{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T04:29:53Z","timestamp":1778300993384,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540642657","type":"print"},{"value":"9783540697107","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/3-540-69710-1_9","type":"book-chapter","created":{"date-parts":[[2007,8,9]],"date-time":"2007-08-09T16:50:55Z","timestamp":1186678255000},"page":"122-133","source":"Crossref","is-referenced-by-count":7,"title":["Monkey: Black-Box Symmetric Ciphers Designed for MONopolizing KEYs"],"prefix":"10.1007","author":[{"given":"Adam","family":"Young","sequence":"first","affiliation":[]},{"given":"Moti","family":"Yung","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[1998,10,16]]},"reference":[{"key":"9_CR1","unstructured":"R. Anderson and M. Kuhn. Tamper Resistance \u2014 a Cautionary Note. In The 2-d Usenix Workshop on Electronic Commerce. 1996, pages 1\u201311."},{"key":"9_CR2","unstructured":"E. F. Brickell, D. E. Denning, S. T. Kent, D. P. Maher, and W. Tuchman SkipJack review: the SkipJack Algorithm, Interim Report, July 28, 1993."},{"key":"9_CR3","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1145\/214438.214442","volume":"3","author":"S. Even","year":"1985","unstructured":"S. Even and O. Goldreich, On the Power of Cascade Ciphers. ACM Tra. on Comp. Systems, V. 3, 1985, 108\u2013116.","journal-title":"ACM Tra. on Comp. Systems"},{"issue":"4","key":"9_CR4","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1145\/6490.6503","volume":"33","author":"O. Goldreich","year":"1986","unstructured":"O. Goldreich, S. Goldwasser, and S. Micali, How to Construct Random Functions. J. of the ACM, 33(4), pp 210\u2013217, 1986.","journal-title":"J. of the ACM"},{"key":"9_CR5","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1137\/0217022","volume":"17","author":"M. Luby","year":"1988","unstructured":"M. Luby and C. Rackoff, How to Construct Pseudorandom Permutations from Pseudorandom Functions. In SIAM J. on Computing, V. 17, 1988, pages 373\u2013386.","journal-title":"SIAM J. on Computing"},{"key":"9_CR6","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/BF02620231","volume":"6","author":"U. Maurer","year":"1993","unstructured":"U. Maurer and J. Massey, Cascade ciphers: the importance of being first. In J. of Cryptology, V. 6, 1993, pages 55\u201361.","journal-title":"J. of Cryptology"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"J. Patarin, Hidden Field Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms, In Advances in Cryptology\u2014Eurocrypt\u2019 96, pages 33\u201348, 1996. Springer-Verlag.","DOI":"10.1007\/3-540-68339-9_4"},{"key":"9_CR8","unstructured":"V. Rijmen and B. Preneel, A Family of Trapdoor Ciphers, Fast Software Encryption 97, (Ed. E. Biham)."},{"key":"9_CR9","series-title":"Lect Notes Comput Sci","volume-title":"Fast Software Encryption 94","author":"M. Roe","year":"1995","unstructured":"M. Roe, How to Reverse Engineer an EES Device, Fast Software Encryption 94, Dec. 94, (Ed. B. Preneel), LNCS 1008, Springer-Verlag."},{"key":"9_CR10","unstructured":"B. Schneier. Applied Cryptography, 1994. John Wiley and Sons, Inc."},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"R. Schroeppel, H. Orman, S. O\u2019Malley, O. Spatscheck. Fast Key Exchange with Elliptic Curve Systems. In Advances in Cryptology\u2014CRYPTO\u2019 95, pages 43\u201356, 1995. Springer-Verlag.","DOI":"10.1007\/3-540-44750-4_4"},{"key":"9_CR12","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1002\/ett.4460050408","volume":"5","author":"G. J. Simmons","year":"1994","unstructured":"G. J. Simmons. Subliminal Channels: past and present. European Tra. on Telecommunications V. 5, 1994, pages 459\u2013473.","journal-title":"European Tra. on Telecommunications"},{"key":"9_CR13","unstructured":"A. Young, M. Yung. The Dark Side of Black-Box Cryptography. In Advances in Cryptology\u2014CRYPTO\u2019 96, pages 89\u2013103, Springer-Verlag."},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"A. Young, M. Yung. Kleptography: Using Cryptography against Cryptography. In Advances in Cryptology\u2014Eurocrypt\u2019 97, pages 62\u201374. Springer-Verlag.","DOI":"10.1007\/3-540-69053-0_6"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"A. Young, M. Yung. The Prevalence of Kleptographic Attacks on Discrete-Log Based Cryptosystems. In Advances in Cryptology\u2014CRYPTO\u2019 97, Springer-Verlag.","DOI":"10.1007\/BFb0052241"}],"container-title":["Lecture Notes in Computer Science","Fast Software Encryption"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-69710-1_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T17:59:12Z","timestamp":1556733552000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-69710-1_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540642657","9783540697107"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/3-540-69710-1_9","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[1998]]}}}