{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:50:54Z","timestamp":1725490254473},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540658948"},{"type":"electronic","value":"9783540488927"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/3-540-48892-8_21","type":"book-chapter","created":{"date-parts":[[2007,8,28]],"date-time":"2007-08-28T16:11:38Z","timestamp":1188317498000},"page":"264-279","source":"Crossref","is-referenced-by-count":20,"title":["A Strategy for Constructing Fast Round Functions with Practical Security Against Differential and Linear Cryptanalysis"],"prefix":"10.1007","author":[{"given":"Masayuki","family":"Kanda","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Youichi","family":"Takashima","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tsutomu","family":"Matsumoto","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Kazumaro","family":"Aoki","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Kazuo","family":"Ohta","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2002,3,28]]},"reference":[{"key":"21_CR1","unstructured":"C. M. Adams, \u201cSimple and Effective Key Scheduling for Symmetric Ciphers,\u201d Workshop on Selected Areas in Cryptology SAC\u201994, 1994."},{"key":"21_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0052333","volume-title":"Fourth International Workshop on Fast Software Encryption (FSE4)","author":"K. Aoki","year":"1997","unstructured":"K. Aoki, K. Kobayashi, S. Moriai, \u201cBest Differential Characteristic Search of FEAL,\u201d Fourth International Workshop on Fast Software Encryption (FSE4), LNCS 1267, 1997."},{"key":"21_CR3","first-page":"2","volume":"E80-A","author":"K. Aoki","year":"1997","unstructured":"K. Aoki, K. Ohta, \u201cStrict Evaluation of the Maximum Average of Differential Probability and the Maximum Average of Linear Probability,\u201d IEICE Transactions Fundamentals of Electronics, Communications and Computer Sciences, Vol. E80-A, No. 1, pp. 2\u20138, 1997.","journal-title":"IEICE Transactions Fundamentals of Electronics, Communications and Computer Sciences"},{"key":"21_CR4","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology-EUROCRYPT\u2019 94","author":"E. Biham","year":"1995","unstructured":"E. Biham, \u201cOn Matsui\u2019s Linear Cryptanalysis,\u201d Advances in Cryptology-EUROCRYPT\u2019 94, LNCS 950, 1995."},{"key":"21_CR5","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology-ASIACRYPT\u2019 91","author":"L. Brown","year":"1993","unstructured":"L. Brown, M. Kwan, J. Pieprzyk, J. Seberry, \u201cImproving Resistance to Differential Cryptanalysis and the Redesign of LOKI\u201d, Advances in Cryptology-ASIACRYPT\u2019 91, LNCS 739, 1993."},{"key":"21_CR6","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E. Biham","year":"1991","unstructured":"E. Biham, A. Shamir, \u201cDifferential Cryptanalysis of DES-like Cryptosystems,\u201d Journal of Cryptology, Vol. 4 No. 1, pp. 3\u201372, 1991. (The extended abstract appeared at CRYPTO\u201990)","journal-title":"Journal of Cryptology"},{"key":"21_CR7","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology-EUROCRYPT\u201994","author":"F. Chabaud","year":"1995","unstructured":"F. Chabaud, S. Vaudenay, \u201cLinks Between Differential and Linear Cryptanalysis,\u201d Advances in Cryptology-EUROCRYPT\u201994, LNCS 950, 1995."},{"key":"21_CR8","unstructured":"Data Encryption Standard, FIPS-PUB-46, 1977."},{"key":"21_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BF02254789","volume":"9","author":"H. M. Heys","year":"1996","unstructured":"H. M. Heys, S. E. Tavares, \u201cSubstitution-Permutation Networks Resistant to Differential and Linear Cryptanalysis,\u201d Journal of Cryptology, Vol. 9 No. 1, pp. 1\u201319, 1996.","journal-title":"Journal of Cryptology"},{"key":"21_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0052332","volume-title":"Fourth International Workshop on Fast Software Encryption (FSE4)","author":"T. Jakobsen","year":"1997","unstructured":"T. Jakobsen, L. R. Knudsen, \u201cThe Interpolation Attack on Block Ciphers,\u201d Fourth International Workshop on Fast Software Encryption (FSE4), LNCS 1267, 1997."},{"key":"21_CR11","series-title":"Lect Notes Comput Sci","volume-title":"Cambridge SecurityWorkshop on Fast Software Encryption (FSE1)","author":"L. R. Knudsen","year":"1994","unstructured":"L. R. Knudsen, \u201cPractically Secure Feistel Ciphers,\u201d Cambridge SecurityWorkshop on Fast Software Encryption (FSE1), LNCS 809, 1994."},{"key":"21_CR12","series-title":"Lect Notes Comput Sci","volume-title":"Second International Workshop on Fast Software Encryption (FSE2)","author":"L. R. Knudsen","year":"1995","unstructured":"L. R. Knudsen, \u201cTruncated and Higher Order Differentials,\u201d Second International Workshop on Fast Software Encryption (FSE2), LNCS 1008, 1995."},{"key":"21_CR13","unstructured":"X. Lai, \u201cHigher order derivatives and differential cryptanalysis,\u201d In Proc. of Symposium on Communication, Coding, and Cryptography,\u201d in honor of James L. Massey on the occasion of his 60\u2019th birthday, Feb. 10\u201313, 1994, Monte-Verita, Ascona, Switzerland, 1994."},{"key":"21_CR14","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology-EUROCRYPT\u201991","author":"X. Lai","year":"1991","unstructured":"X. Lai, J. L. Massey, S. Murphy, \u201cMarkov Ciphers and Differential Cryptanalysis,\u201d Advances in Cryptology-EUROCRYPT\u201991, LNCS 547, 1991."},{"key":"21_CR15","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology-EUROCRYPT\u201993","author":"M. Matsui","year":"1994","unstructured":"M. Matsui, \u201cLinear Cryptanalysis Method for DES Cipher,\u201d Advances in Cryptology-EUROCRYPT\u201993, LNCS 765, 1994."},{"key":"21_CR16","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0053451","volume-title":"Advances in Cryptology-EUROCRYPT\u201994","author":"M. Matsui","year":"1995","unstructured":"M. Matsui, \u201cOn Correlation Between the Order of S-boxes and the Strength of DES,\u201d Advances in Cryptology-EUROCRYPT\u201994, LNCS 950, 1995."},{"key":"21_CR17","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0052334","volume-title":"Fourth International Workshop on Fast Software Encryption (FSE4)","author":"M. Matsui","year":"1997","unstructured":"M. Matsui, \u201cNew Block Encryption Algorithm MISTY,\u201d Fourth International Workshop on Fast Software Encryption (FSE4), LNCS 1267, 1997."},{"key":"21_CR18","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology-EUROCRYPT\u201994","author":"K. Nyberg","year":"1995","unstructured":"K. Nyberg, \u201cLinear Approximation of Block Ciphers,\u201d Advances in Cryptology-EUROCRYPT\u201994, LNCS 950, 1995."},{"key":"21_CR19","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0034838","volume-title":"Advances in Cryptology-ASIACRYPT\u2019 96","author":"K. Nyberg","year":"1996","unstructured":"K. Nyberg, \u201cGeneralized Feistel Networks,\u201d Advances in Cryptology-ASIACRYPT\u2019 96, LNCS 1163, 1996."},{"key":"21_CR20","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/BF00204800","volume":"8","author":"K. Nyberg","year":"1995","unstructured":"K. Nyberg, L. R. Knudsen, \u201cProvable Security Against a Differential Attack,\u201d Journal of Cryptology, Vol. 8 No. 1, pp. 27\u201337, 1995. (The extended abstract appeared at CRYPTO\u201992)","journal-title":"Journal of Cryptology"},{"key":"21_CR21","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology-CRYPTO\u201995","author":"K. Ohta","year":"1995","unstructured":"K. Ohta, S. Moriai, K. Aoki, \u201cImproving the Search Algorithm for the Best Linear Expression.,\u201d Advances in Cryptology-CRYPTO\u201995, LNCS 963, 1995."},{"key":"21_CR22","series-title":"Lect Notes Comput Sci","volume-title":"Third International Workshop on Fast Software Encryption (FSE3)","author":"V. Rijmen","year":"1996","unstructured":"V. Rijmen, J. Daemen, B. Preneel, A. Bosselaers, E. DcWin, \u201cThe Cipher SHARK,\u201d Third International Workshop on Fast Software Encryption (FSE3), LNCS 1039, 1996."},{"key":"21_CR23","series-title":"Lect Notes Comput Sci","volume-title":"Second International Workshop on Fast Software Encryption (FSE2)","author":"S. Vaudenay","year":"1995","unstructured":"S. Vaudenay, \u201cOn the Need for Multipermutations: Cryptanalysis of MD4 and SAFER,\u201d Second International Workshop on Fast Software Encryption (FSE2), LNCS 1008, 1995."}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48892-8_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,23]],"date-time":"2019-02-23T05:41:37Z","timestamp":1550900497000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48892-8_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540658948","9783540488927"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/3-540-48892-8_21","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1999]]}}}