{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T08:36:34Z","timestamp":1774946194262,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540576006","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-48285-7_34","type":"book-chapter","created":{"date-parts":[[2007,8,1]],"date-time":"2007-08-01T02:16:46Z","timestamp":1185934606000},"page":"398-409","source":"Crossref","is-referenced-by-count":131,"title":["New Types of Cryptanalytic Attacks Using Related Keys"],"prefix":"10.1007","author":[{"given":"Eli","family":"Biham","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"34_CR1","doi-asserted-by":"crossref","unstructured":"Eli Biham. Adi Shamir. Differential Cryptanalysis of the Data Encryption Standard. Springer-Verlag. 1993.","DOI":"10.1007\/978-1-4613-9314-6"},{"key":"34_CR2","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E. Biham","year":"1991","unstructured":"Eli Biham. Adi Shamir. Differential Cryptanalysis of DES-like Cryptosystems. Journal of Cryptology, Vol. 4. No. 1. pp. 3\u201372. 1991.","journal-title":"Journal of Cryptology"},{"key":"34_CR3","series-title":"Lect Notes Comput Sci","first-page":"156","volume-title":"Advances in Cryptology. proceedings of CRYPT0\u201991","author":"E. Biham","year":"1991","unstructured":"Eli Biham. Adi Shamir, Differential Cryptanalysis of Snefru, Khafre. REDOC-II. LOKI and Lucifer (extended abstract). Lecture Notes in Computer Science. Advances in Cryptology. proceedings of CRYPT0\u201991. pp. 156\u2013171, 1991."},{"key":"34_CR4","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology, proceedings of ASIACRYPT91","author":"L. Brown","year":"1991","unstructured":"Lawrence Brown, Matthew Kwan, Josef Pieprzyk, Jennifer Seberry. Improving Resistance to Differential Cryptanalysis and the Redesign of LOKI, Lecture Notes in Computer Science, Advances in Cryptology, proceedings of ASIACRYPT91, to appear."},{"key":"34_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/BFb0030364","volume-title":"Advances in Cryptology, proceedings of AUSCRYPT\u201990","author":"L. Brown","year":"1990","unstructured":"Lawrence Brown, Josef Pieprzyk, Jennifer Seberry, LOKI-A Cryptographic Primitive for Authentication and Secrecy Applications, Lecture Notes in Computer Science, Advances in Cryptology, proceedings of AUSCRYPT\u201990, pp. 229\u2013236, 1990."},{"key":"34_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/BFb0030363","volume-title":"Advances in Cryptology, proceedings of AUSCRYPT\u201990","author":"L. Brown","year":"1990","unstructured":"Lawrence Brown. Jennifer Seberry, Key Scheduling in DES Type Cryptosystems. Lecture Notes in Computer Science, Advances in Cryptology, proceedings of AUSCRYPT\u201990, pp. 221\u2013228. 1990."},{"key":"34_CR7","unstructured":"M. E. Hellman. R. Merkle, R. Schroppel, L. Washington, W. Diffie. S. Pohlig and P. Schweitzer, Results of an Initial Attempt to Cryptanalyze the NBS Data Encryption Standard, Stanford university, September 1976."},{"key":"34_CR8","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology, proceedings of ASIACRYPT\u201991","author":"L. R. Knudsen","year":"1991","unstructured":"Lars Ramkilde Knudsen, Crypanalysis of LOKI, Lecture Notes in Computer Science, Advances in Cryptology, proceedings of ASIACRYPT\u201991, to appear."},{"key":"34_CR9","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology, proceedings of AUSCRYPT\u201992","author":"L. R. Knudsen","year":"1991","unstructured":"Lars Ramkilde Knudsen, Crypanalysis of LOKI91, Lecture Notes in Computer Science, Advances in Cryptology, proceedings of AUSCRYPT\u201992, to appear."},{"key":"34_CR10","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology, proceedings of ASIACRYPT\u201991","author":"M. Kwan","year":"1991","unstructured":"Matthew Kwan. Josef Pieprzyk, A General Purpose Technique for Locating Key Scheduling Weakness in DES-Like Cryptosystems, Lecture Notes in Computer Science. Advances in Cryptology, proceedings of ASIACRYPT\u201991, to appear."},{"key":"34_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1007\/3-540-46416-6_2","volume-title":"Advances in Cryptology, proceedings of EUROCRYPT\u201991","author":"X. Lai","year":"1991","unstructured":"Xuejia Lai. James L. Massey, Sean Murphy, Markov Ciphers and Differential Cryptanalysis. Lecture Notes in Computer Science, Advances in Cryptology, proceedings of EUROCRYPT\u201991. pp. 17\u201338, 1991."},{"key":"34_CR12","volume-title":"On the Design and Security of Block Ciphers","author":"X. Lai","year":"1992","unstructured":"Xuejia Lai. On the Design and Security of Block Ciphers, Ph.D. thesis. Swiss Federal Institue of Technology, Zurich. 1992."},{"issue":"4","key":"34_CR13","first-page":"433","volume":"36","author":"S. Miyaguchi","year":"1988","unstructured":"Shoji Miyaguchi. Akira Shiraishi, Akihiro Shimizu, Fast Data Encryption Algorithm FEAL-8, Review of electrical communications laboratories. Vol. 36. No. 4. pp. 433\u2013437. 1988.","journal-title":"Review of electrical communications laboratories"},{"key":"34_CR14","unstructured":"National Bureau of Standards, Data Encryption Standard, U.S. Department of Commerce, FIPS pub. 46, January 1977."},{"key":"34_CR15","series-title":"Lect Notes Comput Sci","first-page":"267","volume-title":"Advances in Cryptology, proceedings of EUROCRYPT\u201987","author":"A. Shimizu","year":"1987","unstructured":"Akihiro Shimizu, Shoji Miyaguchi, Fast Data Encryption Algorithm FEAL, Lecture Notes in Computer Science, Advances in Cryptology, proceedings of EUROCRYPT\u201987, pp. 267\u2013278, 1987."},{"key":"34_CR16","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1080\/0161-118491858746","volume":"8","author":"A. Sorkin","year":"1984","unstructured":"Arthur Sorkin. Lucifer, a Cryptographic Algorithm, Cryptologia, Vol. 8, No. 1, pp. 22\u201341, January 1984.","journal-title":"Cryptologia"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201993"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48285-7_34.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,28]],"date-time":"2021-04-28T00:50:31Z","timestamp":1619571031000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48285-7_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540576006"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/3-540-48285-7_34","relation":{},"subject":[]}}