{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:50:51Z","timestamp":1725490251449},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540658948"},{"type":"electronic","value":"9783540488927"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/3-540-48892-8_25","type":"book-chapter","created":{"date-parts":[[2007,8,28]],"date-time":"2007-08-28T12:11:38Z","timestamp":1188303098000},"page":"319-338","source":"Crossref","is-referenced-by-count":1,"title":["Cryptanalysis of SPEED"],"prefix":"10.1007","author":[{"given":"Chris","family":"Hall","sequence":"first","affiliation":[]},{"given":"John","family":"Kelsey","sequence":"additional","affiliation":[]},{"given":"Vincent","family":"Rijmen","sequence":"additional","affiliation":[]},{"given":"Bruce","family":"Schneier","sequence":"additional","affiliation":[]},{"given":"David","family":"Wagner","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,3,28]]},"reference":[{"issue":"4","key":"25_CR1","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/BF00203965","volume":"7","author":"E. Biham","year":"1994","unstructured":"E. Biham, \u201cNew Types of Cryptanalytic Attacks Using Related Keys,\u201d Journal of Cryptology, v. 7, n. 4 (1994), pp. 229\u2013246.","journal-title":"Journal of Cryptology"},{"key":"25_CR2","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology, Proc. Eurocrypt\u201997","author":"A. Biryukov","year":"1998","unstructured":"A. Biryukov and E Kushilevitz, \u201cImproved cryptanalysis of RC5,\u201d Advances in Cryptology, Proc. Eurocrypt\u201997, LNCS, to appear."},{"key":"25_CR3","doi-asserted-by":"crossref","unstructured":"J. Kelsey, B. Schneier, and D. Wagner, \u201cKey-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES,\u201d Advances in Cryptology\u2014 CRYPTO\u2019 96, Springer-Verlag, 1996, pp. 237\u2013251.","DOI":"10.1007\/3-540-68697-5_19"},{"key":"25_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1007\/3-540-69710-1_14","volume-title":"Fast Software Encryption","author":"L.R. Knudsen","year":"1998","unstructured":"L.R. Knudsen, V. Rijmen, R.L. Rivest and M.J.B. Robshaw, \u201cOn the design and security of RC2,\u201d Fast Software Encryption, LNCS 1372, S. Vaudenay, Ed., Springer-Verlag, 1998, pp. 206\u2013221."},{"key":"25_CR5","series-title":"Lect Notes Comput Sci","first-page":"17","volume-title":"Advances in Cryptology, Proc. Eurocrypt\u201991","author":"X. Lai","year":"1992","unstructured":"X. Lai, J.L. Massey, and S. Murphy, \u201cMarkov ciphers and differential cryptanalysis,\u201d Advances in Cryptology, Proc. Eurocrypt\u201991, LNCS 547, D.W. Davies, Ed., Springer-Verlag, 1992, pp. 17\u201338."},{"key":"25_CR6","series-title":"Lect Notes Comput Sci","volume-title":"Computer Security and Industrial Cryptography-State of the Art and Evolution","author":"B. Preneel","year":"1998","unstructured":"B. Preneel, V. Rijmen, and A. Bosselaers, \u201cRecent developments in the design of conventional cryptographic algorithms,\u201d Computer Security and Industrial Cryptography-State of the Art and Evolution, LNCS, Springer-Verlag, to appear."},{"issue":"3","key":"25_CR7","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1023\/A:1008224928678","volume":"12","author":"V. Rijmen","year":"1997","unstructured":"V. Rijmen, B. Preneel, E. De Win, \u201cOn weaknesses of non-surjective round functions,\u201d Designs, Codes, and Cryptography, Vol. 12, No. 3, November 1997, pp. 253\u2013266.","journal-title":"Designs, Codes, and Cryptography"},{"key":"25_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1007\/3-540-60590-8_7","volume-title":"Fast Software Encryption","author":"R.L. Rivest","year":"1995","unstructured":"R.L. Rivest, \u201cThe RC5 encryption algorithm,\u201d Fast Software Encryption, LNCS 1008, B. Preneel, Ed., Springer-Verlag, 1995, pp. 86\u201396."},{"key":"25_CR9","doi-asserted-by":"crossref","unstructured":"B. Schneier, J. Kelsey, \u201cUnbalanced Feistel Networks and Block Cipher Design,\u201d Fast Software Encryption-Third International Workshop, Springer-Verlag, 1996.","DOI":"10.1007\/3-540-60865-6_49"},{"key":"25_CR10","doi-asserted-by":"crossref","unstructured":"B. Schneier, D. Whiting, \u201cFast Software Encryption: Designing Encryption Algorithms for Optimal Software Speed on the Intel Pentium Processor,\u201d Fast Software EncryptionFourth International Workshop, Springer-Verlag, 1997.","DOI":"10.1007\/BFb0052351"},{"key":"25_CR11","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1080\/0161-118791861749","volume":"11","author":"R. Winternitz","year":"1987","unstructured":"R. Winternitz and M. Hellman, \u201cChosen-key Attacks on a Block Cipher,\u201d Cryptologia, v. 11, n. 1, Jan 1987, pp. 16\u201320.","journal-title":"Cryptologia"},{"key":"25_CR12","unstructured":"Y. Zheng, \u201cThe SPEED Cipher,\u201d in Proceedings of Financial Cryptography\u2019 97, Springer-Verlag."}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48892-8_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T13:14:50Z","timestamp":1556802890000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48892-8_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540658948","9783540488927"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/3-540-48892-8_25","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1999]]}}}