{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T08:12:59Z","timestamp":1771488779358,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540605904","type":"print"},{"value":"9783540478096","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1995]]},"DOI":"10.1007\/3-540-60590-8_21","type":"book-chapter","created":{"date-parts":[[2012,2,26]],"date-time":"2012-02-26T15:44:19Z","timestamp":1330271059000},"page":"275-285","source":"Crossref","is-referenced-by-count":77,"title":["Correlation matrices"],"prefix":"10.1007","author":[{"given":"Joan","family":"Daemen","sequence":"first","affiliation":[]},{"given":"Ren\u00e9","family":"Govaerts","sequence":"additional","affiliation":[]},{"given":"Joos","family":"Vandewalle","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,2]]},"reference":[{"key":"21_CR1","volume-title":"Shift Register Sequences","author":"S. W. Golomb","year":"1967","unstructured":"S. W. Golomb, Shift Register Sequences, Holden-Day Inc., San Francisco, 1967."},{"issue":"No.3","key":"21_CR2","doi-asserted-by":"crossref","first-page":"569","DOI":"10.1109\/18.6037","volume":"34","author":"G.Z. Xiao","year":"1988","unstructured":"G.Z. Xiao, J.L. Massey, A Spectral Characterization of Correlation-Immune Functions, IEEE Trans. Inform. Theory, Vol. 34, No. 3, 1988, pp. 569\u2013571","journal-title":"IEEE Trans. Inform. Theory"},{"key":"21_CR3","doi-asserted-by":"crossref","unstructured":"E. Biham and A. Shamir, Differential Cryptanalysis of of the Data Encryption Standard, Springer-Verlag, 1993.","DOI":"10.1007\/978-1-4613-9314-6"},{"key":"21_CR4","doi-asserted-by":"crossref","unstructured":"M. Matsui, Linear Cryptanalysis Method for DES Cipher, Advances in Cryptology \u2014 Proceedings of Eurocrypt '93, LNCS 765, T. Helleseth, Ed., Springer-Verlag, 1993, pp. 386\u2013397.","DOI":"10.1007\/3-540-48285-7_33"},{"key":"21_CR5","unstructured":"B. Preneel, Analysis and Design of Cryptographic Hash Functions, Doct. Dissertation K.U.Leuven, January 1993."},{"key":"21_CR6","unstructured":"J. Daemen, Cipher and Hash Function Design. Strategies Based on Linear and Differential Cryptanalysis, Doct. Dissertation K.U.Leuven, March 1995."}],"container-title":["Lecture Notes in Computer Science","Fast Software Encryption"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-60590-8_21.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T16:00:11Z","timestamp":1605628811000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-60590-8_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995]]},"ISBN":["9783540605904","9783540478096"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/3-540-60590-8_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[1995]]}}}