{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:35:36Z","timestamp":1725564936983},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540223795"},{"type":"electronic","value":"9783540278009"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-27800-9_12","type":"book-chapter","created":{"date-parts":[[2010,9,5]],"date-time":"2010-09-05T23:00:38Z","timestamp":1283727638000},"page":"137-148","source":"Crossref","is-referenced-by-count":9,"title":["Related Key Differential Cryptanalysis of Full-Round SPECTR-H64 and CIKS-1"],"prefix":"10.1007","author":[{"given":"Youngdai","family":"Ko","sequence":"first","affiliation":[]},{"given":"Changhoon","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Seokhie","family":"Hong","sequence":"additional","affiliation":[]},{"given":"Sangjin","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1007\/978-3-540-45215-7_43","volume-title":"Computer Network Security","author":"N.D. Goots","year":"2003","unstructured":"Goots, N.D., Izotov, B.V., Moldovyan, A.A., Moldovyan, N.A.: Fast Ciphers for Cheap Hardware: Differential Analysis of SPECTR-H64. In: Gorodetsky, V., Popyack, L.J., Skormin, V.A. (eds.) MMM-ACNS 2003. LNCS, vol.\u00a02776, pp. 449\u2013452. Springer, Heidelberg (2003)"},{"key":"12_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1007\/3-540-45116-1_27","volume-title":"Information Assurance in Computer Networks. Methods, Models and Architectures for Network Security","author":"N.D. Goots","year":"2001","unstructured":"Goots, N.D., Moldovyan, A.A., Moldovyan, N.A.: Fast Encryption ALgorithm Spectr-H64. In: Gorodetski, V.I., Skormin, V.A., Popyack, L.J. (eds.) MMM-ACNS 2001. LNCS, vol.\u00a02052, pp. 275\u2013286. Springer, Heidelberg (2001)"},{"key":"12_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1007\/3-540-68697-5_19","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"J. Kelsey","year":"1996","unstructured":"Kelsey, J., Schneier, B., Wagner, D.: Key Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 237\u2013251. Springer, Heidelberg (1996)"},{"key":"12_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"298","DOI":"10.1007\/978-3-540-45215-7_25","volume-title":"Computer Network Security","author":"Y. Ko","year":"2003","unstructured":"Ko, Y., Hong, D., Hong, S., Lee, S., Lim, J.: Linear Cryptanalysis on SPECTRH64 with Higher Order Differential Property. In: Gorodetsky, V., Popyack, L.J., Skormin, V.A. (eds.) MMM-ACNS 2003. LNCS, vol.\u00a02776, pp. 298\u2013307. Springer, Heidelberg (2003)"},{"key":"12_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"456","DOI":"10.1007\/3-540-36159-6_39","volume-title":"Information and Communications Security","author":"C. Lee","year":"2002","unstructured":"Lee, C., Hong, D., Lee, S., Lee, S., Yang, H., Lim, J.: A Chosen Plaintext Linear Attack on Block Cipher CIKS-1. In: Deng, R.H., Qing, S., Bao, F., Zhou, J. (eds.) ICICS 2002. LNCS, vol.\u00a02513, pp. 456\u2013468. Springer, Heidelberg (2002)"},{"issue":"1","key":"12_CR6","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/s00145-001-0012-9","volume":"15","author":"A.A. Moldovyan","year":"2002","unstructured":"Moldovyan, A.A., Moldovyan, N.A.: A cipher Based on Data-Dependent Permutations. Journal of Cryptology\u00a015(1), 61\u201372 (2002)","journal-title":"Journal of Cryptology"},{"key":"12_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/978-3-540-45215-7_29","volume-title":"Computer Network Security","author":"N. Sklavos","year":"2003","unstructured":"Sklavos, N., Moldovyan, A.A., Koufopavlou, O.: Encryption and Data Dependent Permutations: Implementation Cost and Performance Evaluation. In: Gorodetsky, V., Popyack, L.J., Skormin, V.A. (eds.) MMM-ACNS 2003. LNCS, vol.\u00a02776, pp. 337\u2013348. Springer, Heidelberg (2003)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-27800-9_12.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T03:26:45Z","timestamp":1620012405000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-27800-9_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540223795","9783540278009"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-27800-9_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}