{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:26:41Z","timestamp":1725488801762},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540642657"},{"type":"electronic","value":"9783540697107"}],"license":[{"start":{"date-parts":[[1998,1,1]],"date-time":"1998-01-01T00:00:00Z","timestamp":883612800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/3-540-69710-1_3","type":"book-chapter","created":{"date-parts":[[2007,8,9]],"date-time":"2007-08-09T20:50:55Z","timestamp":1186692655000},"page":"32-48","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Cryptanalysis of TWOPRIME"],"prefix":"10.1007","author":[{"given":"Don","family":"Coppersmith","sequence":"first","affiliation":[]},{"given":"David","family":"Wagner","sequence":"additional","affiliation":[]},{"given":"Bruce","family":"Schneier","sequence":"additional","affiliation":[]},{"given":"John","family":"Kelsey","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[1998,10,16]]},"reference":[{"key":"3_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1007\/BFb0052337","volume-title":"Fast Software Encryption, FSE\u201997","author":"C. Ding","year":"1997","unstructured":"C. Ding, V. Niemi, A. Renvall, and A. Salomaa, \u201cTWOPRIME: A Fast Stream Ciphering Algorithm,\u201d Fast Software Encryption, FSE\u201997, Springer LNCS volume 1267, pages 88\u2013102, 1997."},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"B.S. Kaliski, \u201cThe MD2 Message Digest Algorithm,\u201d RFC 1319, April 1992.","DOI":"10.17487\/rfc1319"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"R.C. Merkle, \u201cA Fast Software One-Way hash Function,\u201d Journal of Cryp-tology, vol 3 no 1, 1990.","DOI":"10.1007\/BF00203968"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"P.C. van Oorschot and M.J. Wiener, \u201cImproving implementable meet-in-the-middle attacks by orders of magnitude,\u201d CRYPTO\u201996, pages 228\u2013236, Springer-Verlag, 1996.","DOI":"10.1007\/3-540-68697-5_18"},{"key":"3_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1007\/3-540-58108-1_10","volume-title":"Fast Software Encryption","author":"B. Preneel","year":"1994","unstructured":"B. Preneel, \u201cDesign principles for dedicated hash functions,\u201d Fast Software Encryption, it FSE\u201993, Springer LNCS volume 809, pages 71\u201382, 1994."},{"key":"3_CR6","volume-title":"Elementary Cryptanalysis, A Mathematical Approach","author":"A. Sinkov","year":"1968","unstructured":"A. Sinkov, Elementary Cryptanalysis, A Mathematical Approach. New York: Random House, 1968."},{"key":"3_CR7","unstructured":"B. Tuckerman, \u201cA study of the Vigenere-Vernam single and multiple loop enciphering systems,\u201d IBM Research Report RC2879, 14 May 1970, York-town Heights NY."},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"R. Winternitz, \u201cProducing One-Way Hash Functions from DES,\u201d Advances in Cryptology: Proceedings of Crypto 83, Plenum Press, 1984, pp. 203\u2013207.","DOI":"10.1007\/978-1-4684-4730-9_17"}],"container-title":["Lecture Notes in Computer Science","Fast Software Encryption"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-69710-1_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T14:06:28Z","timestamp":1558274788000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-69710-1_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540642657","9783540697107"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/3-540-69710-1_3","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1998]]},"assertion":[{"value":"16 October 1998","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}