{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T12:45:55Z","timestamp":1750337155229},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540642657"},{"type":"electronic","value":"9783540697107"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/3-540-69710-1_13","type":"book-chapter","created":{"date-parts":[[2007,8,9]],"date-time":"2007-08-09T16:50:55Z","timestamp":1186678255000},"page":"189-204","source":"Crossref","is-referenced-by-count":17,"title":["CS-Cipher"],"prefix":"10.1007","author":[{"given":"Jacques","family":"Stern","sequence":"first","affiliation":[]},{"given":"Serge","family":"Vaudenay","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[1998,10,16]]},"reference":[{"key":"13_CR1","unstructured":"Data Encryption Standard. Federal Information Processing Standard Publication 46, U. S. National Bureau of Standards, 1977."},{"key":"13_CR2","unstructured":"DES Modes of Operation. Federal Information Processing Standard Publication 81, U. S. National Bureau of Standards, 1980."},{"key":"13_CR3","first-page":"1","volume":"E80-A","author":"K. Aoki","year":"1997","unstructured":"K. Aoki, K. Ohta. Strict evaluation of the maximum average of differential probability and the maximum average of linear probability. IEICE Transactions on Fundamentals, vol. E80-A, pp. 1\u20138, 1997.","journal-title":"IEICE Transactions on Fundamentals"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"E. Biham. A fast new DES implementation in software. In Fast Software Encryption, Haifa, Israel, Lectures Notes in Computer Science 1267, pp. 260\u2013272, Springer-Verlag, 1997.","DOI":"10.1007\/BFb0052352"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"E. Biham, A. Shamir. Differential cryptanalysis of the full 16-round DES. In Advances in Cryptology CRYPTO\u201992, Santa Barbara, California, U.S.A., Lectures Notes in Computer Science 740, pp. 487\u2013496, Springer-Verlag, 1993.","DOI":"10.1007\/3-540-48071-4_34"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"E. Biham, A. Shamir. Differential Cryptanalysis of the Data Encryption Standard, Springer-Verlag, 1993.","DOI":"10.1007\/978-1-4613-9314-6"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"F. Chabaud, S. Vaudenay. Links between differential and linear cryptanalysis. In Advances in Cryptology EUROCRYPT\u201994, Perugia, Italy, Lectures Notes in Computer Science 950, pp. 356\u2013365, Springer-Verlag, 1995.","DOI":"10.1007\/BFb0053450"},{"key":"13_CR8","unstructured":"H. Dobbertin. Almost Perfect nonlinear power functions on GF(2n). IEEE Trans. Inf. Theory, submitted."},{"key":"13_CR9","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1038\/scientificamerican0573-15","volume":"228","author":"H. Feistel","year":"1973","unstructured":"H. Feistel. Cryptography and computer privacy. Scientific american, vol. 228, pp. 15\u201323, 1973.","journal-title":"Scientific american"},{"key":"13_CR10","unstructured":"H. Gilbert. Cryptanalyse Statistique des Algorithmes de Chiffrement et S\u00e9curit\u00e9 des Sch\u00e9mas d\u2019Authentification, Th\u00e8se de Doctorat de l\u2019Universit\u00e9 de Paris 11, 1997."},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"H. Gilbert, G. Chass\u00e9. A statistical attack of the FEAL-8 cryptosystem. In Advances in Cryptology CRYPTO\u201990, Santa Barbara, California, U.S.A., Lectures Notes in Computer Science 537, pp. 22\u201333, Springer-Verlag, 1991.","DOI":"10.1007\/3-540-38424-3_2"},{"key":"13_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BF02254789","volume":"9","author":"H. M. Heys","year":"1996","unstructured":"H. M. Heys, S. E. Tavares. Substitution-Permutation Networks resistant to differential and linear cryptanalysis. Journal of Cryptology, vol. 9, pp. 1\u201319, 1996.","journal-title":"Journal of Cryptology"},{"key":"13_CR13","doi-asserted-by":"crossref","unstructured":"J. L. Massey. SAFER K-64: a byte-oriented block-ciphering algorithm. In Fast Software Encryption, Cambridge, United Kingdom, Lectures Notes in Computer Science 809, pp. 1\u201317, Springer-Verlag, 1994.","DOI":"10.1007\/3-540-58108-1_1"},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"J. L. Massey. SAFER K-64: one year later. In Fast Software Encryption, Cambridge, United Kingdom, Lectures Notes in Computer Science 809, pp. 212\u2013241, Springer-Verlag, 1994.","DOI":"10.1007\/3-540-60590-8_17"},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"M. Matsui. Linear cryptanalysis methods for DES cipher. In Advances in Cryptology EUROCRYPT\u201993, Lofthus, Norway, Lectures Notes in Computer Science 765, pp. 386\u2013397, Springer-Verlag, 1994.","DOI":"10.1007\/3-540-48285-7_33"},{"key":"13_CR16","doi-asserted-by":"crossref","unstructured":"M. Matsui. The first experimental cryptanalysis of the Data Encryption Standard. In Advances in Cryptology CRYPTO\u201994, Santa Barbara, California, U.S.A., Lectures Notes in Computer Science 839, pp. 1\u201311, Springer-Verlag, 1994.","DOI":"10.1007\/3-540-48658-5_1"},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"M. Matsui. New structure of block ciphers with provable security against differential and linear cryptanalysis. In Fast Software Encryption, Cambridge, United Kingdom, Lectures Notes in Computer Science 1039, pp. 205\u2013218, Springer-Verlag, 1996.","DOI":"10.1007\/3-540-60865-6_54"},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"M. Matsui. New block encryption algorithm MISTY. In Fast Software Encryption, Haifa, Israel, Lectures Notes in Computer Science 1267, pp. 54\u201368, Springer-Verlag, 1997.","DOI":"10.1007\/BFb0052334"},{"key":"13_CR19","doi-asserted-by":"crossref","unstructured":"K. Nyberg. Perfect nonlinear S-boxes. In Advances in Cryptology EUROCRYPT\u2019 91, Brighton, United Kingdom, Lectures Notes in Computer Science 547, pp. 378\u2013385, Springer-Verlag, 1991.","DOI":"10.1007\/3-540-46416-6_32"},{"key":"13_CR20","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/BF00204800","volume":"8","author":"K. Nyberg","year":"1995","unstructured":"K. Nyberg, L. R. Knudsen. Provable security against a differential cryptanalysis. Journal of Cryptology, vol. 8, pp. 27\u201337, 1995.","journal-title":"Journal of Cryptology"},{"key":"13_CR21","unstructured":"Organisation for Economic Co-operation and Development Cryptography Policy Guidelines, 27 March, 1997."},{"key":"13_CR22","unstructured":"C. P. Schnorr. FFT-Hashing: an efficient cryptographic hash function. Pr\u00e9sent\u00e9 \u00e0 CRYPTO\u201991. Non publi\u00e9."},{"key":"13_CR23","doi-asserted-by":"crossref","unstructured":"C. P. Schnorr. FFT-Hash II, efficient cryptographic hashing. In Advances in Cryptology EUROCRYPT\u201992, Balatonf\u00fcred, Hungary, Lectures Notes in Computer Science 658, pp. 45\u201354, Springer-Verlag, 1993.","DOI":"10.1007\/3-540-47555-9_4"},{"key":"13_CR24","doi-asserted-by":"crossref","unstructured":"C.-P. Schnorr, S. Vaudenay. Parallel FFT-hashing. In Fast Software Encryption, Cambridge, United Kingdom, Lectures Notes in Computer Science 809, pp. 149\u2013156, Springer-Verlag, 1994.","DOI":"10.1007\/3-540-58108-1_18"},{"key":"13_CR25","doi-asserted-by":"crossref","unstructured":"C.-P. Schnorr, S. Vaudenay. Black box cryptanalysis of hash networks based on multipermutations. In Advances in Cryptology EUROCRYPT\u201994, Perugia, Italy, Lectures Notes in Computer Science 950, pp. 47\u201357, Springer-Verlag, 1995.","DOI":"10.1007\/BFb0053423"},{"key":"13_CR26","unstructured":"C. P. Schnorr, S. Vaudenay. Black box cryptanalysis of cryptographic primitives. Submitted. Early version available as LIENS Report 95-28, Laboratoire d\u2019Informatique de l\u2019Ecole Normale Sup\u00e9rieure, 1995. ftp:\/\/ftp.ens.fr\/pub\/reports\/liens\/liens-95-28.A4.ps.Z"},{"key":"13_CR27","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C. E. Shannon","year":"1949","unstructured":"C. E. Shannon. Communication theory of secrecy systems. Bell system technical journal, vol. 28, pp. 656\u2013715, 1949.","journal-title":"Bell system technical journal"},{"key":"13_CR28","doi-asserted-by":"crossref","unstructured":"A. Tardy-Corfdir, H. Gilbert. A known plaintext attack of FEAL-4 and FEAL-6. In Advances in Cryptology CRYPTO\u201991, Santa Barbara, California, U.S.A., Lectures Notes in Computer Science 576, pp. 172\u2013181, Springer-Verlag, 1992.","DOI":"10.1007\/3-540-46766-1_12"},{"key":"13_CR29","doi-asserted-by":"crossref","unstructured":"S. Vaudenay. On the need for multipermutations: cryptanalysis of MD4 and SAFER. In Fast Software Encryption, Leuven, Belgium, Lectures Notes in Computer Science 1008, pp. 286\u2013297, Springer-Verlag, 1995.","DOI":"10.1007\/3-540-60590-8_22"},{"key":"13_CR30","unstructured":"S. Vaudenay. La S\u00e9curit\u00e9 des Primitives Cryptographiques, Th\u00e8se de Doctorat de l\u2019Universit\u00e9 de Paris 7, Technical Report LIENS-95-10 of the Laboratoire d\u2019Informatique de l\u2019Ecole Normale Sup\u00e9rieure, 1995."},{"key":"13_CR31","unstructured":"Rocke Verser. Strong cryptography makes the world a safer place. http:\/\/www.frii.com\/~rcv\/deschall.htm"}],"container-title":["Lecture Notes in Computer Science","Fast Software Encryption"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-69710-1_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T17:59:14Z","timestamp":1556733554000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-69710-1_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540642657","9783540697107"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/3-540-69710-1_13","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1998]]}}}