{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T12:12:04Z","timestamp":1773231124893,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540608653","type":"print"},{"value":"9783540496526","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1996]]},"DOI":"10.1007\/3-540-60865-6_47","type":"book-chapter","created":{"date-parts":[[2012,2,26]],"date-time":"2012-02-26T21:00:47Z","timestamp":1330290047000},"page":"99-111","source":"Crossref","is-referenced-by-count":105,"title":["The cipher SHARK"],"prefix":"10.1007","author":[{"given":"Vincent","family":"Rijmen","sequence":"first","affiliation":[]},{"given":"Joan","family":"Daemen","sequence":"additional","affiliation":[]},{"given":"Bart","family":"Preneel","sequence":"additional","affiliation":[]},{"given":"Antoon","family":"Bosselaers","sequence":"additional","affiliation":[]},{"given":"Erik","family":"Win","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,2]]},"reference":[{"key":"11_CR1","unstructured":"C.M. Adams, S.E. Tavares, \u201cDesigning S-boxes for ciphers resistant to differential cryptanalysis,\u201d Proc. of the 3rd symposium on State and Progress of Research in Cryptography, W. Wolfowicz, Ed., Fondazione Ugo Bordoni, 1993, pp. 181\u2013190."},{"issue":"No.1","key":"11_CR2","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E. Biham","year":"1991","unstructured":"E. Biham and A. Shamir, \u201cDifferential cryptanalysis of DES-like cryptosystems,\u201d Journal of Cryptology, Vol. 4, No. 1, 1991, pp. 3\u201372.","journal-title":"Journal of Cryptology"},{"issue":"No.3","key":"11_CR3","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1147\/rd.383.0243","volume":"38","author":"D. Coppersmith","year":"1994","unstructured":"D. Coppersmith, \u201cThe data encryption standard (DES) and its strength against attacks,\u201d IBM Journal of Research and Development,Vol. 38, No. 3, May 1994, pp. 243\u2013250.","journal-title":"IBM Journal of Research and Development"},{"key":"11_CR4","first-page":"80","volume-title":"Block ciphers based on modular arithmetic","author":"J. Daemen","year":"1993","unstructured":"J. Daemen, R. Govaerts, J. Vandewalle, \u201cBlock ciphers based on modular arithmetic,\u201d Proc. of the 3rd Symposium on the State and Progress of Research in Cryptography, W. Wolfowicz, Ed., Fondazione Ugo Bordoni, Roma, 1993, pp. 80\u201389."},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"J. Daemen, R. Govaerts, J. Vandewalle, \u201cWeak keys of IDEA,\u201d Advances in Cryptology, Proc. Crypto '93, LNCS 773, D. Stinson, Ed., Springer-Verlag, 1994, pp. 224\u2013231.","DOI":"10.1007\/3-540-48329-2_20"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"J. Daemen, R. Govaerts, J. Vandewalle, \u201cA new approach to block cipher design,\u201d Fast Software Encryption, LNCS 809, R. Anderson, Ed., Springer-Verlag, 1994, pp. 18\u201332.","DOI":"10.1007\/3-540-58108-1_2"},{"key":"11_CR7","unstructured":"J. Daemen, \u201cCipher and hash function design strategies based on linear and differential cryptanalysis,\u201d Doctoral Dissertation, March 1995, K.U.Leuven."},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"M.H. Dawson, S.E. Tavares, \u201cAn expanded set of S-box design criteria based on information theory,\u201d Advances in Cryptology, Proc. Eurocrypt'91, LNCS 547, D.W. Davies, Ed., Springer-Verlag, 1991, pp. 352\u2013367.","DOI":"10.1007\/3-540-46416-6_30"},{"issue":"No.5","key":"11_CR9","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1038\/scientificamerican0573-15","volume":"228","author":"H. Feistel","year":"1973","unstructured":"H. Feistel, \u201cCryptography and computer privacy,\u201d Scientific American, Vol. 228, No. 5, May 1973, pp. 15\u201323.","journal-title":"Scientific American"},{"issue":"No.11","key":"11_CR10","doi-asserted-by":"crossref","first-page":"1543","DOI":"10.1109\/PROC.1975.10005","volume":"63","author":"H. Feistel","year":"1975","unstructured":"H. Feistel, W.A. Notz, J.L. Smith, \u201cSome cryptographic techniques for machine-to-machine data communications,\u201d Proc. IEEE, Vol. 63, No. 11, November 1975, pp. 1543\u20131554.","journal-title":"Proc. IEEE"},{"key":"11_CR11","unstructured":"Data Encryption Standard, Federal Information Processing Standard (FIPS), Publication 46, National Bureau of Standards, U.S. Department of Commerce, Washington D.C., January 1977."},{"key":"11_CR12","unstructured":"\u201cInformation technology \u2014 Security techniques \u2014 Modes of operation of an n-bit block cipher algorithm,\u201d IS 10116, ISO\/IEC, 1991."},{"key":"11_CR13","unstructured":"K. Kim, T. Matsumoto, H. Imai, \u201cA recursive construction method of S-boxes satisfying strict avalanche criterion,\u201d Advances in Cryptology, Proc. Crypto'90, LNCS 537, S. Vanstone, Ed., Springer-Verlag, 1991, pp. 564\u2013575."},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"L.R. Knudsen, \u201cTruncated and higher order differentials,\u201d Fast Software Encryption, LNCS 1008, B. Preneel, Ed., Springer-Verlag, 1995, pp. 196\u2013211.","DOI":"10.1007\/3-540-60590-8_16"},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"L.R. Knudsen, \u201cTruncated differentials of SAFER,\u201d Fast Software Encryption (this volume), 1996.","DOI":"10.1007\/3-540-60865-6_38"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"S.K. Langford, M.E. Hellman, \u201cDifferential-linear cryptanalysis,\u201d Advances in Cryptology, Proc. Crypto'94, LNCS 839, Y. Desmedt, Ed., Springer-Verlag, 1994, pp. 17\u201325.","DOI":"10.1007\/3-540-48658-5_3"},{"key":"11_CR17","volume-title":"The Theory of Error-Correcting Codes","author":"F.J. MacWilliams","year":"1977","unstructured":"F.J. MacWilliams, N.J.A. Sloane, \u201cThe Theory of Error-Correcting Codes,\u201d, North-Holland, Amsterdam, 1977."},{"key":"11_CR18","doi-asserted-by":"crossref","unstructured":"J. Massey, \u201cSAFER K-64: a byte-oriented block-ciphering algorithm,\u201d Fast Software Encryption, LNCS 809, R. Anderson, Ed., Springer-Verlag, 1994, pp. 1\u201317.","DOI":"10.1007\/3-540-58108-1_1"},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"J. Massey, \u201cSAFER K-64: One year later,\u201d Fast Software Encryption, LNCS 1008, B. Preneel, Ed., Springer-Verlag, 1995, pp. 212\u2013241.","DOI":"10.1007\/3-540-60590-8_17"},{"key":"11_CR20","doi-asserted-by":"crossref","unstructured":"M. Matsui, \u201cLinear cryptanalysis method for DES cipher,\u201d Advances in Cryptology, Proc. Eurocrypt'93, LNCS 765, T. Helleseth, Ed., Springer-Verlag, 1994, pp. 386\u2013397.","DOI":"10.1007\/3-540-48285-7_33"},{"key":"11_CR21","doi-asserted-by":"crossref","unstructured":"K. Nyberg, \u201cPerfect nonlinear S-boxes,\u201d Advances in Cryptology, Proc. Eurocrypt'91, LNCS 547, D.W. Davies, Ed., Springer-Verlag, 1991, pp. 378\u2013386.","DOI":"10.1007\/3-540-46416-6_32"},{"key":"11_CR22","doi-asserted-by":"crossref","unstructured":"K. Nyberg, \u201cDifferentially uniform mappings for cryptography,\u201d Advances in Cryptology, Proc. Eurocrypt'93, LNCS 765, T. Helleseth, Ed., Springer-Verlag, 1994, pp. 55\u201364.aa","DOI":"10.1007\/3-540-48285-7_6"},{"key":"11_CR23","doi-asserted-by":"crossref","unstructured":"L. O'Connor, \u201cOn the distribution of characteristics in bijective mappings,\u201d Advances in Cryptology, Proc. Eurocrypt'93, LNCS 765, T. Helleseth, Ed., Springer-Verlag, 1994, pp. 360\u2013370.","DOI":"10.1007\/3-540-48285-7_31"},{"key":"11_CR24","volume-title":"Error-Correcting Codes","author":"W.W. Peterson","year":"1972","unstructured":"W.W. Peterson, E.J. Weldon, \u201cError-Correcting Codes,\u201d The MIT Press, Cambridge, 1972."},{"key":"11_CR25","unstructured":"V. Rijmen, B. Preneel, \u201cOn weaknesses of non-surjective round functions,\u201d Workshop on Selected Areas in Cryptography \u2014 SAC'95, Ottawa, May 18\u201319, 1995, pp. 100\u2013106."},{"key":"11_CR26","doi-asserted-by":"crossref","unstructured":"B. Schneier, \u201cDescription of a new variable-length key, 64-bit block cipher (Blowfish),\u201d Fast Software Encryption, LNCS 809, R. Anderson, Ed., Springer-Verlag, 1994, pp. 191\u2013204.","DOI":"10.1007\/3-540-58108-1_24"},{"key":"11_CR27","unstructured":"B. Schneier, M. Blaze, \u201cMacGuffin: an unbalanced Feistel network block cipher,\u201d Fast Software Encryption, LNCS 1008, B. Preneel, Ed., Springer-Verlag, 1995, pp. 97\u2013110."},{"key":"11_CR28","doi-asserted-by":"crossref","unstructured":"S. Vaudenay, \u201cOn the weak keys of Blowfish,\u201d Fast Software Encryption (this volume), 1996.","DOI":"10.1007\/3-540-60865-6_39"}],"container-title":["Lecture Notes in Computer Science","Fast Software Encryption"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-60865-6_47.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:02:13Z","timestamp":1605646933000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-60865-6_47"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1996]]},"ISBN":["9783540608653","9783540496526"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/3-540-60865-6_47","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[1996]]}}}