{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T13:01:21Z","timestamp":1772283681095,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":34,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540239758","type":"print"},{"value":"9783540305392","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30539-2_31","type":"book-chapter","created":{"date-parts":[[2010,3,12]],"date-time":"2010-03-12T08:41:57Z","timestamp":1268383317000},"page":"432-450","source":"Crossref","is-referenced-by-count":116,"title":["How Far Can We Go Beyond Linear Cryptanalysis?"],"prefix":"10.1007","author":[{"given":"Thomas","family":"Baign\u00e8res","sequence":"first","affiliation":[]},{"given":"Pascal","family":"Junod","sequence":"additional","affiliation":[]},{"given":"Serge","family":"Vaudenay","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"31_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1007\/3-540-45708-9_33","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"D. Coppersmith","year":"2002","unstructured":"Coppersmith, D., Halevi, S., Jutla, C.: Cryptanalysis of stream ciphers with linear masking. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.\u00a02442, pp. 515\u2013532. Springer, Heidelberg (2002)"},{"key":"31_CR2","series-title":"Wiley Series in Telecommunications","doi-asserted-by":"publisher","DOI":"10.1002\/0471200611","volume-title":"Elements of Information Theory","author":"T. Cover","year":"1991","unstructured":"Cover, T., Thomas, J.: Elements of Information Theory. Wiley Series in Telecommunications. John Wiley & Sons, Chichester (1991)"},{"key":"31_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1007\/3-540-60590-8_21","volume-title":"Fast Software Encryption - FSE 1994","author":"J. Daemen","year":"1995","unstructured":"Daemen, J., Govaerts, R., Vandewalle, J.: Correlation matrices. In: Preneel, B. (ed.) FSE 1994. LNCS, vol.\u00a01008, pp. 275\u2013285. Springer, Heidelberg (1995)"},{"key":"31_CR4","series-title":"Information Security and Cryptography","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The Design of Rijndael","author":"J. Daemen","year":"2002","unstructured":"Daemen, J., Rijmen, V.: The Design of Rijndael. Information Security and Cryptography. Springer, Heidelberg (2002)"},{"key":"31_CR5","series-title":"Wiley Series in Probability and Mathematical Statistics","volume-title":"An Introduction to Probability Theory and Its Applications","author":"W. Feller","year":"1968","unstructured":"Feller, W.: An Introduction to Probability Theory and Its Applications, 3rd edn. Wiley Series in Probability and Mathematical Statistics. John Wiley & Sons, Chichester (1968)","edition":"3"},{"key":"31_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BFb0052330","volume-title":"Fast Software Encryption","author":"H. Handschuh","year":"1997","unstructured":"Handschuh, H., Gilbert, H.: \u03c7 2 cryptanalysis of the SEAL encryption algorithm. In: Biham, E. (ed.) FSE 1997. LNCS, vol.\u00a01267, pp. 1\u201312. Springer, Heidelberg (1997)"},{"key":"31_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1007\/3-540-49264-X_3","volume-title":"Advances in Cryptology - EUROCRYPT \u201995","author":"C. Harpes","year":"1995","unstructured":"Harpes, C., Kramer, G., Massey, J.: A generalization of linear cryptanalysis and the applicability of Matsui\u2019s piling-up lemma. In: Guillou, L.C., Quisquater, J.-J. (eds.) EUROCRYPT 1995. LNCS, vol.\u00a0921, pp. 24\u201338. Springer, Heidelberg (1995)"},{"key":"31_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/BFb0052331","volume-title":"Fast Software Encryption","author":"C. Harpes","year":"1997","unstructured":"Harpes, C., Massey, J.: Partitioning cryptanalysis. In: Biham, E. (ed.) FSE 1997. LNCS, vol.\u00a01267, pp. 13\u201327. Springer, Heidelberg (1997)"},{"key":"31_CR9","unstructured":"Jakobsen, T.: Higher-order cryptanalysis of block ciphers. PhD thesis, Department of Mathematics, Technical University of Denmark (1999)"},{"key":"31_CR10","unstructured":"Jakobsen, T., Harpes, C.: Non-uniformity measures for generalized linear cryptanalysis and partitioning cryptanalysis. In: Pribyl, J. (ed.) Pragocrypt 1996. CTU Publishing House (1996)"},{"key":"31_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/3-540-39200-9_2","volume-title":"Advances in Cryptology - Eurocrypt 2003","author":"P. Junod","year":"2003","unstructured":"Junod, P.: On the optimality of linear, differential and sequential distinguishers. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656, pp. 17\u201332. Springer, Heidelberg (2003)"},{"key":"31_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/978-3-540-39887-5_18","volume-title":"Fast Software Encryption","author":"P. Junod","year":"2003","unstructured":"Junod, P., Vaudenay, S.: Optimal key ranking procedures in a statistical cryptanalysis. In: Johansson, T. (ed.) FSE 2003. LNCS, vol.\u00a02887, pp. 235\u2013246. Springer, Heidelberg (2003)"},{"key":"31_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1007\/3-540-48658-5_4","volume-title":"Advances in Cryptology - CRYPTO \u201994","author":"B. Kaliski","year":"1994","unstructured":"Kaliski, B., Robshaw, M.: Linear cryptanalysis using multiple approximations. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol.\u00a0839, pp. 26\u201339. Springer, Heidelberg (1994)"},{"key":"31_CR14","doi-asserted-by":"crossref","unstructured":"Kelsey, J., Schneier, B., Wagner, D.: modn cryptanalysis, with applications against RC5P and M6. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol.\u00a01636, pp. 139\u2013155. Springer, Heidelberg (1999)","DOI":"10.1007\/3-540-48519-8_11"},{"key":"31_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1007\/3-540-68339-9_20","volume-title":"Advances in Cryptology - EUROCRYPT \u201996","author":"L. Knudsen","year":"1996","unstructured":"Knudsen, L., Robshaw, M.: Non-linear approximations in linear cryptanalysis. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol.\u00a01070, pp. 224\u2013236. Springer, Heidelberg (1996)"},{"key":"31_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1007\/3-540-46416-6_2","volume-title":"Advances in Cryptology - EUROCRYPT \u201991","author":"X. Lai","year":"1991","unstructured":"Lai, X., Massey, J., Murphy, S.: Markov ciphers and differential cryptanalysis. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol.\u00a0547, pp. 17\u201338. Springer, Heidelberg (1991)"},{"key":"31_CR17","unstructured":"Lim, C.H.: CRYPTON: A new 128-bit block cipher. In: The First AES Candidate Conference. National Institute for Standards and Technology (1998)"},{"key":"31_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/3-540-48519-8_3","volume-title":"Fast Software Encryption","author":"C.H. Lim","year":"1999","unstructured":"Lim, C.H.: A revised version of CRYPTON: CRYPTON V1.0. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol.\u00a01636, pp. 31\u201345. Springer, Heidelberg (1999)"},{"key":"31_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1007\/978-3-540-30539-2_34","volume-title":"Advances in Cryptology - ASIACRYPT 2004","author":"Y. Lu","year":"2004","unstructured":"Lu, Y., Vaudenay, S.: Cryptanalysis of Bluetooth Keystream Generator Two-level E0. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol.\u00a03329, pp. 483\u2013499. Springer, Heidelberg (2004)"},{"key":"31_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1007\/978-3-540-28628-8_25","volume-title":"Advances in Cryptology \u2013 CRYPTO 2004","author":"Y. Lu","year":"2004","unstructured":"Lu, Y., Vaudenay, S.: Faster correlation attack on Bluetooth keystream generator E0. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol.\u00a03152, pp. 407\u2013425. Springer, Heidelberg (2004)"},{"key":"31_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"M. Matsui","year":"1994","unstructured":"Matsui, M.: Linear cryptanalysis method for DES cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 386\u2013397. Springer, Heidelberg (1994)"},{"key":"31_CR22","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Advances in Cryptology - CRYPTO \u201994","author":"M. Matsui","year":"1994","unstructured":"Matsui, M.: The first experimental cryptanalysis of the Data Encryption Standard. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol.\u00a0839, pp. 1\u201311. Springer, Heidelberg (1994)"},{"key":"31_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1007\/3-540-60865-6_54","volume-title":"Fast Software Encryption - FSE 1996","author":"M. Matsui","year":"1996","unstructured":"Matsui, M.: New structure of block ciphers with provable security against differential and linear cryptanalysis. In: Gollman, D. (ed.) FSE 1996. LNCS, vol.\u00a01039, pp. 205\u2013218. Springer, Heidelberg (1996)"},{"key":"31_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/3-540-44706-7_9","volume-title":"Fast Software Encryption","author":"M. Minier","year":"2001","unstructured":"Minier, M., Gilbert, H.: Stochastic cryptanalysis of Crypton. In: Schneier, B. (ed.) FSE 2000. LNCS, vol.\u00a01978, pp. 121\u2013133. Springer, Heidelberg (2001)"},{"key":"31_CR25","unstructured":"Murphy, S., Piper, F., Walker, M., Wild, P.: Likelihood estimation for block cipher keys. Technical report, Information Security Group, University of London, England (1995)"},{"key":"31_CR26","unstructured":"National Institute of Standards and Technology, U. S. Department of Commerce. Data Encryption Standard, NIST FIPS PUB 46-2 (1993)"},{"key":"31_CR27","unstructured":"Parker, M.: Generalized S-Box linearity. Technical report nes\/doc\/uib\/wp5\/020\/a, NESSIE Project (2003), Available on https:\/\/www.cryptonessie.org"},{"key":"31_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1007\/BFb0055729","volume-title":"Advances in Cryptology - CRYPTO \u201998","author":"T. Shimoyama","year":"1998","unstructured":"Shimoyama, T., Kaneko, T.: Quadratic relation of S-Box and its application to the linear attack of full round DES. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol.\u00a01462, pp. 200\u2013211. Springer, Heidelberg (1998)"},{"key":"31_CR29","unstructured":"Standaert, F.-X., Rouvroy, G., Piret, G., Quisquater, J.-J., Legat, J.-D.: Key-dependent approximations in cryptanalysis: an application of multiple Z4 and non-linear approximations. In: 24th Symposium on Information Theory in the Benelux (2003)"},{"key":"31_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1007\/3-540-46766-1_12","volume-title":"Advances in Cryptology - CRYPTO \u201991","author":"A. Tardy-Corfdir","year":"1992","unstructured":"Tardy-Corfdir, A., Gilbert, H.: A known plaintext attack of FEAL-4 and FEAL-6. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol.\u00a0576, pp. 172\u2013182. Springer, Heidelberg (1992)"},{"key":"31_CR31","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1145\/238168.238206","volume-title":"3rd ACM Conference on Computer and Communications Security","author":"S. Vaudenay","year":"1996","unstructured":"Vaudenay, S.: An experiment on DES statistical cryptanalysis. In: 3rd ACM Conference on Computer and Communications Security, pp. 139\u2013147. ACM Press, New York (1996)"},{"key":"31_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1007\/3-540-48519-8_19","volume-title":"Fast Software Encryption","author":"S. Vaudenay","year":"1999","unstructured":"Vaudenay, S.: On the security of CS-cipher. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol.\u00a01636, pp. 260\u2013274. Springer, Heidelberg (1999)"},{"issue":"4","key":"31_CR33","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/s00145-003-0220-6","volume":"16","author":"S. Vaudenay","year":"2003","unstructured":"Vaudenay, S.: Decorrelation: a theory for block cipher security. Journal of Cryptology\u00a016(4), 249\u2013286 (2003)","journal-title":"Journal of Cryptology"},{"key":"31_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-540-25937-4_2","volume-title":"Fast Software Encryption","author":"D. Wagner","year":"2004","unstructured":"Wagner, D.: Towards a unifying view of block cipher cryptanalysis. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol.\u00a03017, pp. 16\u201333. Springer, Heidelberg (2004)"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology - ASIACRYPT 2004"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30539-2_31.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,18]],"date-time":"2020-11-18T23:59:10Z","timestamp":1605743950000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30539-2_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540239758","9783540305392"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30539-2_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004]]}}}