{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T16:49:52Z","timestamp":1773766192757,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540551881","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-46766-1_11","type":"book-chapter","created":{"date-parts":[[2007,8,11]],"date-time":"2007-08-11T15:03:27Z","timestamp":1186844607000},"page":"156-171","source":"Crossref","is-referenced-by-count":40,"title":["Differential Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer"],"prefix":"10.1007","author":[{"given":"Eli","family":"Biham","sequence":"first","affiliation":[]},{"given":"Adi","family":"Shamir","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","unstructured":"Eli Biham, Adi Shamir, Differential Cryptanalysis of DES-like Cryptosystems (extended abstract), Advances in cryptology, proceedings of CRYPTO 90, 1990."},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Eli Biham, Adi Shamir, Differential Cryptanalysis of DES-like Cryptosystems, Journal of Cryptology, Vol. 4, No. 1, 1991, to appear.","DOI":"10.1007\/BF00630563"},{"key":"11_CR3","unstructured":"Eli Biham, Adi Shamir, Differential Cryptanalysis of Feal and N-Hash (extended abstract), Advances in cryptology, proceedings of EUROCRYPT 91, 1991."},{"key":"11_CR4","unstructured":"Eli Biham, Adi Shamir, Differential Cryptanalysis of Feal and N-Hash, in preperation."},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Lawrence Brown, Josef Pieprzyk, Jennifer Seberry, LOKI-A Cryptographic Primitive for Authentication and Secrecy Applications, Advances in cryptology, proceedings of AUSCRYPT 90, pp. 229\u2013236, 1990.","DOI":"10.1007\/BFb0030364"},{"key":"11_CR6","unstructured":"Michael C. Wood, technical report, Cryptech inc., Jamestown, NY, July 1990."},{"key":"11_CR7","unstructured":"Thomas W. Cusick, Michael C. Wood, The REDOC-II Cryptosystem, Advances in cryptology, proceedings of CRYPTO 90, 1990."},{"issue":"5","key":"11_CR8","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1038\/scientificamerican0573-15","volume":"228","author":"H. Feistel","year":"1973","unstructured":"H. Feistel, Cryptography and Data Security, Scientific American, Vol. 228, No. 5, pp. 15\u201323, May 1973.","journal-title":"Scientific American"},{"key":"11_CR9","unstructured":"Matthew Kwan, private communications."},{"issue":"1","key":"11_CR10","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/BF00203968","volume":"3","author":"R. C. Merkle","year":"1990","unstructured":"Ralph C. Merkle, A Fast Software One-Way Hash Function, Journal of Cryptology, Vol. 3, No. 1, pp. 43\u201358, 1990.","journal-title":"Journal of Cryptology"},{"key":"11_CR11","unstructured":"Ralph C. Merkle, Fast Software Encryption Functions, Advances in cryptology, proceedings of CRYPTO 90, 1990."},{"issue":"4","key":"11_CR12","first-page":"433","volume":"36","author":"S. Miyaguchi","year":"1988","unstructured":"Shoji Miyaguchi, Akira Shiraishi, Akihiro Shimizu, Fast Data Encryption Algorithm Feal-8, Review of electrical communications laboratories, Vol. 36, No. 4, pp. 433\u2013437, 1988.","journal-title":"Review of electrical communications laboratories"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Akihiro Shimizu, Shoji Miyaguchi. Fast Data Encryption Algorithm Feal, Advances in cryptology, proceedings of EUROCRYPT 87, pp. 267\u2013278, 1987.","DOI":"10.1007\/3-540-39118-5_24"},{"issue":"1","key":"11_CR14","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1080\/0161-118491858746","volume":"8","author":"A. Sorkin","year":"1984","unstructured":"Arthur Sorkin, Lucifer, a Cryptographic Algorithm, Cryptologia, Vol. 8, No. 1, pp. 22\u201341, January 1984.","journal-title":"Cryptologia"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO \u201991"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-46766-1_11.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:13:22Z","timestamp":1605647602000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-46766-1_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540551881"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/3-540-46766-1_11","relation":{},"subject":[]}}