{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T23:20:43Z","timestamp":1725664843300},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540605904"},{"type":"electronic","value":"9783540478096"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1995]]},"DOI":"10.1007\/3-540-60590-8_24","type":"book-chapter","created":{"date-parts":[[2012,2,26]],"date-time":"2012-02-26T20:44:15Z","timestamp":1330289055000},"page":"305-328","source":"Crossref","is-referenced-by-count":0,"title":["How to reverse engineer an EES device"],"prefix":"10.1007","author":[{"given":"Michael","family":"Roe","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,2]]},"reference":[{"key":"24_CR1","unstructured":"American Bankers' Association. ANSI X9.17-1985: Financial Institution Key Management (Wholesale), 1985."},{"key":"24_CR2","unstructured":"M. Blaze. Personal communication, December 1994."},{"key":"24_CR3","doi-asserted-by":"crossref","unstructured":"M. Blaze. Protocol failure in the escrowed encryption standard. In Second ACM Conference on Computer and Communications Security, pages 59\u201367, November 1994.","DOI":"10.1145\/191177.191193"},{"key":"24_CR4","unstructured":"E. F. Brickell, D. E. Denning, S. T. Kent, D. P. Maher, and W. Tuchman. SKIP-JACK Review \u2014 Interim Report \u2014 The SKIPJACK Algorithm, June 1993."},{"key":"24_CR5","unstructured":"D. E. Denning. Personal communication, August 1993."},{"key":"24_CR6","doi-asserted-by":"crossref","unstructured":"D. E. Denning. The Clipper Chip: A Technical Summary, April 1993.","DOI":"10.1016\/0142-0496(93)90216-J"},{"key":"24_CR7","doi-asserted-by":"crossref","unstructured":"D. E. Denning and M. Smid. Key escrowing today. IEEE Communications Magazine, 32(9), September 1994.","DOI":"10.1109\/35.312844"},{"key":"24_CR8","doi-asserted-by":"crossref","unstructured":"D. Johnson, S. Matyas, A. Le, and J. Wilkins. Design of the commercial data masking facility data privacy algorithm. In Proceedings of the first ACM Conference on Computer and Communications Security, November 1993.","DOI":"10.1145\/168588.168599"},{"key":"24_CR9","unstructured":"S. Landau. Codes, Keys and Conflicts: Issues in U.S. Crypto Policy. ACM U.S. Public Policy Committee, June 1994."},{"key":"24_CR10","unstructured":"C. H. Meyer and S. M. Matyas. Cryptography: a new dimension in computer data security. John Wiley and Sons, 1982."},{"key":"24_CR11","unstructured":"National Bureau of Standards. Federal Information Processing Standard \u2014 Publication 46: Data Encryption Standard, 1977."},{"key":"24_CR12","unstructured":"National Bureau of Standards. Federal Information Processing Standard \u2014 Publication 81: DES Modes of Operation, 1977."},{"issue":"12","key":"24_CR13","first-page":"12","volume":"37","author":"M. Roe","year":"1994","unstructured":"M. Roe and M. Lomas. Forging a clipper message. Communications of the ACM, 37(12):12, December 1994.","journal-title":"Communications of the ACM"},{"key":"24_CR14","unstructured":"William Safire. Sink the clipper chip. In New York Times, 14th February 1994."},{"key":"24_CR15","unstructured":"(UK) Government Communications Headquarters. Review of DEA-1, October 1985."},{"key":"24_CR16","unstructured":"(U.S.) National Institute of Standards and Technology. Federal Information Processing Standards Publication 185 \u2014 Specifications for the Escrowed Encryption Standard, February 1994."},{"key":"24_CR17","doi-asserted-by":"crossref","unstructured":"Michael Wiener and Paul van Oorschot. Parallel collision search with application to hash functions and discrete logarithms. In Second ACM Conference on Computer and Communications Security, pages 210\u2013217, November 1994.","DOI":"10.1145\/191177.191231"}],"container-title":["Lecture Notes in Computer Science","Fast Software Encryption"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-60590-8_24.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:00:15Z","timestamp":1605646815000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-60590-8_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995]]},"ISBN":["9783540605904","9783540478096"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/3-540-60590-8_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1995]]}}}