{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,22]],"date-time":"2025-05-22T09:30:36Z","timestamp":1747906236520},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540642657"},{"type":"electronic","value":"9783540697107"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/3-540-69710-1_18","type":"book-chapter","created":{"date-parts":[[2007,8,9]],"date-time":"2007-08-09T16:50:55Z","timestamp":1186678255000},"page":"270-283","source":"Crossref","is-referenced-by-count":5,"title":["Differential Cryptanalysis of the ICE Encryption Algorithm"],"prefix":"10.1007","author":[{"given":"Bart","family":"Van Rompay","sequence":"first","affiliation":[]},{"given":"Lars R.","family":"Knudsen","sequence":"additional","affiliation":[]},{"given":"Vincent","family":"Rijmen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[1998,10,16]]},"reference":[{"key":"18_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1007\/3-540-48329-2_17","volume-title":"Advances in Cryptology \u2014 Crypto\u2019 93 Proceedings","author":"I. Ben-Aroya","year":"1994","unstructured":"I. Ben-Aroya and E. Biham, \u201cDifferential Cryptanalysis of Lucifer,\u201d Advances in Cryptology \u2014 Crypto\u2019 93 Proceedings, LNCS 773, D. Stinson, Ed., Springer-Verlag, 1994, pp. 187\u2013199."},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"E. Biham and A. Shamir, Differential Cryptanalysis of the Data Encryption Standard, Springer-Verlag, 1993.","DOI":"10.1007\/978-1-4613-9314-6"},{"key":"18_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1007\/3-540-57332-1_3","volume-title":"Advances in Cryptology \u2014 AsiaCrypt\u2019 91 Proceedings","author":"L. Brown","year":"1993","unstructured":"L. Brown, M. Kwan, J. Pieprzyk and J. Seberry, \u201cImproving resistance to differential cryptanalysis and the redesign of LOKI,\u201d Advances in Cryptology \u2014 AsiaCrypt\u2019 91 Proceedings, LNCS 739, H. Imai, R. Rivest, and T. Matsumoto, Eds., Springer-Verlag, 1993, pp. 36\u201350."},{"key":"18_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/BFb0030364","volume-title":"Advances in Cryptology \u2014 AusCrypt\u2019 90 Proceedings","author":"L. Brown","year":"1990","unstructured":"L. Brown, J. Pieprzyk and J. Seberry, \u201cLOKI: A Cryptographic Primitive for Authentication and Secrecy Applications,\u201d Advances in Cryptology \u2014 AusCrypt\u2019 90 Proceedings, LNCS 453, J. Seberry and J. Pieprzyk, Eds., Springer-Verlag, 1990, pp. 229\u2013236."},{"key":"18_CR5","unstructured":"FIPS 46, Data Encryption Standard, Federal Information Processing Standard (FIPS), Publication 46, National Bureau of Standards, U.S. Department of Commerce, Washington D.C., January 1977."},{"key":"18_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1007\/3-540-57220-1_62","volume-title":"Advances in Cryptology \u2014 AusCrypt\u201992 Proceedings","author":"L. Knudsen","year":"1993","unstructured":"L. Knudsen, \u201cCryptanalysis of LOKI\u201991,\u201d Advances in Cryptology \u2014 AusCrypt\u201992 Proceedings, LNCS 718, J. Seberry and Y. Zheng, Eds., Springer-Verlag, 1993, pp. 196\u2013208."},{"key":"18_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/BFb0052335","volume-title":"Proceedings of the 4th Workshop on Fast Software Encryption","author":"M. Kwan","year":"1997","unstructured":"M. Kwan, \u201cThe Design of the ICE Encryption Algorithm,\u201d Proceedings of the 4th Workshop on Fast Software Encryption, Haifa, Israel, LNCS 1267, E. Biham, Ed., Springer-Verlag, 1997, pp. 69\u201382."}],"container-title":["Lecture Notes in Computer Science","Fast Software Encryption"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-69710-1_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,21]],"date-time":"2019-02-21T00:24:35Z","timestamp":1550708675000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-69710-1_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540642657","9783540697107"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/3-540-69710-1_18","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1998]]}}}