{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,19]],"date-time":"2025-04-19T05:08:12Z","timestamp":1745039292515},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540662266"},{"type":"electronic","value":"9783540485193"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/3-540-48519-8_22","type":"book-chapter","created":{"date-parts":[[2007,10,24]],"date-time":"2007-10-24T17:34:55Z","timestamp":1193247295000},"page":"305-316","source":"Crossref","is-referenced-by-count":13,"title":["SOBER Cryptanalysis"],"prefix":"10.1007","author":[{"given":"Daniel","family":"Bleichenbacher","sequence":"first","affiliation":[]},{"given":"Sarvar","family":"Patel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,5,18]]},"reference":[{"key":"22_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"398","DOI":"10.1007\/3-540-48285-7_34","volume-title":"Advances in Cryptology-EUROCRYPT\u201993","author":"E. Biham","year":"1994","unstructured":"E. Biham. New types of cryptanalytic attacks using related keys. In T. Helleseth, editor, Advances in Cryptology-EUROCRYPT\u201993, volume 765 of Lecture Notes in Computer Science, pages 398\u2013409, Berlin, 1994. Springer Verlag."},{"key":"22_CR2","doi-asserted-by":"crossref","unstructured":"E. Biham and A. Shamir. A Differential Cryptanalysis of the Data Encryption Standard. Springer-Verlag, 1993.","DOI":"10.1007\/978-1-4613-9314-6"},{"key":"22_CR3","doi-asserted-by":"crossref","unstructured":"G. Rose. A stream cipher based on linear feedback over GF(28). In C. Boyd and E. Dawson, editors, ACISP\u201998, Australian Conference on Information Security and Privacy, volume 1438, page Lecture Notes in Computer Science. Springer Verlag, July 1998.","DOI":"10.1007\/BFb0053728"},{"key":"22_CR4","doi-asserted-by":"crossref","unstructured":"G. Rose. SOBER: A stream cipher based on linear feedback over GF(28). (preprint), 1999.","DOI":"10.1007\/BFb0053728"},{"key":"22_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"526","DOI":"10.1007\/BFb0052260","volume-title":"CRYPTO\u201997","author":"D. Wagner","year":"1997","unstructured":"D. Wagner, B. Schneier, and J. Kelsey. Cryptanalysis of the cellular message encryption algorithm. In B. S. Kaliski, editor, CRYPTO\u201997, volume 1294 of Lecture Notes in Computer Science, pages 526\u2013537. Springer Verlag, 1997."},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"D. Wagner, L. Simpson, E. Dawson, J. Kelsey, W. Millan, and B. Schneier. Cryptanalysis of ORYX. In Fifth Annual Workshop on Selected Areas in Cryptography, SAC\u201999, 1998.","DOI":"10.1007\/3-540-48892-8_23"}],"container-title":["Lecture Notes in Computer Science","Fast Software Encryption"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48519-8_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,3]],"date-time":"2019-05-03T20:03:10Z","timestamp":1556913790000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48519-8_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540662266","9783540485193"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/3-540-48519-8_22","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1999]]}}}