{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T23:13:58Z","timestamp":1725664438232},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540608653"},{"type":"electronic","value":"9783540496526"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1996]]},"DOI":"10.1007\/3-540-60865-6_37","type":"book-chapter","created":{"date-parts":[[2012,2,26]],"date-time":"2012-02-26T21:01:04Z","timestamp":1330290064000},"page":"1-14","source":"Crossref","is-referenced-by-count":0,"title":["Attacks on the HKM \/ HFX cryptosystem"],"prefix":"10.1007","author":[{"given":"Xuejia","family":"Lai","sequence":"first","affiliation":[]},{"given":"Rainer A.","family":"Rueppel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,2]]},"reference":[{"key":"1_CR1","unstructured":"\u201cSecurity requirements for group s facsimile\u201d, International Telecommunication Union, Telecommunication Standardization Sector, Study Group 8, Contribution 59, Source: United Kingdom, April 1994."},{"key":"1_CR2","unstructured":"\u201cProposed security system for group s facsimile\u201d, International Telecommunication Union, Telecommunication Standardization Sector, Study Group 8, Contribution 60, Source: United Kingdom, April 1994."},{"key":"1_CR3","unstructured":"\u201cDetails of the HKM algorithm and examples of its use\u201d, International Telecommunication Union, Telecommunication Standardization Sector, Study Group 8, Delayed Contribution 152, Source: United Kingdom, June 1994."},{"key":"1_CR4","unstructured":"\u201cProposed security system for group s facsimile, The HFX40 algorithm\u201d, International Telecommunication Union, Telecommunication Standardization Sector, Study Group 8, Delayed Contribution, June 1994."},{"key":"1_CR5","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-82865-2","volume-title":"Analysis and Design of Stream Ciphers","author":"A. Rueppel","year":"1986","unstructured":"A. Rueppel, \u2018Analysis and Design of Stream Ciphers', New York, NY, Springer-Verlag, 1986."},{"issue":"7","key":"1_CR6","doi-asserted-by":"crossref","first-page":"465","DOI":"10.1145\/358699.358718","volume":"24","author":"R. Merkle","year":"1981","unstructured":"R. Merkle and M. Hellman, \u2018On the security of multiple encryption', Communications of ACM, 24(7):465\u2013467, 1981.","journal-title":"Communications of ACM"},{"issue":"Nr.1","key":"1_CR7","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1007\/BF02252867","volume":"2","author":"K. Nishimura","year":"1990","unstructured":"K. Nishimura and M. Sibuya, \u2018Probability to meet in the middle', J. Cryptology, Vol. 2, Nr. 1, 1990, pp. 13\u201322.","journal-title":"J. Cryptology"}],"container-title":["Lecture Notes in Computer Science","Fast Software Encryption"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-60865-6_37.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,28]],"date-time":"2021-04-28T01:27:55Z","timestamp":1619573275000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-60865-6_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1996]]},"ISBN":["9783540608653","9783540496526"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/3-540-60865-6_37","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1996]]}}}