{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:26:45Z","timestamp":1725488805840},"publisher-location":"Berlin, Heidelberg","reference-count":3,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540642657"},{"type":"electronic","value":"9783540697107"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/3-540-69710-1_20","type":"book-chapter","created":{"date-parts":[[2007,8,9]],"date-time":"2007-08-09T16:50:55Z","timestamp":1186678255000},"page":"293-296","source":"Crossref","is-referenced-by-count":1,"title":["Differential Cryptanalysis of KHF"],"prefix":"10.1007","author":[{"given":"David","family":"Wagner","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[1998,10,16]]},"reference":[{"key":"20_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/BFb0032359","volume-title":"Cryptography: Policy and Algorithms","author":"S. Bakhtiari","year":"1996","unstructured":"S. Bakhtiari, R. Safavi-Naini, and J. Pieprzyk, \u201cKeyed hash functions,\u201d Cryptography: Policy and Algorithms, E. Dawson and Jovan Golic (Eds), Lecture Notes in Computer Science, vol. 1029, Springer-Verlag, 1996, pp.201\u2013214."},{"key":"20_CR2","doi-asserted-by":"crossref","unstructured":"E. Biham and A. Shamir, Differential Cryptanalysis of the Data Encryption Standard, Springer-Verlag, 1993.","DOI":"10.1007\/978-1-4613-9314-6"},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"B. Preneel, P.C. van Oorschot, \u201cMDx-MAC and building fast MACs from hash functions,\u201d Advances in Cryptology\u2014CRYPTO\u2019 95, Springer-Verlag, 1995, pp. 1\u201314.","DOI":"10.1007\/3-540-44750-4_1"}],"container-title":["Lecture Notes in Computer Science","Fast Software Encryption"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-69710-1_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T17:59:05Z","timestamp":1556733545000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-69710-1_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540642657","9783540697107"],"references-count":3,"URL":"https:\/\/doi.org\/10.1007\/3-540-69710-1_20","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1998]]}}}