{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T11:38:56Z","timestamp":1772797136013,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540773597","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-77360-3_15","type":"book-chapter","created":{"date-parts":[[2007,12,1]],"date-time":"2007-12-01T08:04:18Z","timestamp":1196496258000},"page":"232-245","source":"Crossref","is-referenced-by-count":11,"title":["MRHS Equation Systems"],"prefix":"10.1007","author":[{"given":"H\u00e5vard","family":"Raddum","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1007\/11502760_10","volume-title":"Fast Software Encryption","author":"C. Cid","year":"2005","unstructured":"Cid, C., Murphy, S., Robshaw, M.: Small Scale Variants of the AES. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol.\u00a03557, pp. 145\u2013162. Springer, Heidelberg (2005)"},{"key":"15_CR2","unstructured":"Courtois, N., Bard, G.: Algebraic Cryptanalysis of the Data Encryption Standard, Cryptology ePrint Archive, Report 2006\/402 (2006), http:\/\/eprint.iacr.org\/"},{"key":"15_CR3","unstructured":"Raddum, H., Semaev, I.: Solving MRHS linear equations. Extended abstract, In: International Workshop on Coding and Cryptography, April 16-20, 2007, Versailles, France (2007)"},{"key":"15_CR4","unstructured":"Raddum, H., Semaev, I.: New Technique for Solving Sparse Equation Systems, Cryptology ePrint Archive, Report 2006\/475 (2006), http:\/\/eprint.iacr.org\/"},{"key":"15_CR5","unstructured":"Raddum, H.: Cryptanalytic Results on Trivium (2006), available from http:\/\/www.ecrypt.eu.org\/stream\/triviump3.html"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Courtois, N., Pieprzyk, J.: Cryptanalysis of Block Ciphers with Overdefined Systems of Equations, Cryptology ePrint Archive, Report 2002\/044 (2002), http:\/\/eprint.iacr.org\/","DOI":"10.1007\/3-540-36178-2_17"},{"key":"15_CR7","volume-title":"The Block Cipher Rijndael","author":"V. Rijmen","year":"2002","unstructured":"Rijmen, V., Daemen, J.: The Block Cipher Rijndael. Springer, Berlin (2002)"},{"key":"15_CR8","unstructured":"US National Bureau of Standards. Data Encryption Standard, Federal Information Processing Standards Publications No. 46 (1977)"},{"key":"15_CR9","unstructured":"Anderson, R., Biham, E., Knudsen, L.: Serpent: A Proposal for the Advanced Encryption Standard (1998), available from http:\/\/www.cl.cam.ac.uk\/~rja14\/serpent.html"},{"key":"15_CR10","unstructured":"Daemen, J., Peeters, M., Van Assche, G., Rijmen, V.: Nessie Proposal: Noekeon (2000), available from http:\/\/gro.noekeon.org\/"}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77360-3_15.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T11:09:28Z","timestamp":1619521768000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77360-3_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540773597"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77360-3_15","relation":{},"subject":[]}}