{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:22:59Z","timestamp":1761675779847},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540208273"},{"type":"electronic","value":"9783540245919"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24591-9_36","type":"book-chapter","created":{"date-parts":[[2010,7,29]],"date-time":"2010-07-29T07:36:56Z","timestamp":1280389016000},"page":"489-503","source":"Crossref","is-referenced-by-count":13,"title":["Constructing and Cryptanalysis of a 16 \u00d7 16 Binary Matrix as a Diffusion Layer"],"prefix":"10.1007","author":[{"given":"Bon Wook","family":"Koo","sequence":"first","affiliation":[]},{"given":"Hwan Seok","family":"Jang","sequence":"additional","affiliation":[]},{"given":"Jung Hwan","family":"Song","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"36_CR1","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C.E. Shannon","year":"1949","unstructured":"Shannon, C.E.: Communication theory of secrecy systems. Bell Systems Technical Journal\u00a028, 656\u2013715 (1949)","journal-title":"Bell Systems Technical Journal"},{"key":"36_CR2","doi-asserted-by":"publisher","first-page":"1131","DOI":"10.1109\/12.464391","volume":"44","author":"H.M. Heys","year":"1995","unstructured":"Heys, H.M., Tavares, S.E.: Avalanche characteristics of substitution-permutation encryption networks. IEEE Trans. Comp.\u00a044, 1131\u20131139 (1995)","journal-title":"IEEE Trans. Comp."},{"key":"36_CR3","unstructured":"Litsyn, S., Rains, E.M., Sloane, N.J.A.: Available at http:\/\/www.math.unl.edu\/djaffe\/codes\/webcodes\/codeform.html"},{"key":"36_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1007\/3-540-48892-8_21","volume-title":"Selected Areas in Cryptography","author":"M. Kanda","year":"1999","unstructured":"Kanda, M., Takashima, Y., Matsumoto, T., Aoki, K., Ohta, K.: A strategy for construction fast round functions with practical security against differential and linear cryptanalysis. In: Tavares, S., Meijer, H. (eds.) SAC 1998. LNCS, vol.\u00a01556, pp. 264\u2013279. Springer, Heidelberg (1999)"},{"key":"36_CR5","doi-asserted-by":"crossref","unstructured":"Kanda, M.: Practical Security Evaluation against Differential and Linear Cryptanalysis for Feistel Ciphers with SPN Round Function. In: Selected Areas in Cryptography 2000, pp. 324\u2013338 (2000)","DOI":"10.1007\/3-540-44983-3_24"},{"key":"36_CR6","unstructured":"Koo, B., Song, J.: Construction a diffusion layer in SPN structure against differential and linear cryptanalysis. In: Proceedings of KIISC conference Region Chung-Cheong, pp. 23\u201339 (2002)"},{"key":"36_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1007\/3-540-60590-8_16","volume-title":"Fast Software Encryption","author":"L.R. Knudsen","year":"1995","unstructured":"Knudsen, L.R.: Truncated and Higher Order Differentials. In: Preneel, B. (ed.) FSE 1994. LNCS, vol.\u00a01008, pp. 196\u2013211. Springer, Heidelberg (1995)"},{"key":"36_CR8","unstructured":"NTT Laboratories. Security of E2 against Truncated Differential Cryptanalysis(in progress) (1999), available at http:\/\/info.isl.ntt.co.jp\/e2\/RelDocs\/"},{"key":"36_CR9","unstructured":"Aoki, K., Kanda, M.: Search for impossible Differential of E2 (1999), available at http:\/\/csrc.nist.gov\/CryptoToolkit\/aes\/round1\/pubcmnts.htm"},{"key":"36_CR10","unstructured":"Daemen, J., Rijmen, V.: AES proposal:Rijndael(Version 2) (1999), Available at NIST AES website http:\/\/csrc.nist.gov\/encryption\/aes"},{"key":"36_CR11","unstructured":"Knudsen, L.R.: The Number of Rounds in Block Ciphers, NESSIE public reports, NES\/DOC\/UIB\/WP3\/003\/a (2000), Available at http:\/\/www.cosic.esat.kuleuven.ac.be\/nessie\/reports\/"}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24591-9_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T23:41:09Z","timestamp":1559346069000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24591-9_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540208273","9783540245919"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24591-9_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}