups with applications to cryptography. SIAM Journal of Applied Mathematics, 29(4):624\u2013627, 1974.","journal-title":"SIAM Journal of Applied Mathematics"},{"issue":"6","key":"31_CR5","doi-asserted-by":"publisher","first-page":"863","DOI":"10.1109\/TIT.1983.1056752","volume":"IT-29","author":"S. Even","year":"1983","unstructured":"S. Even and O. Goldreich. DES-like functions can generate the alternating group. IEEE Transactions on Information Theory, IT-29(6):863\u2013865, 1983.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"5","key":"31_CR6","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1038\/scientificamerican0573-15","volume":"228","author":"H. Feistel","year":"1973","unstructured":"H. Feistel. Cryptography and computer privacy. Scientific American, 228(5):15\u201323, 1973.","journal-title":"Scientific American"},{"issue":"11","key":"31_CR7","doi-asserted-by":"publisher","first-page":"1545","DOI":"10.1109\/PROC.1975.10005","volume":"63","author":"H. Feistel","year":"1975","unstructured":"H. Feistel, W. A. Notz, and J. Lynn Smith. Some cryptographic techniques for machine-to-machine data communications. proceedings of the IEEE, 63(11):1545\u20131554, 1975.","journal-title":"proceedings of the IEEE"},{"key":"31_CR8","doi-asserted-by":"crossref","unstructured":"J. Gordon and H. Retkin. Are big S-boxes best? In T. Beth, editor, Cryptography, proceedings, Burg Feuerstein, pages 257\u2013262, 1982.","DOI":"10.1007\/3-540-39466-4_18"},{"key":"31_CR9","unstructured":"M. A. Harrison. Introduction to Switching and Automata Theory. McGraw-Hill, Inc., 1965."},{"key":"31_CR10","volume-title":"Mathematical Theory of Swithcing Circuits and Automata","author":"S. T. Hu","year":"1968","unstructured":"S. T. Hu. Mathematical Theory of Swithcing Circuits and Automata. Berkeley, University of California Press, 1968."},{"issue":"10","key":"31_CR11","doi-asserted-by":"publisher","first-page":"747","DOI":"10.1109\/TC.1979.1675242","volume":"28","author":"J. B. Kam","year":"1979","unstructured":"J. B. Kam and G. I. Davida. A structrued design of substitution-permutation encryption networks. IEEE Transactions on Computers, 28(10):747\u2013753, 1979.","journal-title":"IEEE Transactions on Computers"},{"key":"31_CR12","unstructured":"A. Konheim. Cryptography: a primer. Wiley, 1981."},{"key":"31_CR13","first-page":"1119","volume":"47","author":"C. Meyer","year":"1978","unstructured":"C. Meyer. Ciphertext\/plaintext and ciphertext\/key dependence vs. number of rounds for the data encryption standard. In AFIPS Conference proceedings, 47, pages 1119\u20131126, 1978.","journal-title":"AFIPS Conference proceedings"},{"issue":"3","key":"31_CR14","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1007\/BF00190802","volume":"2","author":"C. Mitchell","year":"1990","unstructured":"C. Mitchell. Enumerating boolean functions of cryptographic significance. Journal of Cryptology, 2(3):155\u2013170, 1990.","journal-title":"Journal of Cryptology"},{"key":"31_CR15","doi-asserted-by":"crossref","unstructured":"D. S. Mitrinovic. Analytic Inequalities. Springer-Verlag, 1970.","DOI":"10.1007\/978-3-642-99970-3"},{"key":"31_CR16","series-title":"Technical Report","volume-title":"Enumerating nondegenerate permutations","author":"L. O\u2019Connor","year":"1991","unstructured":"L O\u2019Connor. Enumerating nondegenerate permutations. Technical Report 2527, University of Waterloo, Waterloo, Ontario, Canada, 1991."},{"key":"31_CR17","unstructured":"W. L. Price and D. W. Davies. Security for computer networks. Wiley, 1984."},{"key":"31_CR18","doi-asserted-by":"crossref","unstructured":"R. A. Rueppel. Design and Analysis of Stream Ciphers. Springer-Verlag, 1986.","DOI":"10.1007\/978-3-642-82865-2"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201991"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-46416-6_31.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T20:47:44Z","timestamp":1619556464000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-46416-6_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540546207"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/3-540-46416-6_31","relation":{},"subject":[]}}