{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T02:43:14Z","timestamp":1747104194253},"publisher-location":"Berlin, Heidelberg","reference-count":5,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540642657"},{"type":"electronic","value":"9783540697107"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/3-540-69710-1_17","type":"book-chapter","created":{"date-parts":[[2007,8,9]],"date-time":"2007-08-09T16:50:55Z","timestamp":1186678255000},"page":"254-269","source":"Crossref","is-referenced-by-count":15,"title":["Cryptanalysis of Some Recently-Proposed Multiple Modes of Operation"],"prefix":"10.1007","author":[{"given":"David","family":"Wagner","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[1998,10,16]]},"reference":[{"key":"17_CR1","series-title":"Lect Notes Comput Sci","volume-title":"Fast Software Encryption\u2019 93","author":"E. Biham","year":"1994","unstructured":"E. Biham, \u201cOn Modes of Operation,\u201d Fast Software Encryption\u2019 93, LNCS 809, Springer-Verlag, 1994."},{"key":"17_CR2","series-title":"Lect Notes Comput Sci","volume-title":"ASIACRYPT\u2019 94","author":"E. Biham","year":"1994","unstructured":"E. Biham, \u201cCryptanalysis of Multiple Modes of Operation,\u201d ASIACRYPT\u2019 94, LNCS 917, Springer-Verlag, 1994."},{"key":"17_CR3","unstructured":"E. Biham, \u201cCryptanalysis of Triple-Modes of Operation,\u201d Technion technical report CS 885, 1996."},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"D. Coppersmith, D.B. Johnson, and S.M. Matyas, \u201cTriple DES Cipher Block Chaining with Output Feedback Masking,\u201d IBM Journal of Research and Development, vol 40, no 2, 1996.","DOI":"10.1147\/rd.402.0253"},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"P.C. van Oorschot and M.J. Wiener, \u201cImproving implementable meet-in-the-middle attacks by orders of magnitude,\u201d CRYPTO\u201996, pages 228\u2013236, Springer-Verlag, 1996.","DOI":"10.1007\/3-540-68697-5_18"}],"container-title":["Lecture Notes in Computer Science","Fast Software Encryption"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-69710-1_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T17:59:09Z","timestamp":1556733549000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-69710-1_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540642657","9783540697107"],"references-count":5,"URL":"https:\/\/doi.org\/10.1007\/3-540-69710-1_17","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1998]]}}}