{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T08:12:59Z","timestamp":1771488779376,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540573401","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-48071-4_35","type":"book-chapter","created":{"date-parts":[[2007,8,5]],"date-time":"2007-08-05T21:23:49Z","timestamp":1186349029000},"page":"497-511","source":"Crossref","is-referenced-by-count":19,"title":["Iterative Characteristics of DES and s2-DES"],"prefix":"10.1007","author":[{"given":"Lars Ramkilde","family":"Knudsen","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"35_CR1","doi-asserted-by":"crossref","unstructured":"Eli Biham, Adi Shamir. Differential Cryptanalysis of DES-like Cryptosystems. Journal of Cryptology, Vol. 4 No. 1 1991.","DOI":"10.1007\/BF00630563"},{"key":"35_CR2","unstructured":"Eli Biham, Adi Shamir. Differential Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer. Extended abstract appears in Advances in Cryptology, proceedings of CRYPTO 91."},{"key":"35_CR3","unstructured":"Eli Biham, Adi Shamir. Differential Cryptanalysis of the full 16-round DES. Technical Report # 708, Technion-Israel Institute of Technology."},{"key":"35_CR4","unstructured":"Eli Biham, Adi Shamir. Differential Cryptanalysis of Feal and N-Hash. Extended abstract appears in Advances in Cryptology, proceedings of Euro-Crypt 91."},{"key":"35_CR5","unstructured":"Y. Desmedt, J-J. Quisquater, M. Davio. Dependence of output on input in DES: Small avalanche characteristics. Advances in Cryptology: Proceedings of CRYPTO 84. Springer Verlag, Lecture Notes 196."},{"key":"35_CR6","unstructured":"Kwangjo Kim. Construction of DES-like S-boxes Based on Boolean Functions Satisfying the SAC. To appear in the proceedings from ASIACRYPT\u201991, Lecture Notes, Springer Verlag."},{"key":"35_CR7","unstructured":"Lars Ramkilde Knudsen. Cryptanalysis of LOKI. To appear in the proceedings from ASIACRYPT\u201991, Lecture Notes, Springer Verlag."},{"key":"35_CR8","unstructured":"Xueija Lai, James L. Massey, Sean Murphy. Markov Ciphers and Differential Cryptanalysis. Advances in Cryptology-EUROCRYPT\u201991. Springer Verlag, Lecture Notes 547."},{"key":"35_CR9","doi-asserted-by":"crossref","unstructured":"Lawrence Brown, Josef Pieprzyk, Jennifer Seberry. LOKI-A Cryptographic Primitive for Authentication and Secrecy Applications. Advances in Cryptology-AUSCRYPT\u2019 90. Springer Verlag, Lecture Notes 453, pp. 229\u2013236, 1990.","DOI":"10.1007\/BFb0030364"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO\u2019 92"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48071-4_35.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T16:15:19Z","timestamp":1605629719000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48071-4_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540573401"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/3-540-48071-4_35","relation":{},"subject":[]}}