{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T04:06:46Z","timestamp":1725854806613},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319388977"},{"type":"electronic","value":"9783319388984"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-38898-4_6","type":"book-chapter","created":{"date-parts":[[2016,5,6]],"date-time":"2016-05-06T07:44:40Z","timestamp":1462520680000},"page":"93-107","source":"Crossref","is-referenced-by-count":0,"title":["Statistical and Algebraic Properties of DES"],"prefix":"10.1007","author":[{"given":"Stian","family":"Fauskanger","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Igor","family":"Semaev","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2016,5,7]]},"reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Barker, W.C., Barker, E.B.: SP 800\u201367 Rev. 1. Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher, January 2012","DOI":"10.6028\/NIST.SP.800-67r1"},{"issue":"3","key":"6_CR2","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/s001459900027","volume":"10","author":"E Biham","year":"1997","unstructured":"Biham, E., Biryukov, A.: An improvement of Davies\u2019 attack on DES. J. Cryptol. 10(3), 195\u2013205 (1997)","journal-title":"J. Cryptol."},{"key":"6_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"487","DOI":"10.1007\/3-540-48071-4_34","volume-title":"Advances in Cryptology - CRYPTO \u201992","author":"E Biham","year":"1993","unstructured":"Biham, E., Shamir, A.: Differential cryptanalysis of the full 16-Round DES. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 487\u2013496. Springer, Heidelberg (1993)"},{"key":"6_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1007\/978-3-540-77272-9_10","volume-title":"Cryptography and Coding","author":"NT Courtois","year":"2007","unstructured":"Courtois, N.T., Bard, G.V.: Algebraic cryptanalysis of the data encryption standard. In: Galbraith, S.D. (ed.) Cryptography and Coding 2007. LNCS, vol. 4887, pp. 152\u2013169. Springer, Heidelberg (2007)"},{"issue":"1","key":"6_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BF00204799","volume":"8","author":"D Davies","year":"1995","unstructured":"Davies, D., Murphy, S.: Pairs and triplets of DES S-boxes. J. Cryptol. 8(1), 1\u201325 (1995)","journal-title":"J. Cryptol."},{"key":"6_CR6","unstructured":"Kholosha, A.: Personal conversation with I. Semaev, September 2014"},{"key":"6_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1007\/11593447_23","volume-title":"Advances in Cryptology - ASIACRYPT 2005","author":"S Kunz-Jacques","year":"2005","unstructured":"Kunz-Jacques, S., Muller, F.: New improvements of Davies-Murphy cryptanalysis. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 425\u2013442. Springer, Heidelberg (2005)"},{"key":"6_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"M Matsui","year":"1994","unstructured":"Matsui, M.: Linear cryptanalysis method for DES cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 386\u2013397. Springer, Heidelberg (1994)"},{"key":"6_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1007\/978-3-540-77360-3_15","volume-title":"Selected Areas in Cryptography","author":"H Raddum","year":"2007","unstructured":"Raddum, H.: MRHS equation systems. In: Adams, C., Miri, A., Wiener, M. (eds.) SAC 2007. LNCS, vol. 4876, pp. 232\u2013245. Springer, Heidelberg (2007)"},{"issue":"1","key":"6_CR10","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/s10623-008-9180-z","volume":"49","author":"H Raddum","year":"2008","unstructured":"Raddum, H., Semaev, I.: Solving multiple right hand sides linear equations. Des. Codes Cryptogr. 49(1), 147\u2013160 (2008)","journal-title":"Des. Codes Cryptogr."},{"issue":"1","key":"6_CR11","first-page":"107","volume":"45","author":"I Semaev","year":"2010","unstructured":"Semaev, I., Miku\u0161, M.: Methods to solve algebraic equations in cryptanalysis. Tatra Mt. Math. Publ. 45(1), 107\u2013136 (2010)","journal-title":"Tatra Mt. Math. Publ."},{"key":"6_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"280","DOI":"10.1007\/3-540-39799-X_22","volume-title":"Advances in Cryptology","author":"A Shamir","year":"1986","unstructured":"Shamir, A.: On the security of DES. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 280\u2013281. Springer, Heidelberg (1986)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-38898-4_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T23:34:45Z","timestamp":1559432085000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-38898-4_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319388977","9783319388984"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-38898-4_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}