{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T13:01:18Z","timestamp":1772283678441,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540583332","type":"print"},{"value":"9783540486589","type":"electronic"}],"license":[{"start":{"date-parts":[[1994,1,1]],"date-time":"1994-01-01T00:00:00Z","timestamp":757382400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1994]]},"DOI":"10.1007\/3-540-48658-5_4","type":"book-chapter","created":{"date-parts":[[2007,8,9]],"date-time":"2007-08-09T20:50:39Z","timestamp":1186692639000},"page":"26-39","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":103,"title":["Linear Cryptanalysis Using Multiple Approximations"],"prefix":"10.1007","author":[{"suffix":"Jr.","given":"Burton S.","family":"Kaliski","sequence":"first","affiliation":[]},{"given":"M. J. B.","family":"Robshaw","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,13]]},"reference":[{"key":"4_CR1","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4613-9314-6","volume-title":"Differential Cryptanalysis of the Data Encryption Standard","author":"E. Biham","year":"1993","unstructured":"E. Biham and A. Shamir. Differential Cryptanalysis of the Data Encryption Standard. Springer-Verlag, New York, 1993."},{"key":"4_CR2","volume-title":"Fundamentals of Applied Probability Theory","author":"A.W. Drake","year":"1967","unstructured":"A.W. Drake. Fundamentals of Applied Probability Theory. McGraw-Hill Book Company, New York, 1967."},{"key":"4_CR3","volume-title":"Proceedings of Cambridge Security Workshop","author":"L. R. Knudsen","year":"1993","unstructured":"L. R. Knudsen. Practically secure Feistel ciphers. In Proceedings of Cambridge Security Workshop, December 1993, Springer-Verlag, Berlin, To appear."},{"key":"4_CR4","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume-title":"Advances in Cryptology \u2014 Eurocrypt\u2019 93","author":"M. Matsui","year":"1994","unstructured":"M. Matsui. Linear cryptanalysis method for DES cipher. In T. Helleseth, editor, Advances in Cryptology \u2014 Eurocrypt\u2019 93, pages 386\u2013397, Springer-Verlag, Berlin, 1994."},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"M. Matsui. Linear cryptanalysis of DES cipher (I). January 1994. Preprint.","DOI":"10.1007\/3-540-48285-7_33"},{"key":"4_CR6","first-page":"81","volume-title":"Advances in Cryptology \u2014 Eurocrypt\u2019 92","author":"M. Matsui","year":"1992","unstructured":"M. Matsui and A. Yamagishi. A new method for known plaintext attack of FEAL cipher. In R.A. Rueppel, editor, Advances in Cryptology \u2014 Eurocrypt\u2019 92, pages 81\u201391, Springer-Verlag, Berlin, 1992."},{"key":"4_CR7","unstructured":"National Institute of Standards and Technology (NIST). FIPS Publication 46-2: Data Encryption Standard. December 30, 1993. Originally issued by National Bureau of Standards."},{"key":"4_CR8","doi-asserted-by":"crossref","first-page":"360","DOI":"10.1007\/3-540-48285-7_31","volume-title":"Advances in Cryptology \u2014 Eurocrypt\u2019 93","author":"L. O\u2019Conner","year":"1994","unstructured":"L. O\u2019Conner. On the distribution of characteristics in bijective mappings. In T. Helleseth, editor, Advances in Cryptology \u2014 Eurocrypt\u2019 93, pages 360\u2013370, Springer-Verlag, Berlin, 1994."},{"key":"4_CR9","unstructured":"E. Okamoto. Personal communication. March 1994."},{"key":"4_CR10","first-page":"267","volume-title":"Advances in Cryptology \u2014 Eurocrypt\u2019 87","author":"A. Shimizu","year":"1988","unstructured":"A. Shimizu and S. Miyaguchi. Fast data encipherment algorithm FEAL. In D. Chaum and W.L. Price, editors, Advances in Cryptology \u2014 Eurocrypt\u2019 87, pages 267\u2013280, Springer-Verlag, Berlin, 1988."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO \u201994"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48658-5_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,29]],"date-time":"2020-01-29T20:37:56Z","timestamp":1580330276000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48658-5_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1994]]},"ISBN":["9783540583332","9783540486589"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/3-540-48658-5_4","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[1994]]},"assertion":[{"value":"13 July 2001","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}