{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T16:31:35Z","timestamp":1759336295160},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540576006"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-48285-7_31","type":"book-chapter","created":{"date-parts":[[2007,8,1]],"date-time":"2007-08-01T02:16:46Z","timestamp":1185934606000},"page":"360-370","source":"Crossref","is-referenced-by-count":31,"title":["On the Distribution of Characteristics in Bijective Mappings"],"prefix":"10.1007","author":[{"given":"Luke","family":"O\u2019Connor","sequence":"first","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"31_CR1","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E. Biham","year":"1991","unstructured":"E. Biham and A. Shamir. Differential cryptanalysis of DES-like cryptosystems. Journal of Cryptology, 4(1):3\u201372, 1991.","journal-title":"Journal of Cryptology"},{"key":"31_CR2","series-title":"Technical Report","volume-title":"Differential cryptanalysis of the full 16-round DES","author":"E. Biham","year":"1991","unstructured":"E. Biham and A. Shamir. Differential cryptanalysis of the full 16-round DES. Technical Report 708, Technion, Israel Institute of Technology, Haifa. Israel, 1991."},{"key":"31_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1007\/3-540-46766-1_11","volume-title":"Advances in Cryptology, CRYPTO 91","author":"E. Biham","year":"1992","unstructured":"E. Biham and A. Shamir. Differential cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and LUCIFER. Advances in Cryptology, CRYPTO 91, Lecture Notes in Computer Science, vol. 576, J. Feigenbaum ed., Springer-Verlag, pages 156\u2013171, 1992."},{"key":"31_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/BFb0030364","volume-title":"Advances in Cryptology, A USCRYPT 90","author":"L. P. Brown","year":"1990","unstructured":"L. P. Brown, J. Pieprzyk, and J. Seberry. LOKI-a cryptographic primitive for authentication and secrecy applications. Advances in Cryptology, A USCRYPT 90, Lecture Notes in Computer Science, vol. 453, J. Seberry and J. Pieprzyk eds., Springer-Verlag, pages 229\u2013236, 1990."},{"key":"31_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1007\/3-540-38424-3_38","volume-title":"Advances in Cryptology, CRYPTO 90","author":"T. Cusick","year":"1991","unstructured":"T. Cusick and M. Wood. The REDOC-II cryptosystem. Advances in Cryptology, CRYPTO 90, Lecture Notes in Computer Science, vol. 537, A. J. Menezes and S. A. Vanstone ed., Springer-Verlag, pages 545\u2013563, 1991."},{"issue":"5","key":"31_CR6","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1038\/scientificamerican0573-15","volume":"228","author":"H. Feistel","year":"1973","unstructured":"H. Feistel. Cryptography and computer privacy. Scientific American, 228(5):15\u201323, 1973.","journal-title":"Scientific American"},{"key":"31_CR7","doi-asserted-by":"crossref","unstructured":"J. Gordon and H. Retkin. Are big S-boxes best? In T. Beth, editor, Cryptography, proceedings, Burg Feuerstein, pages 257\u2013262, 1982.","DOI":"10.1007\/3-540-39466-4_18"},{"key":"31_CR8","unstructured":"M. Hall. Combinatorial Theory. Blaisdell Publishing Company, 1967."},{"issue":"10","key":"31_CR9","doi-asserted-by":"publisher","first-page":"747","DOI":"10.1109\/TC.1979.1675242","volume":"28","author":"J. B. Kam","year":"1979","unstructured":"J. B. Kam and G. I. Davida. A structured design of substitution-permutation encryption networks. IEEE Transactions on Computers, 28(10):747\u2013753, 1979.","journal-title":"IEEE Transactions on Computers"},{"key":"31_CR10","unstructured":"X. Lai. On the design and security of block ciphers. ETH Series in Information Processing, editor J. Massey, Hartung-Gorre Verlag Konstanz, 1992."},{"key":"31_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1007\/3-540-46416-6_2","volume-title":"Advances in Cryptology, EUROCRYPT 91","author":"X. Lai","year":"1991","unstructured":"X. Lai, J. Massey, and S. Murphy. Markov ciphers and differential analysis. In Advances in Cryptology, EUROCRYPT 91, Lecture Notes in Computer Science, vol. 547, D. W. Davies ed., Springer-Verlag, pages 17\u201338, 1991."},{"key":"31_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1007\/3-540-46877-3_35","volume-title":"Advances in Cryptology, EUROCRYPT 90","author":"X. Lai","year":"1991","unstructured":"X. Lai and J. L. Massey. A proposal for a new block encryption standard. In Advances in Cryptology, EUROCRYPT 90, Lecture Notes in Computer Science, vol. 473, I. B. Damg\u00e5rd ed., Springer-Verlag, pages 389\u2013404, 1991."},{"key":"31_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"476","DOI":"10.1007\/3-540-38424-3_34","volume-title":"Advances in Cryptology, CRYPTO 90","author":"R. Merkle","year":"1991","unstructured":"R. Merkle. Fast software encryption functions. Advances in Cryptology, CRYPTO 90, Lecture Notes in Computer Science, vol. 537, A. J. Menezes and S. A. Vanstone ed., Springer-Verlag, pages 476\u2013501, 1991."},{"key":"31_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"368","DOI":"10.1007\/3-540-46416-6_31","volume-title":"Advances in Cryptology, EUROCRYPT 91","author":"L. J. O\u2019Connor","year":"1991","unstructured":"L. J. O\u2019Connor. Enumerating nondegenerate permutations. Advances in Cryptology, EUROCRYPT 91, Lecture Notes in Computer Science, vol. 547, D. W. Davies ed., Springer-Verlag, pages 368\u2013377, 1991."},{"key":"31_CR15","unstructured":"E. M. Reingold, J. Nievergeld, and N. Deo. Combinatorial Algorithms: Theory and Practice. Prentice-Hall, 1976."},{"key":"31_CR16","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C. E. Shannon","year":"1949","unstructured":"C. E. Shannon. Communication theory of secrecy systems. Bell System Technical Journal, 28:656\u2013175, 1949.","journal-title":"Bell System Technical Journal"},{"key":"31_CR17","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1007\/3-540-39118-5_24","volume-title":"Advances in Cryptology, EUROCRYPT 87","author":"A. Shimizu","year":"1988","unstructured":"A. Shimizu and S. Miyaguchi. Fast data encipherment algorithm FEAL. Advances in Cryptology, EUROCRYPT 87, Lecture Notes in Computer Science, vol. 304, D. Chaum and W. L. Price eds., Springer-Verlag, pages 267\u2013278, 1988."},{"issue":"2","key":"31_CR18","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1080\/0161-118291856948","volume":"6","author":"N. J. A. Sloane","year":"1982","unstructured":"N. J. A. Sloane. Error correcting codes and cryptography, part 1. Cryptologia, 6(2):128\u2013153, 1982.","journal-title":"Cryptologia"},{"issue":"1","key":"31_CR19","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1080\/0161-118491858746","volume":"8","author":"A. Sorkin","year":"1984","unstructured":"A. Sorkin. LUCIFER: a cryptographic algorithm. Cryptologia, 8(1):22\u201335, 1984.","journal-title":"Cryptologia"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201993"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48285-7_31.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,28]],"date-time":"2021-04-28T00:50:30Z","timestamp":1619571030000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48285-7_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540576006"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/3-540-48285-7_31","relation":{},"subject":[]}}