{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T13:58:33Z","timestamp":1775829513961,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540642657","type":"print"},{"value":"9783540697107","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/3-540-69710-1_15","type":"book-chapter","created":{"date-parts":[[2007,8,9]],"date-time":"2007-08-09T20:50:55Z","timestamp":1186692655000},"page":"222-238","source":"Crossref","is-referenced-by-count":131,"title":["Serpent: A New Block Cipher Proposal"],"prefix":"10.1007","author":[{"given":"Eli","family":"Biham","sequence":"first","affiliation":[]},{"given":"Ross","family":"Anderson","sequence":"additional","affiliation":[]},{"given":"Lars","family":"Knudsen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[1998,10,16]]},"reference":[{"issue":"2","key":"15_CR1","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1147\/sj.302.0206","volume":"30","author":"D.G. Abraham","year":"1991","unstructured":"DG Abraham, GM Dolan, GP Double, JV Stevens, \u201cTransaction Security System\u201d, in IBM Systems Journal v 30 no 2 (1991) pp 206\u2013229","journal-title":"IBM Systems Journal"},{"key":"15_CR2","unstructured":"RJ Anderson, MG Kuhn, \u201cTamper Resistance \u2014 a Cautionary Note\u201d, in The Second USENIX Workshop on Electronic Commerce Proceedings (Nov 1996) pp 1\u201311"},{"key":"15_CR3","unstructured":"RJ Anderson, MG Kuhn, \u201cLow Cost Attacks on Tamper Resistant Devices\u201d, to appear in proceedings of Security Protocols 97"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"E Biham, \u2018Higher Order Differential Cryptanalysis\u2019, unpublished paper, 1994","DOI":"10.1007\/978-1-4613-9314-6_3"},{"key":"15_CR5","unstructured":"E Biham, How to Forge DES-Encrypted Messages in 228 Steps, Technical Report CS884, Technion, August 1996"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"E Biham, A Biryukov, \u201cAn Improvement of Davies\u2019 Attack on DES\u201d, in Journal of Cryptology v 10 no 3 (Summer 97) pp 195\u2013205","DOI":"10.1007\/s001459900027"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"E Biham, A Shamir, \u2018Differential Cryptanalysis of the Data Encryption Standard\u2019 (Springer 1993)","DOI":"10.1007\/978-1-4613-9314-6"},{"key":"15_CR8","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/BF00203965","volume":"7","author":"E. Biham","year":"1994","unstructured":"E Biham, \u201cNew Types of Cryptanalytic Attacks Using Related Keys\u201d, in Journal of Cryptology v 7 (1994) no 4 pp 229\u2013246","journal-title":"Journal of Cryptology"},{"key":"15_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1007\/BFb0052352","volume-title":"Fast Software Encryption \u2014 4th International Workshop, FSE\u2019 97","author":"E. Biham","year":"1997","unstructured":"E Biham, \u201cA Fast New DES Implementation in Software\u201d, in Fast Software Encryption \u2014 4th International Workshop, FSE\u2019 97, Springer LNCS v 1267 pp 260\u2013271"},{"key":"15_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1007\/BFb0052259","volume-title":"Advances in Cryptology \u2014 Crypto 97","author":"E. Biham","year":"1997","unstructured":"E Biham, A Shamir, \u201cDifferential Fault Analysis of Secret Key Cryptosystems\u201d, in Advances in Cryptology \u2014 Crypto 97, Springer LNCS v 1294 pp 513\u2013525"},{"key":"15_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/3-540-69053-0_4","volume-title":"Advances in Cryptology \u2014 Eurocrypt 97","author":"D. Boneh","year":"1997","unstructured":"D Boneh, RA DeMillo, RJ Lipton, \u201cOn the Importance of Checking Cryptographic Protocols for Faults\u201d, in Advances in Cryptology \u2014 Eurocrypt 97, Springer LNCS v 1233 pp 37\u201351"},{"key":"15_CR12","unstructured":"DW Davies, \u2018Investigation of a Potential Weakness in the DES Algorithm\u2019, private communication (1987)"},{"issue":"1","key":"15_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BF00204799","volume":"8","author":"D. Davies","year":"1995","unstructured":"D Davies, Murphy, \u201cPairs and Triplets of DES S Boxes\u201d, in Journal of Cryptology v 8 no 1 (1995) pp 1\u201325","journal-title":"Journal of Cryptology"},{"key":"15_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/BFb0052331","volume-title":"Fast Software Encryption \u2014 4th International Workshop, FSE\u2019 97","author":"C. Harpes","year":"1997","unstructured":"C Harpes, JL Massey, \u201cPartitioning Cryptanalysis\u201d, in Fast Software Encryption \u2014 4th International Workshop, FSE\u2019 97, Springer LNCS v 1267 pp 13\u201327"},{"key":"15_CR15","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1007\/3-540-68697-5_19","volume-title":"Advances in Cryptology \u2014 Crypto 96","author":"J. Kelsey","year":"1996","unstructured":"J Kelsey, B Schneier, D Wagner, \u201cKey-Schedule Cryptanalysis of IDEA, GDES, GOST, SAFER and Triple-DES\u201d, in Advances in Cryptology \u2014 Crypto 96, Springer LNCS v 1109 pp 237\u2013251"},{"key":"15_CR16","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology \u2014 Auscrypt\u201992","author":"L.R. Knudsen","year":"1993","unstructured":"LR Knudsen, \u201cCyptanalysis of LOKI91\u201d, in Advances in Cryptology \u2014 Auscrypt\u201992 Springer LNCS"},{"key":"15_CR17","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1007\/3-540-60590-8_16","volume-title":"Fast Software Encryption \u2014 2nd International Workshop, FSE\u2019 94","author":"L.R. Knudsen","year":"1995","unstructured":"LR Knudsen, \u201cTruncated and Higher-Order Differentials\u201d, in Fast Software Encryption \u2014 2nd International Workshop, FSE\u2019 94, Springer LNCS v 1008 pp 196\u2013211"},{"key":"15_CR18","volume-title":"Block Ciphers \u2014 Analysis, Design and Applications","author":"L.R. Knudsen","year":"1994","unstructured":"L.R. Knudsen, Block Ciphers \u2014 Analysis, Design and Applications, Ph.D. Thesis, Aarhus University, Denmark, 1994."},{"key":"15_CR19","doi-asserted-by":"crossref","unstructured":"X.J. Lai, \u2018Higher Order Derivative and Differential Cryptanalysis\u2019, in Communication and Cryptography, Two Sides of one tapestry, R. Blahut (editor), Kluwer Academic Publishers, 1994 communication, September 30, 1993.","DOI":"10.1007\/978-1-4615-2694-0_23"},{"key":"15_CR20","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume-title":"Advances in Cryptology \u2014 Eurocrypt 93","author":"M. Matsui","year":"1994","unstructured":"M Matsui, \u201cLinear Cryptanalysis Method for DES Cipher\u201d, in Advances in Cryptology \u2014 Eurocrypt 93, Springer LNCS v 765 pp 386\u2013397"},{"key":"15_CR21","unstructured":"RSA Data Security Inc., http:\/\/www.rsa.com"},{"key":"15_CR22","doi-asserted-by":"crossref","unstructured":"S Vaudenay, \u201cAn Experiment on DES Statistical Cryptanalysis\u201d, in 3rd ACM Conference on Computer and Communications Security, March 14\u201316, 96, New Delhi, India; proceedings published by ACM pp 139\u2013147","DOI":"10.1145\/238168.238206"}],"container-title":["Lecture Notes in Computer Science","Fast Software Encryption"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-69710-1_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T21:59:01Z","timestamp":1556747941000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-69710-1_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540642657","9783540697107"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/3-540-69710-1_15","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[1998]]}}}