{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T13:01:34Z","timestamp":1773406894336,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540662266","type":"print"},{"value":"9783540485193","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/3-540-48519-8_2","type":"book-chapter","created":{"date-parts":[[2007,10,24]],"date-time":"2007-10-24T21:34:55Z","timestamp":1193261695000},"page":"16-30","source":"Crossref","is-referenced-by-count":22,"title":["Linear Cryptanalysis of RC5 and RC6"],"prefix":"10.1007","author":[{"given":"Johan","family":"Borst","sequence":"first","affiliation":[]},{"given":"Bart","family":"Preneel","sequence":"additional","affiliation":[]},{"given":"Joos","family":"Vandewalle","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,5,18]]},"reference":[{"key":"2_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1007\/BFb0054119","volume-title":"Proc. Eurocrypt\u2019 98","author":"A. Biryukov","year":"1998","unstructured":"A. Biryukov, E. Kushilevitz, \u201cImproved Cryptanalysis of RC5, \u201d Proc. Eurocrypt\u2019 98, LNCS 1403, Springer-Verlag, 1998, pp. 85\u201399."},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"E. Biham, A. Shamir, Differential Cryptanalysis of the Data Encryption Standard, Springer-Verlag, 1993.","DOI":"10.1007\/978-1-4613-9314-6"},{"key":"2_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/BFb0052331","volume-title":"Fast Software Encryption","author":"C. Harpes","year":"1997","unstructured":"C. Harpes, J.L. Massey, \u201cPartitioning Cryptanalysis, \u201d Fast Software Encryption, LNCS 1267, Springer-Verlag, 1997, pp. 13\u201327."},{"key":"2_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1007\/3-540-68697-5_17","volume-title":"Proc. Crypto\u201996","author":"L.R. Knudsen","year":"1996","unstructured":"L.R. Knudsen, W. Meier, \u201cImproved Differential Attacks on RC5,\u201d Proc. Crypto\u201996, LNCS 1109, Springer-Verlag, 1996, pp. 216\u2013228."},{"key":"2_CR5","series-title":"Lect Notes Comput Sci","first-page":"26","volume-title":"Proc. Eurocrypt\u201994","author":"B.S. Kaliski","year":"1995","unstructured":"B.S. Kaliski, M.J.B. Robshaw, \u201cLinear Cryptanalysis Using Multiple Approximations,\u201d Proc. Eurocrypt\u201994, LNCS 950, Springer-Verlag, 1995, pp. 26\u201339."},{"key":"2_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1007\/3-540-44750-4_14","volume-title":"Proc. Crypto\u201995","author":"B.S. Kaliski","year":"1995","unstructured":"B.S. Kaliski, Y.L. Yin, \u201cOn Differential and Linear Cryptanalysis of the RC5 Encryption Algorithm,\u201d Proc. Crypto\u201995, LNCS 963, Springer-Verlag, 1995, pp. 171\u2013184."},{"key":"2_CR7","unstructured":"B.S. Kaliski, Y.L. Yin, \u201cOn the Security of the RC5 Encryption Algorithm,\u201d RSA Laboratories Technical Report TR-602, Version 1.0, September 1998, available via http:\/\/www.rsa.com\/rsalabs\/aes ."},{"key":"2_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume-title":"Proc. Eurocrypt\u201993","author":"M. Matsui","year":"1994","unstructured":"M. Matsui, \u201cLinear cryptanalysis method for DES cipher,\u201d Proc. Eurocrypt\u201993, LNCS 765, Springer-Verlag, 1994, pp. 386\u2013397."},{"key":"2_CR9","series-title":"Lect Notes Comput Sci","first-page":"1","volume-title":"Proc. Crypto\u201994","author":"M. Matsui","year":"1994","unstructured":"M. Matsui, \u201cThe first experimental cryptanalysis of the Data Encryption Standard,\u201d Proc. Crypto\u201994, LNCS 839, Springer-Verlag, 1994, pp. 1\u201311."},{"key":"2_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"439","DOI":"10.1007\/BFb0053460","volume-title":"Proc. Eurocrypt\u201994","author":"K. Nyberg","year":"1995","unstructured":"K. Nyberg, \u201cLinear Approximations of Block Ciphers,\u201d Proc. Eurocrypt\u201994, LNCS 950, Springer-Verlag, 1995, pp. 439\u2013444."},{"key":"2_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1007\/3-540-60590-8_7","volume-title":"Fast Software Encryption","author":"R.L. Rivest","year":"1995","unstructured":"R.L. Rivest, \u201cThe RC5 Encryption Algorithm,\u201d Fast Software Encryption, LNCS 1008, Springer-Verlag, 1995, pp. 86\u201396."},{"key":"2_CR12","unstructured":"R.L. Rivest, M.J.B. Robshaw, R. Sidney, Y.L. Yin, \u201cThe RC6 Block Cipher. v1.1,\u201d AES Proposal, 1998, available via http:\/\/www.rsa.com\/rsalabs\/aes ."},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"S. Contini, R.L. Rivest, M.J.B. Robshaw, Y.L. Yin, \u201cThe Security of the RC6 Block Cipher. v1.0,\u201d 1998, available via http:\/\/www.rsa.com\/rsalabs\/aes .","DOI":"10.1007\/3-540-48519-8_1"},{"key":"2_CR14","unstructured":"S. Contini, R.L. Rivest, M.J.B. Robshaw, Y.L. Yin, \u201cLinear Hulls and RC6 (DRAFT),\u201d September, 1998."},{"key":"2_CR15","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-69710-1_1","volume-title":"Fast Software Encryption","author":"A.A. Sel\u00e7cuk","year":"1998","unstructured":"A.A. Sel\u00e7cuk, \u201cNew Results in Linear Cryptanalysis of RC5,\u201d Fast Software Encryption, LNCS 1372, Springer-Verlag, 1998, pp. 1\u201316."},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"S. Vaudenay, \u201cAn Experiment on DES-Statistical Cryptanalysis,\u201d Proc. 3rd ACM Conference on Computer Security, ACM Press, 1996, pp. 139\u2013147.","DOI":"10.1145\/238168.238206"}],"container-title":["Lecture Notes in Computer Science","Fast Software Encryption"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48519-8_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,4]],"date-time":"2019-05-04T00:03:17Z","timestamp":1556928197000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48519-8_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540662266","9783540485193"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/3-540-48519-8_2","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[1999]]}}}