{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T14:17:55Z","timestamp":1775053075281,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540226680","type":"print"},{"value":"9783540286288","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-28628-8_1","type":"book-chapter","created":{"date-parts":[[2010,9,20]],"date-time":"2010-09-20T20:54:02Z","timestamp":1285016042000},"page":"1-22","source":"Crossref","is-referenced-by-count":78,"title":["On Multiple Linear Approximations"],"prefix":"10.1007","author":[{"given":"Alex","family":"Biryukov","sequence":"first","affiliation":[]},{"given":"Christophe","family":"De Canni\u00e8re","sequence":"additional","affiliation":[]},{"given":"Micha\u00ebl","family":"Quisquater","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Biryukov, A., De Canni\u00e8re, C., Quisquater, M.: On multiple linear approximations (extended version). Cryptology ePrint Archive: Report 2004\/057, http:\/\/eprint.iacr.org\/2004\/057\/","DOI":"10.1007\/978-3-540-28628-8_1"},{"key":"1_CR2","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The Design of Rijndael: AES \u2014 The Advanced Encryption Standard","author":"J. Daemen","year":"2002","unstructured":"Daemen, J., Rijmen, V.: The Design of Rijndael: AES \u2014 The Advanced Encryption Standard. Springer, Heidelberg (2002)"},{"key":"1_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/3-540-39200-9_2","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"P. Junod","year":"2003","unstructured":"Junod, P.: On the optimality of linear, differential, and sequential distinguishers. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656, pp. 17\u201332. Springer, Heidelberg (2003)"},{"key":"1_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-39887-5_18","volume-title":"Fast Software Encryption","author":"P. Junod","year":"2003","unstructured":"Junod, P., Vaudenay, S.: Optimal key ranking procedures in a statistical cryptanalysis. In: Johansson, T. (ed.) FSE 2003. LNCS, vol.\u00a02887, pp. 1\u201315. Springer, Heidelberg (2003)"},{"key":"1_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1007\/3-540-48658-5_4","volume-title":"Advances in Cryptology - CRYPTO \u201994","author":"B.S. Kaliski","year":"1994","unstructured":"Kaliski, B.S., Robshaw, M.J.: Linear cryptanalysis using multiple approximations. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol.\u00a0839, pp. 26\u201339. Springer, Heidelberg (1994)"},{"key":"1_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1007\/3-540-44706-7_18","volume-title":"Fast Software Encryption","author":"L.R. Knudsen","year":"2001","unstructured":"Knudsen, L.R., Mathiassen, J.E.: A chosen-plaintext linear attack on DES. In: Schneier, B. (ed.) FSE 2000. LNCS, vol.\u00a01978, pp. 262\u2013272. Springer, Heidelberg (2001)"},{"key":"1_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1007\/3-540-68339-9_20","volume-title":"Advances in Cryptology - EUROCRYPT \u201996","author":"L.R. Knudsen","year":"1996","unstructured":"Knudsen, L.R., Robshaw, M.J.B.: Non-linear approximations in linear cryptanalysis. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol.\u00a01070, pp. 224\u2013236. Springer, Heidelberg (1996)"},{"key":"1_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"M. Matsui","year":"1994","unstructured":"Matsui, M.: Linear cryptanalysis method for DES cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 386\u2013397. Springer, Heidelberg (1994)"},{"key":"1_CR9","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Advances in Cryptology - CRYPTO \u201994","author":"M. Matsui","year":"1994","unstructured":"Matsui, M.: The first experimental cryptanalysis of the Data Encryption Standard. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol.\u00a0839, pp. 1\u201311. Springer, Heidelberg (1994)"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Matsui, M.: Linear cryptanalysis method for DES cipher (I) (extended paper), unpublished (1994)","DOI":"10.1007\/3-540-48285-7_33"},{"key":"1_CR11","unstructured":"Murphy, S., Piper, F., Walker, M., Wild, P.: Likelihood estimation for block cipher keys. Technical report, Information Security Group, Royal Holloway, University of London (1995)"},{"key":"1_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1007\/3-540-36413-7_13","volume-title":"Security in Communication Networks","author":"A.A. Sel\u00e7uk","year":"2003","unstructured":"Sel\u00e7uk, A.A.: On probability of success in linear and differential cryptanalysis. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, vol.\u00a02576, pp. 174\u2013185. Springer, Heidelberg (2003), Also available at https:\/\/www.cerias.purdue.edu\/papers\/archive\/2002-02.ps"},{"key":"1_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1007\/BFb0055729","volume-title":"Advances in Cryptology - CRYPTO \u201998","author":"T. Shimoyama","year":"1998","unstructured":"Shimoyama, T., Kaneko, T.: Quadratic relation of s-box and its application to the linear attack of full round des. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol.\u00a01462, pp. 200\u2013211. Springer, Heidelberg (1998)"},{"key":"1_CR14","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1145\/238168.238206","volume-title":"3rd ACM Conference on Computer and Communications Security, CCS","author":"S. Vaudenay","year":"1996","unstructured":"Vaudenay, S.: An experiment on DES statistical cryptanalysis. In: 3rd ACM Conference on Computer and Communications Security, CCS, pp. 139\u2013147. ACM Press, New York (1996)"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 CRYPTO 2004"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-28628-8_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,4]],"date-time":"2019-06-04T23:17:47Z","timestamp":1559690267000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-28628-8_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540226680","9783540286288"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-28628-8_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004]]}}}