{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T16:35:09Z","timestamp":1774370109644,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540564133","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-47555-9_6","type":"book-chapter","created":{"date-parts":[[2007,8,8]],"date-time":"2007-08-08T23:23:49Z","timestamp":1186615429000},"page":"71-80","source":"Crossref","is-referenced-by-count":22,"title":["Differential Cryptanalysis Mod 232 with Applications to MD5"],"prefix":"10.1007","author":[{"given":"Thomas A.","family":"Berson","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","unstructured":"Lawrence Brown, Matthew Kwan, Josef Pieprzyk and Jennifer Seberry, \u201cImproving Resistance to Differential Cryptanalysis and the Redesign of LOKI,\u201d in Asiacrypt\u2019 91 Abstracts, pp. 25\u201330."},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Eli Biham and Adi Shamir, \u201cDifferential Analysis of DES-like Cryptosystems,\u201d in Advances in Cryptology \u2014 Crypto\u2019 90, pp. 2\u201321.","DOI":"10.1007\/3-540-38424-3_1"},{"issue":"1","key":"6_CR3","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E. Biham","year":"1991","unstructured":"Eli Biham and Adi Shamir, \u201cDifferential Analysis of DES-like Cryptosystems,\u201d Journal of Cryptology (1991) 4:1, pp. 3\u201372.","journal-title":"Journal of Cryptology"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Eli Biham and Adi Shamir, \u201cDifferential Analysis of FEAL and N-Hash,\u201d in Advances in Cryptology \u2014 Eurocrypt\u2019 91, pp. 1\u201316.","DOI":"10.1007\/3-540-46416-6_1"},{"key":"6_CR5","unstructured":"Eli Biham and Adi Shamir, \u201cDifferential Analysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer,\u201d in Advances in Cryptology \u2014 Crypto\u2019 91."},{"key":"6_CR6","unstructured":"Lars Ramkilde Knudsen, \u201cCryptanalysis of LOKI,\u201d in Asiacrypt\u2019 91 Abstracts, pp. 19\u201324."},{"key":"6_CR7","unstructured":"Xeujia Lai, James L. Massey and Sean Murphey, \u201cMarkov Ciphers and Differential Cryptanalysis,\u201d in Advances in Cryptology \u2014 Eurocrypt\u2019 91, pp. 17\u201338."},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"R. Rivest and S. Dusse, \u201cThe MD5 Message-Digest Algorithm,\u201d Network Working Group Internet Draft, RSA Data Security Inc., 10 July 1991.","DOI":"10.17487\/rfc1321"},{"key":"6_CR9","unstructured":"Ronald Rivest, \u201cMD5\u201d, presentation at Crypto\u2019 91 rump session."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT\u2019 92"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-47555-9_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:14:06Z","timestamp":1605647646000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-47555-9_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540564133"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/3-540-47555-9_6","relation":{},"subject":[]}}