{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T11:22:04Z","timestamp":1774524124559,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540406747","type":"print"},{"value":"9783540451464","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-45146-4_12","type":"book-chapter","created":{"date-parts":[[2010,6,22]],"date-time":"2010-06-22T21:51:19Z","timestamp":1277243479000},"page":"195-211","source":"Crossref","is-referenced-by-count":28,"title":["Cryptanalysis of Safer++"],"prefix":"10.1007","author":[{"given":"Alex","family":"Biryukov","sequence":"first","affiliation":[]},{"given":"Christophe","family":"De Canni\u00e8re","sequence":"additional","affiliation":[]},{"given":"Gustaf","family":"Dellkrantz","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4613-9314-6","volume-title":"Differential Cryptanalysis of the Data Encryption Standard","author":"E. Biham","year":"1993","unstructured":"Biham, E., Shamir, A.: Differential Cryptanalysis of the Data Encryption Standard. Springer, Heidelberg (1993)"},{"key":"12_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"394","DOI":"10.1007\/3-540-44987-6_24","volume-title":"Advances in Cryptology - EUROCRYPT 2001","author":"A. Biryukov","year":"2001","unstructured":"Biryukov, A., Shamir, A.: Structural cryptanalysis of SASAS. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.\u00a02045, pp. 394\u2013405. Springer, Heidelberg (2001)"},{"key":"12_CR3","unstructured":"Gilbert, H., Minier, M.: A collision attack on seven rounds of Rijndael. In: Proceedings of the Third AES Candidate Conference. National Institute of Standards and Technology, pp. 230\u2013241 (April 2000)"},{"key":"12_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1007\/3-540-68697-5_19","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"J. Kelsey","year":"1996","unstructured":"Kelsey, J., Schneier, B., Wagner, D.: Key-schedule cryptanalysis of 3-WAY, IDEA, G-DES, RC4, SAFER, and Triple-DES. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 237\u2013251. Springer, Heidelberg (1996)"},{"key":"12_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1007\/3-540-60590-8_16","volume-title":"Fast Software Encryption","author":"L.R. Knudsen","year":"1995","unstructured":"Knudsen, L.R.: Truncated and higher order differentials. In: Preneel, B. (ed.) FSE 1994. LNCS, vol.\u00a01008, pp. 196\u2013211. Springer, Heidelberg (1995)"},{"issue":"4","key":"12_CR6","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1007\/s001450010004","volume":"13","author":"L.R. Knudsen","year":"2000","unstructured":"Knudsen, L.R.: A detailed analysis of SAFER K. Journal of Cryptology\u00a013(4), 417\u2013436 (2000)","journal-title":"Journal of Cryptology"},{"key":"12_CR7","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Fast Software Encryption","author":"J.L. Massey","year":"1994","unstructured":"Massey, J.L.: SAFER K-64: A byte-oriented block-ciphering algorithm. In: Anderson, R. (ed.) FSE 1993. LNCS, vol.\u00a0809, pp. 1\u201317. Springer, Heidelberg (1994)"},{"key":"12_CR8","unstructured":"Massey, J.L.: On the optimality of SAFER+ diffusion. In: Proceedings of the Second AES Candidate Conference, National Institute of Standards and Technology (March 1999)"},{"key":"12_CR9","unstructured":"Massey, J.L., Khachatrian, G.H., Kuregian, M.K.: Nomination of SAFER++ as candidate algorithm for the New European Schemes for Signatures, Integrity, and Encryption (NESSIE). Primitive submitted to NESSIE by Cylink Corp. (September 2000)"},{"key":"12_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"M. Matsui","year":"1994","unstructured":"Matsui, M.: Linear cryptanalysis method for DES cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 386\u2013397. Springer, Heidelberg (1994)"},{"issue":"4","key":"12_CR11","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/s001459900046","volume":"11","author":"S. Murphy","year":"1998","unstructured":"Murphy, S.: An analysis of SAFER. Journal of Cryptology\u00a011(4), 235\u2013251 (1998)","journal-title":"Journal of Cryptology"},{"key":"12_CR12","unstructured":"Nakahara Jr, J.: Cryptanalysis and Design of Block Ciphers. PhD thesis, Katholieke Universiteit Leuven (June 2003)"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Nakahara Jr, J., Preneel, B., Vandewalle, J.: Linear cryptanalysis of reducedround versions of the SAFER block cipher family. In: Schneier, B. (ed.) FSE 2000. LNCS, vol.\u00a01978, pp. 244\u2013261. Springer, Heidelberg (2001)","DOI":"10.1007\/3-540-44706-7_17"},{"key":"12_CR14","unstructured":"NESSIE Project \u2013 New European Schemes for Signatures, Integrity and Encryption, http:\/\/cryptonessie.org"},{"key":"12_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1007\/3-540-48519-8_12","volume-title":"Fast Software Encryption","author":"D. Wagner","year":"1999","unstructured":"Wagner, D.: The boomerang attack. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol.\u00a01636, pp. 156\u2013170. Springer, Heidelberg (1999)"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology - CRYPTO 2003"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-45146-4_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T09:52:00Z","timestamp":1559209920000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-45146-4_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540406747","9783540451464"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-45146-4_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2003]]}}}