{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T15:34:29Z","timestamp":1753889669550},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540577669"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-48329-2_34","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T01:25:55Z","timestamp":1186363555000},"page":"403-412","source":"Crossref","is-referenced-by-count":6,"title":["On the Distribution of Characteristics in Composite Permutations"],"prefix":"10.1007","author":[{"given":"Luke","family":"O\u2019Connor","sequence":"first","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"34_CR1","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E. Biham","year":"1991","unstructured":"E. Biham and A. Shamir. Differential cryptanalysis of DES-like cryptosystems. Journal of Cryptology, 4(1):3\u201372, 1991.","journal-title":"Journal of Cryptology"},{"key":"34_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1007\/3-540-46766-1_11","volume-title":"Advances in Cryptology, CRYPTO 91","author":"E. Biham","year":"1992","unstructured":"E. Biham and A. Shamir. Differential cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and LUCIFER. Advances in Cryptology, CRYPTO 91, Lecture Notes in Computer Science, vol. 576, J. Feigenbaum ed., Springer-Verlag, pages 156\u2013171, 1992."},{"key":"34_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/BFb0030364","volume-title":"Advances in Cryptology, AUSCRYPT 90","author":"L. P. Brown","year":"1990","unstructured":"L. P. Brown, J. Pieprzyk, and J. Seberry. LOKI-a cryptographic primitive for authentication and secrecy applications. Advances in Cryptology, AUSCRYPT 90, Lecture Notes in Computer Science, vol. 453, J. Seberry and J. Pieprzyk eds., Springer-Verlag, pages 229\u2013236, 1990."},{"key":"34_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1007\/3-540-38424-3_38","volume-title":"Advances in Cryptology, CRYPTO 90","author":"T. Cusick","year":"1991","unstructured":"T. Cusick and M. Wood. The REDOC-II cryptosystem. Advances in Cryptology, CRYPTO 90, Lecture Notes in Computer Science, vol. 537, A. J. Menezes and S. A. Vanstone ed., Springer-Verlag, pages 545\u2013563, 1991."},{"key":"34_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"352","DOI":"10.1007\/3-540-46416-6_30","volume-title":"Advances in Cryptology, EUROCRYPT 91","author":"M. H. Dawson","year":"1991","unstructured":"M. H. Dawson and S. E. Tavares. An expanded set of S-box design criteria based on information theory and its relation to differential-like attacks. Advances in Cryptology, EUROCRYPT 91, Lecture Notes in Computer Science, vol. 547, D. W. Davies ed., Springer-Verlag, pages 352\u2013367, 1991."},{"key":"34_CR6","unstructured":"W. Feller. An Introduction to Probability Theory with Applications. John Wiley and Sons, 3rd edition, Volume 1, 1968."},{"key":"34_CR7","doi-asserted-by":"crossref","unstructured":"R. L. Graham, D. E. Knuth, and O. Patshnik. Concrete Mathematics, A Foundation for Computer Science. Addison Wesley, 1989.","DOI":"10.1063\/1.4822863"},{"key":"34_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1007\/3-540-46877-3_35","volume-title":"Advances in Cryptology, EUROCRYPT 90","author":"X. Lai","year":"1991","unstructured":"X. Lai and J. L. Massey. A proposal for a new block encryption standard. In Advances in Cryptology, EUROCRYPT 90, Lecture Notes in Computer Science, vol. 473, I. B. Damg\u00e5rd ed., Springer-Verlag, pages 389\u2013404, 1991."},{"key":"34_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"476","DOI":"10.1007\/3-540-38424-3_34","volume-title":"Advances in Cryptology, CRYPTO 90","author":"R. Merkle","year":"1991","unstructured":"R. Merkle. Fast software encryption functions. Advances in Cryptology, CRYPTO 90, Lecture Notes in Computer Science, vol. 537, A. J. Menezes and S. A. Vanstone ed., Springer-Verlag, pages 476\u2013501, 1991."},{"key":"34_CR10","unstructured":"L. J. O\u2019Connor. On the distribution of characteristics in bijective mappings, presented at Eurocrypt 93, Norway, May 1993. Also accepted for publication in the Journal of Cryptology."},{"key":"34_CR11","unstructured":"L. J. O\u2019Connor. An analysis of product ciphers using boolean functions. PhD thesis, Department of Computer Science, University of Waterloo, 1992."},{"key":"34_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1007\/3-540-39118-5_24","volume-title":"Advances in Cryptology, EUROCRYPT 87","author":"A. Shimizu","year":"1988","unstructured":"A. Shimizu and S. Miyaguchi. Fast data encipherment algorithm FEAL. Advances in Cryptology, EUROCRYPT 87, Lecture Notes in Computer Science, vol. 304, D. Chaum and W. L. Price eds., Springer-Verlag, pages 267\u2013278, 1988."},{"issue":"1","key":"34_CR13","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1080\/0161-118491858746","volume":"8","author":"A. Sorkin","year":"1984","unstructured":"A. Sorkin. LUCIFER: a cryptographic algorithm. Cryptologia, 8(1):22\u201335, 1984.","journal-title":"Cryptologia"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO\u2019 93"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48329-2_34.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:15:41Z","timestamp":1605647741000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48329-2_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540577669"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/3-540-48329-2_34","relation":{},"subject":[]}}