{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T13:25:20Z","timestamp":1726406720035},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540579366"},{"type":"electronic","value":"9783540483922"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1994]]},"DOI":"10.1007\/3-540-57936-2_32","type":"book-chapter","created":{"date-parts":[[2012,2,26]],"date-time":"2012-02-26T14:57:32Z","timestamp":1330268252000},"page":"78-90","source":"Crossref","is-referenced-by-count":2,"title":["A successful attack against the DES"],"prefix":"10.1007","author":[{"given":"Faramarz","family":"Hendessi","sequence":"first","affiliation":[]},{"given":"Mohammad R.","family":"Aref","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,6]]},"reference":[{"unstructured":"National Bureau of standards, \u201dEncryption algorithm for computer data protection: Requests for comments,\u201d Federal Register, Vol. 40. No. 12134, 1975.","key":"6_CR1"},{"issue":"6","key":"6_CR2","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/C-M.1977.217750","volume":"10","author":"W. Diffie","year":"1977","unstructured":"Diffie, W. and Hellman, M. E., \u201dExhaustive cryptanalysis of the NBS Data Encryption Standard,\u201d computer magazine, 10, 6, 74\u201384, 1977.","journal-title":"computer magazine"},{"unstructured":"Punckuell, D. A. and Eshraghian, K., Basic VLSI Design (principles and applications), Prentice-Hall of Australia, 1985.","key":"6_CR3"},{"key":"6_CR4","volume-title":"Master Thesis","author":"F. Hendessi","year":"1989","unstructured":"Hendessi, F., Cryptanalysis of the Data Encryption Standard, Master Thesis, Department of Electrical Engineering, Isfahan Univ. of Tech., Isfahan, Iran, 1989."},{"unstructured":"National Bureau of standards, \u201dSpecification for the Data Encryption Standard,\u201d Federal Register, Vol. 46, January 1977.","key":"6_CR5"},{"key":"6_CR6","volume-title":"Cryptography: A new Dimension Computer Data Security","author":"C. H. Meyer","year":"1982","unstructured":"Meyer, C. H. and Matyas, S. M., Cryptography: A new Dimension Computer Data Security, John Wiley, New York, 1982."},{"key":"6_CR7","volume-title":"Cryptography: A Primer","author":"A. G. Konheim","year":"1981","unstructured":"Konheim, A. G., Cryptography: A Primer, John Wiley, New York, 1981."},{"doi-asserted-by":"crossref","unstructured":"Brickell, E. F., Moore, J. H., and Purtil, M. R., \u201dStructure in the S-boxes of the DES (Extended abstract),\u201d Advanced in cryptology, Proc. of Crypto.'86, LNCS, Vol. 263, springer-verlag, 1987, pp. 3\u20138.","key":"6_CR8","DOI":"10.1007\/3-540-47721-7_1"},{"unstructured":"Schaumller-Binchl, \u201cCryptanalysis of the Data Encryption Standard, Method of Formal Coding,\u201d Proc. of Crypto.'82, LNCS, Vol. 149, springer-verlag, 1983, pp. 235\u2013259.","key":"6_CR9"}],"container-title":["Lecture Notes in Computer Science","Information Theory and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-57936-2_32.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:15:49Z","timestamp":1605647749000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-57936-2_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1994]]},"ISBN":["9783540579366","9783540483922"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/3-540-57936-2_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1994]]}}}