{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T16:23:01Z","timestamp":1776442981535,"version":"3.51.2"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540642657","type":"print"},{"value":"9783540697107","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/3-540-69710-1_14","type":"book-chapter","created":{"date-parts":[[2007,8,9]],"date-time":"2007-08-09T16:50:55Z","timestamp":1186678255000},"page":"206-221","source":"Crossref","is-referenced-by-count":17,"title":["On the Design and Security of RC2"],"prefix":"10.1007","author":[{"given":"Lars R.","family":"Knudsen","sequence":"first","affiliation":[]},{"given":"Vincent","family":"Rijmen","sequence":"additional","affiliation":[]},{"given":"Ronald L.","family":"Rivest","sequence":"additional","affiliation":[]},{"given":"Matthew J. B.","family":"Robshaw","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[1998,10,16]]},"reference":[{"key":"14_CR1","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4613-9314-6","volume-title":"Differential Cryptanalysis of the Data Encryption Standard","author":"E. Biham","year":"1993","unstructured":"E. Biham and A. Shamir. Differential Cryptanalysis of the Data Encryption Standard. Springer-Verlag, New York, 1993."},{"key":"14_CR2","series-title":"Lect Notes Comput Sci","first-page":"1","volume-title":"Advances in Cryptology \u2014 Eurocrypt\u2019 97","author":"J. Borst","year":"1997","unstructured":"J. Borst, L.R. Knudsen, and V. Rijmen. Two attacks on reduced IDEA. In W. Fumy, editor, Advances in Cryptology \u2014 Eurocrypt\u2019 97, volume 1233 of Lecture Notes in Computer Science, pages 1\u201313, 1997. Springer Verlag."},{"key":"14_CR3","unstructured":"A. Biryukov and E. Kushilevitz. Improved cryptanalysis of RC5. Preprint."},{"key":"14_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1007\/3-540-60590-8_8","volume-title":"Fast Software Encryption","author":"M. Blaze","year":"1995","unstructured":"M. Blaze and B. Schneier. The MacGuffin block cipher algorithm. In B. Preneel, editor, Fast Software Encryption, volume 1008 of Lecture Notes in Computer Science, pages 97\u2013110, 1995. Springer Verlag."},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"S. Dusse, P. Hoffman, B. Ramsdell, L. Lundblade, and L. Repka. S\/MIME Message Specification. September 23, 1997. Available from http:\/\/www.imc.org\/draft-dusse-smime-msg .","DOI":"10.17487\/rfc2311"},{"key":"14_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1007\/3-540-44750-4_14","volume-title":"Advances in Cryptology \u2014 Crypto\u2019 95","author":"B.S. Kaliski","year":"1995","unstructured":"B.S. Kaliski and Y.L. Yin. On differential and linear cryptanalysis of the RC5 encryption algorithm. In D. Coppersmith, editor, Advances in Cryptology \u2014 Crypto\u2019 95, volume 963 of Lecture Notes in Computer Science, pages 171\u2013184, 1995. Springer Verlag."},{"key":"14_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1007\/3-540-68697-5_17","volume-title":"Advances in Cryptology \u2014 Crypto\u2019 96","author":"L.R. Knudsen","year":"1996","unstructured":"L.R. Knudsen and W. Meier. Improved differential attacks on RC5. In N. Koblitz, editor, Advances in Cryptology \u2014 Crypto\u2019 96, volume 1109 of Lecture Notes in Computer Science, pages 216\u2013228, 1996. Springer Verlag."},{"key":"14_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume-title":"Advances in Cryptology \u2014 Eurocrypt\u2019 93","author":"M. Matsui","year":"1994","unstructured":"M. Matsui. Linear cryptanalysis method for DES cipher. In T. Helleseth, editor, Advances in Cryptology \u2014 Eurocrypt\u2019 93, volume 765 of Lecture Notes in Computer Science, pages 386\u2013397, 1994. Springer-Verlag."},{"key":"14_CR9","series-title":"Lect Notes Comput Sci","first-page":"1","volume-title":"Advances in Cryptology \u2014 Crypto\u2019 94","author":"M. Matsui","year":"1994","unstructured":"M. Matsui. The first experimental cryptanalysis of the Data Encryption Standard. In Y. Desmedt, editor, Advances in Cryptology \u2014 Crypto\u2019 94, volume 839 of Lecture Notes in Computer Science, pages 1\u201311, 1994. Springer-Verlag."},{"key":"14_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1007\/3-540-46416-6_2","volume-title":"Advances in Cryptology \u2014 Eurocrypt\u2019 91","author":"X. Lai","year":"1991","unstructured":"X. Lai, J. Massey and S. Murphy. Markov ciphers and differential cryptanalysis. In D. Davies, editor, Advances in Cryptology \u2014 Eurocrypt\u2019 91, volume 547 of Lecture Notes in Computer Science, pages 17\u201338, 1991. Springer Verlag."},{"key":"14_CR11","unstructured":"National Institute of Standards and Technology (NIST). FIPS Publication 46-2: Data Encryption Standard. December 30, 1993."},{"key":"14_CR12","unstructured":"R.L. Rivest. A Description of the RC2\u2133 Encryption Algorithm. File draft-rivest-rc2desc-00.txt available from ftp:\/\/ftp.ietf.org\/internet-drafts\/ ."},{"key":"14_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1007\/3-540-38424-3_22","volume-title":"Advances in Cryptology \u2014 Crypto\u2019 90","author":"R.L. Rivest","year":"1991","unstructured":"R.L. Rivest. The MD4 message digest algorithm. In A.J. Menezes and S.A. Vanstone, editors, Advances in Cryptology \u2014 Crypto\u2019 90, volume 537 of Lecture Notes in Computer Science, pages 303\u2013311, 1991. Springer-Verlag."},{"key":"14_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1007\/3-540-60590-8_7","volume-title":"Fast Software Encryption","author":"R.L. Rivest","year":"1995","unstructured":"R.L. Rivest. The RC5 encryption algorithm. In B. Preneel, editor, Fast Software Encryption, volume 1008 of Lecture Notes in Computer Science, pages 86\u201396, 1995. Springer Verlag."}],"container-title":["Lecture Notes in Computer Science","Fast Software Encryption"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-69710-1_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T17:59:04Z","timestamp":1556733544000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-69710-1_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540642657","9783540697107"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/3-540-69710-1_14","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[1998]]}}}