{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T15:54:36Z","timestamp":1774022076807,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":4,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540535874","type":"print"},{"value":"9783540468776","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1991]]},"DOI":"10.1007\/3-540-46877-3_29","type":"book-chapter","created":{"date-parts":[[2007,9,2]],"date-time":"2007-09-02T21:34:21Z","timestamp":1188768861000},"page":"318-325","source":"Crossref","is-referenced-by-count":39,"title":["A Known-Plaintext Attack on Two-Key Triple Encryption"],"prefix":"10.1007","author":[{"given":"Paul C.","family":"van Oorschot","sequence":"first","affiliation":[]},{"given":"Michael J.","family":"Wiener","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,5,18]]},"reference":[{"issue":"7","key":"29_CR1","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1145\/358699.358718","volume":"24","author":"R. Merkle","year":"1981","unstructured":"Merkle, R. and M. Hellman, \u201cOn the Security of Multiple Encryption\u201d, Communications of the ACM, vol. 24, no. 7, pp. 465\u2013467, July 1981. See also Communications of the ACM, vol. 24, no. 11, p. 776, November 1981.","journal-title":"Communications of the ACM"},{"issue":"6","key":"29_CR2","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/C-M.1977.217750","volume":"10","author":"W. Diffie","year":"1977","unstructured":"Diffie, W. and M. Hellman, \u201cExhaustive Cryptanalysis of the NBS Data Encryption Standard\u201d, Computer, vol. 10, no. 6, pp. 74\u201384, June 1977.","journal-title":"Computer"},{"key":"29_CR3","unstructured":"\u201cData Encryption Standard\u201d, National Bureau of Standards (U.S.), Federal Information Processing Standards Publication (FIPS PUB) 46, National Technical Information Service, Springfield VA, 1977."},{"key":"29_CR4","unstructured":"Internal study, BNR, Ottawa, 1989."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201990"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-46877-3_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,23]],"date-time":"2019-02-23T05:35:42Z","timestamp":1550900142000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-46877-3_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1991]]},"ISBN":["9783540535874","9783540468776"],"references-count":4,"URL":"https:\/\/doi.org\/10.1007\/3-540-46877-3_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[1991]]}}}