{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T16:13:25Z","timestamp":1770480805708,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540611868","type":"print"},{"value":"9783540683391","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1996]]},"DOI":"10.1007\/3-540-68339-9_20","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T01:31:14Z","timestamp":1186363874000},"page":"224-236","source":"Crossref","is-referenced-by-count":54,"title":["Non-Linear Approximations in Linear Cryptanalysis"],"prefix":"10.1007","author":[{"given":"Lars R.","family":"Knudsen","sequence":"first","affiliation":[]},{"given":"M. J. B.","family":"Robshaw","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,13]]},"reference":[{"key":"20_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1007\/3-540-57332-1_3","volume-title":"Advances in Cryptology \u2014 AsiaCrypt\u2019 91","author":"L. Brown","year":"1993","unstructured":"L. Brown and M. Kwan and J. Pieprzyk and J. Seberry. Improving resistance to differential cryptanalysis and the redesign of LOKI. In H. Imai and R.L. Rivest and T. Matsumoto, editors, Advances in Cryptology \u2014 AsiaCrypt\u2019 91, Lecture Notes in Computer Science 453, Springer-Verlag (1993), 36\u201350."},{"issue":"5","key":"20_CR2","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1038\/scientificamerican0573-15","volume":"228","author":"H. Feistel","year":"1973","unstructured":"H. Feistel. Cryptography and computer privacy. Scientific American, 228(5):15\u201323, 1973.","journal-title":"Scientific American"},{"key":"20_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1007\/3-540-49264-X_3","volume-title":"Advances in Cryptology \u2014 Eurocrypt\u2019 95","author":"C. Harpes","year":"1995","unstructured":"C. Harpes and G.G. Kramer and J.L. Massey. A generalization of linear cryptanalysis and the applicability of Matsui\u2019s piling-up lemma. In L.C. Guillou and J.J. Quisquater, editors, Advances in Cryptology \u2014 Eurocrypt\u2019 95, Lecture Notes in Computer Science 921, Springer-Verlag (1995), 24\u201338."},{"key":"20_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1007\/3-540-48658-5_4","volume-title":"Advances in Cryptology \u2014 Crypto\u2019 94","author":"B.S. Kaliski","year":"1994","unstructured":"B.S. Kaliski and M.J.B. Robshaw. Linear cryptanalysis using multiple approximations. In Y.G. Desmedt, editor, Advances in Cryptology \u2014 Crypto\u2019 94, Lecture Notes in Computer Science 839, Springer-Verlag (1994), 26\u201339."},{"key":"20_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1007\/3-540-60590-8_19","volume-title":"Fast Software Encryption","author":"B.S. Kaliski","year":"1995","unstructured":"B.S. Kaliski and M.J.B. Robshaw. Linear cryptanalysis using multiple approximations and FEAL. In B. Preneel, editor, Fast Software Encryption, Lecture Notes in Computer Science 1008, Springer Verlag (1995), 249\u2013264."},{"key":"20_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1007\/3-540-48658-5_3","volume-title":"Advances in Cryptology \u2014 Crypto\u2019 94","author":"S.K. Langford","year":"1994","unstructured":"S.K. Langford and M.E. Hellman. Differential-linear cryptanalysis. In Y.G. Desmedt, editor, Advances in Cryptology \u2014 Crypto\u2019 94, Lecture Notes in Computer Science 839, Springer Verlag (1994), 17\u201325."},{"key":"20_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume-title":"Advances in Cryptology \u2014 Eurocrypt\u2019 93","author":"M. Matsui","year":"1994","unstructured":"M. Matsui. Linear cryptanalysis method for DES cipher. In T. Helleseth, editor, Advances in Cryptology \u2014 Eurocrypt\u2019 93, Lecture Notes in Computer Science 765, Springer-Verlag (1994), 386\u2013397."},{"key":"20_CR8","series-title":"Lect Notes Comput Sci","first-page":"1","volume-title":"Advances in Cryptology \u2014 Crypto\u2019 94","author":"M. Matsui","year":"1994","unstructured":"M. Matsui. The first experimental cryptanalysis of the Data Encryption Standard. In Y.G. Desmedt, editor, Advances in Cryptology \u2014 Crypto\u2019 94, Lecture Notes in Computer Science 839, Springer-Verlag (1994), 1\u201311."},{"key":"20_CR9","unstructured":"National Institute of Standards and Technology (NIST). FIPS Publication 46-2: Data Encryption Standard. December 30, 1993."},{"key":"20_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1007\/3-540-48285-7_6","volume-title":"Advances in Cryptology \u2014 Eurocrypt\u2019 93","author":"K. Nyberg","year":"1994","unstructured":"K. Nyberg. Differentially uniform mappings for cryptography. In T. Helleseth, editor, Advances in Cryptology \u2014 Eurocrypt\u2019 93, Lecture Notes in Computer Science 765, Springer-Verlag (1994), 55\u201364."},{"key":"20_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1007\/BFb0053460","volume-title":"Advances in Cryptology \u2014 Eurocrypt\u2019 94","author":"K. Nyberg","year":"1995","unstructured":"K. Nyberg. Linear approximation of block ciphers. In A. De Santis, editor, Advances in Cryptology \u2014 Eurocrypt\u2019 94, Lecture Notes in Computer Science 950, Springer-Verlag (1995), 439\u2013444."},{"issue":"1","key":"20_CR12","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1007\/BF00204800","volume":"8","author":"K. Nyberg","year":"1995","unstructured":"K. Nyberg and L.R. Knudsen. Provable security against a differential attack. The Journal of Cryptology, 8(1):27\u201338, 1995.","journal-title":"The Journal of Cryptology"},{"key":"20_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1007\/3-540-60590-8_10","volume-title":"Fast Software Encryption","author":"L. O\u2019Connor","year":"1995","unstructured":"L. O\u2019Connor. Properties of linear approximation tables. In B. Preneel, editor, Fast Software Encryption, Lecture Notes in Computer Science 1008, Springer Verlag (1995), 131\u2013136."},{"key":"20_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1007\/3-540-48658-5_2","volume-title":"Advances in Cryptology \u2014 Crypto\u2019 94","author":"K. Ohta","year":"1994","unstructured":"K. Ohta and K. Aoki. Linear cryptanalysis of the Fast Data Encipherment Algorithm. In Y. Desmedt, editor, Advances in Cryptology \u2014 Crypto\u2019 94, Lecture Notes in Computer Science 839, Springer-Verlag (1994) 12\u201316."},{"key":"20_CR15","doi-asserted-by":"crossref","unstructured":"I. Schaum\u00fcller-Bichl. Cryptanalysis of the Data Encryption Standard by a method of formal coding. In T. Beth, editor, Cryptography, Proc. Burg Feuerstein 1982, Springer-Verlag (1983), 235\u2013255.","DOI":"10.1007\/3-540-39466-4_17"},{"key":"20_CR16","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/BFb0000442","volume-title":"Advances in Cryptology \u2014 Asiacrypt\u2019 94","author":"T. Tokita","year":"1995","unstructured":"T. Tokita and T. Sorimachi and M. Matsui. Linear Cryptanalysis of LOKI and s\n                  2DES. In J. Pieprzyk and R. Safavi-Naini, editors, Advances in Cryptology \u2014 Asiacrypt\u2019 94, Lecture Notes in Computer Science 917, Springer-Verlag (1995), 293\u2013303."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201996"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-68339-9_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,20]],"date-time":"2019-02-20T23:07:53Z","timestamp":1550704073000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-68339-9_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1996]]},"ISBN":["9783540611868","9783540683391"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/3-540-68339-9_20","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[1996]]}}}