{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T09:45:33Z","timestamp":1725529533767},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642007293"},{"type":"electronic","value":"9783642007309"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-00730-9_26","type":"book-chapter","created":{"date-parts":[[2009,3,17]],"date-time":"2009-03-17T07:22:23Z","timestamp":1237274543000},"page":"415-431","source":"Crossref","is-referenced-by-count":11,"title":["Higher Order Differential Attacks on Reduced-Round MISTY1"],"prefix":"10.1007","author":[{"given":"Yukiyasu","family":"Tsunoo","sequence":"first","affiliation":[]},{"given":"Teruo","family":"Saito","sequence":"additional","affiliation":[]},{"given":"Maki","family":"Shigeri","sequence":"additional","affiliation":[]},{"given":"Takeshi","family":"Kawabata","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"26_CR1","first-page":"33","volume":"83-A","author":"K. Aoki","year":"2000","unstructured":"Aoki, K.: Practical Evaluation of Security Against Generalized Interpolation Attack. IEICE Transactions\u00a083-A(1), 33\u201338 (2000)","journal-title":"IEICE Transactions"},{"key":"26_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1007\/3-540-45247-8_3","volume-title":"Information Security and Cryptology - ICISC 2000","author":"S. Babbage","year":"2001","unstructured":"Babbage, S., Frisch, L.: On MISTY1 higher order differential cryptanalysis. In: Won, D. (ed.) ICISC 2000. LNCS, vol.\u00a02015, pp. 22\u201336. Springer, Heidelberg (2001)"},{"issue":"1","key":"26_CR3","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E. Biham","year":"1991","unstructured":"Biham, E., Shamir, A.: Differential Cryptanalysis of DES-Like Cryptosystems. J. Cryptology\u00a04(1), 3\u201372 (1991)","journal-title":"J. Cryptology"},{"unstructured":"Cryptography Research and Evaluation Committees (CRYPTREC), \n                    \n                      http:\/\/www.cryptrec.jp\/english\/about.html","key":"26_CR4"},{"issue":"1","key":"26_CR5","first-page":"18","volume":"87-A","author":"Y. Hatano","year":"2004","unstructured":"Hatano, Y., Tanaka, H., Kaneko, T.: Optimization for the Algebraic Method and Its Application to an Attack of MISTY1. IEICE Transactions\u00a087-A(1), 18\u201327 (2004)","journal-title":"IEICE Transactions"},{"key":"26_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1007\/3-540-60590-8_16","volume-title":"Fast Software Encryption","author":"L.R. Knudsen","year":"1995","unstructured":"Knudsen, L.R.: Truncated and Higher Order Differentials. In: Preneel, B. (ed.) FSE 1994. LNCS, vol.\u00a01008, pp. 196\u2013211. Springer, Heidelberg (1995)"},{"key":"26_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1007\/3-540-45661-9_9","volume-title":"Fast Software Encryption","author":"L.R. Knudsen","year":"2002","unstructured":"Knudsen, L.R., Wagner, D.: Integral Cryptanalysis. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol.\u00a02365, pp. 112\u2013127. Springer, Heidelberg (2002)"},{"key":"26_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/3-540-44987-6_20","volume-title":"Advances in Cryptology - EUROCRYPT 2001","author":"U. K\u00fchn","year":"2001","unstructured":"K\u00fchn, U.: Cryptanalysis of Reduced-Round MISTY. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.\u00a02045, pp. 325\u2013339. Springer, Heidelberg (2001)"},{"key":"26_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/3-540-45661-9_5","volume-title":"Fast Software Encryption","author":"U. K\u00fchn","year":"2002","unstructured":"K\u00fchn, U.: Improved Cryptanalysis of MISTY1. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol.\u00a02365, pp. 61\u201375. Springer, Heidelberg (2002)"},{"issue":"2","key":"26_CR10","doi-asserted-by":"publisher","first-page":"642","DOI":"10.1093\/ietfec\/e91-a.2.642","volume":"91-A","author":"E. Lee","year":"2008","unstructured":"Lee, E., Kim, J., Hong, D., Lee, C., Sung, J., Hong, S., Lim, J.: Weak-Key Classes of 7-Round MISTY 1 and 2 for Related-Key Amplified Boomerang Attacks. IEICE Transactions\u00a091-A(2), 642\u2013649 (2008)","journal-title":"IEICE Transactions"},{"key":"26_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-45473-X_1","volume-title":"Fast Software Encryption","author":"S. Lucks","year":"2002","unstructured":"Lucks, S.: The Saturation Attack - A Bait for Twofish. In: Matsui, M. (ed.) FSE 2001. LNCS, vol.\u00a02355, pp. 1\u201315. Springer, Heidelberg (2002)"},{"key":"26_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"M. Matsui","year":"1994","unstructured":"Matsui, M.: Linear Cryptanalysis of the Data Encryption Standard. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 386\u2013397. Springer, Heidelberg (1994)"},{"key":"26_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/BFb0052334","volume-title":"Fast Software Encryption","author":"M. Matsui","year":"1997","unstructured":"Matsui, M.: New Block Encryption Algorithm MISTY. In: Biham, E. (ed.) FSE 1997. LNCS, vol.\u00a01267, pp. 54\u201368. Springer, Heidelberg (1997)"},{"key":"26_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/3-540-69710-1_2","volume-title":"Fast Software Encryption","author":"S. Moriai","year":"1998","unstructured":"Moriai, S., Shimoyama, T., Kaneko, T.: Higher Order Differential Attak of CAST Cipher. In: Vaudenay, S. (ed.) FSE 1998. LNCS, vol.\u00a01372, pp. 17\u201331. Springer, Heidelberg (1998)"},{"unstructured":"New European Schemes for Signature, Integrity, and Encryption (NESSIE), \n                    \n                      https:\/\/www.cosic.esat.kuleuven.be\/nessie\/","key":"26_CR15"},{"issue":"9","key":"26_CR16","first-page":"1971","volume":"82-A","author":"T. Shimoyama","year":"1999","unstructured":"Shimoyama, T., Moriai, S., Kaneko, T., Tsujii, S.: Improved Higher Order Differential Attack and Its Application to Nyberg-Knudsen\u2019s Designed Block Cipher. IEICE Transactions\u00a082-A(9), 1971\u20131980 (1999)","journal-title":"IEICE Transactions"},{"key":"26_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/978-3-540-77535-5_16","volume-title":"Information Security Applications","author":"H. Tanaka","year":"2008","unstructured":"Tanaka, H., Hatano, Y., Sugio, N., Kaneko, T.: Security Analysis of MISTY1. In: Kim, S., Yung, M., Lee, H.-W. (eds.) WISA 2007. LNCS, vol.\u00a04867, pp. 215\u2013226. Springer, Heidelberg (2008)"},{"doi-asserted-by":"crossref","unstructured":"Tsunoo, Y., Saito, T., Nakashima, H., Shigeri, M.: Higher Order Differential Attack on 6-Round MISTY1. IEICE Transactions\u00a092-A(1) (to appear, 2009)","key":"26_CR18","DOI":"10.1587\/transfun.E92.A.3"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology \u2013 ICISC 2008"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-00730-9_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,6]],"date-time":"2019-03-06T23:03:40Z","timestamp":1551913420000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-00730-9_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642007293","9783642007309"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-00730-9_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}