{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:26:24Z","timestamp":1725488784221},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540583332"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-48658-5_2","type":"book-chapter","created":{"date-parts":[[2007,8,9]],"date-time":"2007-08-09T20:50:39Z","timestamp":1186692639000},"page":"12-16","source":"Crossref","is-referenced-by-count":2,"title":["Linear Cryptanalysis of the Fast Data Encipherment Algorithm"],"prefix":"10.1007","author":[{"given":"Kazuo","family":"Ohta","sequence":"first","affiliation":[]},{"given":"Kazumaro","family":"Aoki","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","unstructured":"E. Biham, \u201cOn Matsui\u2019s Linear Cryptanalysis,\u201d EUROCRYPT\u201994"},{"key":"2_CR2","unstructured":"A. Tardy-Corfdir and H. Gilbert, \u201cA known plaintext attack of FEAL-4 and FEAL-6,\u201d CRYPTO\u201991"},{"key":"2_CR3","unstructured":"M. Matsui, \u201cLinear Cryptanalysis Method for DES Cipher,\u201d EUROCRYPT\u201993"},{"key":"2_CR4","unstructured":"M. Matsui, \u201cOn Correlation between the Order of S-Boxes and the strength of DES,\u201d EUROCRYPT\u201994"},{"key":"2_CR5","unstructured":"M. Matsui and A. Yamagishi, \u201cA New Method for Known Plaintext Attack of FEAL Cipher,\u201d EUROCRYPT\u201992"},{"key":"2_CR6","unstructured":"S. Miyaguchi, A. Shiraishi and A. Shimizu, \u201cFast Data Encipherment algorithm FEAL-8,\u201d Review of Electrical Communication Laboratories, Vol. 36, No. 4, 1988"},{"key":"2_CR7","unstructured":"K. Ohta and K. Aoki, \u201cLinear Cryptanalysis of the Fast Data Encipherment Algorithm,\u201d Technical Report of IEICE Japan, ISEC94-5, May, 1994 (which contains more information than this paper.)"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO \u201994"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48658-5_2.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:16:10Z","timestamp":1605647770000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48658-5_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540583332"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/3-540-48658-5_2","relation":{},"subject":[]}}