{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T13:35:37Z","timestamp":1726407337744},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540583332"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-48658-5_34","type":"book-chapter","created":{"date-parts":[[2007,8,9]],"date-time":"2007-08-09T20:50:39Z","timestamp":1186692639000},"page":"369-382","source":"Crossref","is-referenced-by-count":0,"title":["Ciphertext Only Attack for One-way function of the MAP using One Ciphertext"],"prefix":"10.1007","author":[{"given":"Yukiyasu","family":"Tsunoo","sequence":"first","affiliation":[]},{"given":"Eiji","family":"Okamoto","sequence":"additional","affiliation":[]},{"given":"Tomohiko","family":"Uyematsu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"34_CR1","unstructured":"Miyaguchi, S.: \u201cCRITERIA FOR THE STRENGTH OF ENCIPHERMENT AND STANDARDIZATION FOR CRYPTOGRAPHIC TECHNIQUES\u201d, Proc. of the 1986 Symposium on Cryptography and Information Security, (1986)."},{"key":"34_CR2","unstructured":"Shimizu, A., Miyaguchi, S.: \u201cFast Data Encipherment Algorithm FEAL\u201d, Advances in Cryptology-EUROCRYPT\u201987, p267\u2013278 (1987)."},{"key":"34_CR3","doi-asserted-by":"crossref","unstructured":"E. Biham, A. Shamir: \u201cDifferential Cryptanalysis of Feal and N-Hash\u201d, Advances in Cryptology-EUROCRYPT\u201991, p1\u201316 (1991).","DOI":"10.1007\/3-540-46416-6_1"},{"key":"34_CR4","unstructured":"H. Gilbert, G. Chasse: \u201cA STATISTICAL ATTACK OF THE FEAL-8 CRYPTOSYSTEM\u201d, Advances in Cryptology-CRYPTO\u201990, p22\u201333 (1990)."},{"key":"34_CR5","unstructured":"A. TARDY-CORFDIR, H. GILBERT: \u201cA KNOWN PLAINTEXT ATTACK OF FEAL-4 AND FEAL-6\u201d, Advances in Cryptology-CRYPTO\u201991, p172\u2013182 (1991)."},{"key":"34_CR6","unstructured":"Kaneko, T.: \u201cA known plaintext cryptanalytic attack on FEAL-4\u201d, IEICE Tech. Report, ISEC91-25 (1991) (in Japanese)."},{"key":"34_CR7","unstructured":"Matsui, M., Yamagishi, A.: \u201cA Study on Known Text Attack of Involution-Type Cryptosystems\u201d, IEICE Tech. Report, ISEC91-26 (1991) (in Japanese)."},{"key":"34_CR8","unstructured":"Tsujii, S., Kasahara, M.: \u201cCryptography and Information Security\u201d Shoh-Kohdo (1990) (in Japanese)."},{"key":"34_CR9","unstructured":"Matsui, K.: \u201cIntroduction of Cryptoanalysis\u201d Morikita Publishing Co. (1990) (in Japanese)."},{"key":"34_CR10","unstructured":"Tsunoo, Y., Okamoto, E., Doi, H.: \u201cAnalytical Known Plain-text Attack for FEAL-4 and Its Improvement\u201d, Proc. of the 1993 Symposium on Cryptography and Information Security, SCIS93-3A (1993) (in Japanese)."},{"key":"34_CR11","unstructured":"Okamoto, E.: \u201cAn Introduction to Theory of Cryptology\u201d Kyoritsu Publishing Co. (1993) (in Japanese)."},{"key":"34_CR12","unstructured":"Kazuo, N.: \u201cCycling closure test of FEAL\u201d IEICE Tech. Report, ISEC90-50 (1990) (in Japanese)."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO \u201994"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48658-5_34.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:16:15Z","timestamp":1605647775000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48658-5_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540583332"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/3-540-48658-5_34","relation":{},"subject":[]}}