{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:32:05Z","timestamp":1725489125647},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540551881"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-46766-1_13","type":"book-chapter","created":{"date-parts":[[2007,8,11]],"date-time":"2007-08-11T15:03:27Z","timestamp":1186844607000},"page":"183-193","source":"Crossref","is-referenced-by-count":11,"title":["A switching closure test to analyze cryptosystems"],"prefix":"10.1007","author":[{"given":"Hikaru","family":"Morita","sequence":"first","affiliation":[]},{"given":"Kazuo","family":"Ohta","sequence":"additional","affiliation":[]},{"given":"Shoji","family":"Miyaguchi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"6","key":"13_CR1","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/C-M.1977.217750","volume":"10","author":"W. Diffie","year":"1977","unstructured":"W. Diffie and M. E. Hellman: \u201cExhaustive Cryptanalysis of the NBS Data Encryption Standard,\u201d Computer, 10,6, pp.74\u201384, June 1977.","journal-title":"Computer"},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"P. Flajolet and A. M. Odlyzko: \u201cRandom Mapping Statistics,\u201d Advances in Cryptology-EUROCRYPT\u201989, Proceedings, pp.329\u2013354, Springer-Verlag, 1990.","DOI":"10.1007\/3-540-46885-4_34"},{"issue":"1","key":"13_CR3","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00206323","volume":"1","author":"B. S. Kaliski Jr.","year":"1988","unstructured":"B. S. Kaliski Jr., R. L. Rivest, and A. T. Sherman: \u201cIs the Data Encryption Standard a Group? (Results of Cycling Experiments on DES),\u201d J. Cryptology, 1,1, pp.3\u201336, 1988.","journal-title":"J. Cryptology"},{"key":"13_CR4","unstructured":"D. E. Knuth: Exercise 3.1 No. 7, \u201cThe Art of Computer Programming 2nd ed. (Seminumerical Algorithms),\u201d Addison-Wesley, 1981."},{"key":"13_CR5","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1016\/S0022-0000(76)80043-8","volume":"13","author":"G. L. Miller","year":"1976","unstructured":"G. L. Miller: \u201cRiemann\u2019s hypothesis and tests for primality,\u201d J. Computer and System Science, 13, pp.300\u2013317, 1976.","journal-title":"J. Computer and System Science"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"J.-J. Quisquater and J.-P. Delescaille: \u201cHow Easy is Collision Search. New Results and Applications to DES,\u201d Advances in Cryptology-CRYPTO\u201989, Proceedings, pp.408\u2013413, Springer-Verlag, 1990.","DOI":"10.1007\/0-387-34805-0_38"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"R. L. Rivest, A. Shamir, and L. Adleman: \u201cA Method of Obtaining Digital Signatures and Public Key Cryptosystems,\u201d Comm. of ACM, pp.120\u2013126, Feb. 1978.","DOI":"10.1145\/359340.359342"},{"issue":"2","key":"13_CR8","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1137\/0211030","volume":"11","author":"R. Sedgewick","year":"1982","unstructured":"R. Sedgewick, T. G. Szymanski, and A. C. Yao: \u201cThe Complexity of Finding Cycles in Periodic Functions,\u201d SIAM J. Comp., 11,2, pp.376\u2013390, May 1982.","journal-title":"SIAM J. Comp."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO \u201991"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-46766-1_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:13:22Z","timestamp":1605647602000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-46766-1_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540551881"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/3-540-46766-1_13","relation":{},"subject":[]}}