{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T23:14:12Z","timestamp":1725664452879},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540608653"},{"type":"electronic","value":"9783540496526"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1996]]},"DOI":"10.1007\/3-540-60865-6_38","type":"book-chapter","created":{"date-parts":[[2012,2,26]],"date-time":"2012-02-26T21:01:27Z","timestamp":1330290087000},"page":"15-26","source":"Crossref","is-referenced-by-count":21,"title":["Truncated differentials of SAFER"],"prefix":"10.1007","author":[{"given":"Lars R.","family":"Knudsen","sequence":"first","affiliation":[]},{"given":"Thomas A.","family":"Berson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,2]]},"reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"E. Biham and A. Shamir. Differential Cryptanalysis of the Data Encryption Standard. Springer Verlag, 1993.","DOI":"10.1007\/978-1-4613-9314-6"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"C. Harpes, G.G. Kramer, and J.L. Massey. A generalization of linear cryptanalysis and the applicability of Matsui's piling-up lemma. In L. Guillou and J.-J. Quisquater, editors, Advances in Cryptology \u2014 Eurocrypt'95, LNCS 921, pages 24\u201338. Springer Verlag, 1995.","DOI":"10.1007\/3-540-49264-X_3"},{"key":"2_CR3","unstructured":"Hoel, Port, and Stone. Introduction to Probability Theory. Houghton Mifflin Company, 1979."},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"L.R. Knudsen. A key-schedule weakness in SAFER K-64. In D. Coppersmith, editor, Advances in Cryptology \u2014 CRYPTO'95, LNCS 963, pages 274\u2013286. Springer Verlag, 1995.","DOI":"10.1007\/3-540-44750-4_22"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"L.R. Knudsen. Truncated and higher order differentials. In B. Preneel, editor, Fast Software Encryption, LNCS 1008, pages 196\u2013211, Springer Verlag, 1995.","DOI":"10.1007\/3-540-60590-8_16"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"J.L. Massey. SAFER K-64: A byte-oriented block-ciphering algorithm. In Fast Software Encryption \u2014 Proc. Cambridge Security Workshop, Cambridge, U.K., LNCS 809, pages 1\u201317. Springer Verlag, 1994.","DOI":"10.1007\/3-540-58108-1_1"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"J.L. Massey. SAFER K-64: One year later. In B. Preneel, editor, Fast Software Encryption, LNCS 1008, pages 212\u2013241, Springer Verlag, 1995.","DOI":"10.1007\/3-540-60590-8_17"},{"key":"2_CR8","unstructured":"S. Murphy. An analysis of SAFER. Private communication, 1995."},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"S. Vaudenay. On the need for multipermutations: Cryptanalysis of MD4 and SAFER. In B. Preneel, editor, Fast Software Encryption, LNCS 1008, pages 286\u2013297, Springer Verlag, 1995.","DOI":"10.1007\/3-540-60590-8_22"}],"container-title":["Lecture Notes in Computer Science","Fast Software Encryption"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-60865-6_38.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:02:11Z","timestamp":1605646931000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-60865-6_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1996]]},"ISBN":["9783540608653","9783540496526"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/3-540-60865-6_38","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1996]]}}}