{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:48:44Z","timestamp":1767340124744},"publisher-location":"Berlin, Heidelberg","reference-count":5,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540573326"},{"type":"electronic","value":"9783540480662"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1993]]},"DOI":"10.1007\/3-540-57332-1_46","type":"book-chapter","created":{"date-parts":[[2012,2,26]],"date-time":"2012-02-26T12:51:24Z","timestamp":1330260684000},"page":"495-498","source":"Crossref","is-referenced-by-count":52,"title":["Limitations of the Even-Mansour construction"],"prefix":"10.1007","author":[{"given":"Joan","family":"Daemen","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,5,28]]},"reference":[{"key":"46_CR1","doi-asserted-by":"crossref","unstructured":"S. Even, Y. Mansour, A Construction of a Cipher From a Single Pseudorandom Permutation, Lecture Notes in Computer Science, Proceedings Asiacrypt '91, Springer-Verlag 1992.","DOI":"10.1007\/3-540-57332-1_17"},{"key":"46_CR2","doi-asserted-by":"crossref","unstructured":"J. Daemen, A Framework for the Design if One-Way Hash Functions Including Cryptanalysis of Damg\u00e5rd's One-Way Function Based on a Cellular Automaton, Lecture Notes in Computer Science, Proceedings Asiacrypt '91, Springer-Verlag 1992.","DOI":"10.1007\/3-540-57332-1_7"},{"key":"46_CR3","doi-asserted-by":"crossref","unstructured":"E. Biham, A. Shamir, Differential Cryptanalysis of DES-like Cryptosystems, Abstracts of Crypto '90, 1\u201332.","DOI":"10.1007\/3-540-46416-6_1"},{"issue":"2","key":"46_CR4","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1137\/0217022","volume":"17","author":"M. Luby","year":"1988","unstructured":"M. Luby and C. Rackoff. How to construct pseudorandom permutations from pseudorandom functions. SIAM Journal on Computing, 17(2):373\u2013386,April 1988.","journal-title":"SIAM Journal on Computing"},{"key":"46_CR5","unstructured":"O. Goldreich, S. Goldwasser and S. Micali, How to Construct Random Functions, Proceedings of the 25th Annual Symposium on Foundations of Computer Science, October 24\u201326, 1984."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 ASIACRYPT '91"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-57332-1_46.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,31]],"date-time":"2021-12-31T05:31:40Z","timestamp":1640928700000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-57332-1_46"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1993]]},"ISBN":["9783540573326","9783540480662"],"references-count":5,"URL":"https:\/\/doi.org\/10.1007\/3-540-57332-1_46","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1993]]}}}