{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,7]],"date-time":"2025-12-07T13:05:09Z","timestamp":1765112709966,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642033162"},{"type":"electronic","value":"9783642033179"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-03317-9_18","type":"book-chapter","created":{"date-parts":[[2009,7,11]],"date-time":"2009-07-11T05:16:40Z","timestamp":1247289400000},"page":"296-307","source":"Crossref","is-referenced-by-count":8,"title":["Cryptanalysis of the ISDB Scrambling Algorithm (MULTI2)"],"prefix":"10.1007","author":[{"given":"Jean-Philippe","family":"Aumasson","sequence":"first","affiliation":[]},{"suffix":"Jr.","given":"Jorge","family":"Nakahara","sequence":"additional","affiliation":[]},{"given":"Pouyan","family":"Sepehrdad","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","unstructured":"Aoki, K., Kurokawa, K.: A study on linear cryptanalysis of Multi2 (in Japanese). In: The 1995 Symposium on Cryptography and Information Security, SCIS 1995 (1995)"},{"key":"18_CR2","unstructured":"ARIB. STD B25 v. 5.0 (2007), \n                    \n                      http:\/\/www.arib.or.jp\/"},{"issue":"4","key":"18_CR3","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/BF00203965","volume":"7","author":"E. Biham","year":"1994","unstructured":"Biham, E.: New types of cryptanalytic attacks using related keys. Journal of Cryptology\u00a07(4), 229\u2013246 (1994)","journal-title":"Journal of Cryptology"},{"key":"18_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/3-540-48519-8_18","volume-title":"Fast Software Encryption","author":"A. Biryukov","year":"1999","unstructured":"Biryukov, A., Wagner, D.: Slide attacks. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol.\u00a01636, pp. 245\u2013259. Springer, Heidelberg (1999)"},{"key":"18_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"589","DOI":"10.1007\/3-540-45539-6_41","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"A. Biryukov","year":"2000","unstructured":"Biryukov, A., Wagner, D.: Advanced slide attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 589\u2013606. Springer, Heidelberg (2000)"},{"key":"18_CR6","unstructured":"BS Conditional Access Systems Co., Ltd., \n                    \n                      http:\/\/www.b-cas.co.jp\/"},{"key":"18_CR7","unstructured":"Hitachi: Japanese laid-open patent application no. H1-276189 (1998)"},{"key":"18_CR8","unstructured":"ISO. Algorithm registry entry 9979\/0009 (1994)"},{"key":"18_CR9","unstructured":"Katagi, T., Inoue, T., Shimoyama, T., Tsujii, S.: A correlation attack on block ciphers with arithmetic operations (in Japanese). In: SCIS (2003), reference no. SCIS2003 5D-2"},{"key":"18_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"M. Matsui","year":"1993","unstructured":"Matsui, M.: Linear cryptoanalysis method for DES cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 386\u2013397. Springer, Heidelberg (1993)"},{"issue":"9","key":"18_CR11","first-page":"61","volume":"77","author":"M. Matsui","year":"1994","unstructured":"Matsui, M., Yamagishi, A.: On a statistical attack of secret key cryptosystems. Electronics and Communications in Japan, Part III: Fundamental Electronic Science (English translation of Denshi Tsushin Gakkai Ronbunshi)\u00a077(9), 61\u201372 (1994)","journal-title":"Electronics and Communications in Japan, Part III: Fundamental Electronic Science (English translation of Denshi Tsushin Gakkai Ronbunshi)"},{"key":"18_CR12","volume-title":"Handbook of Applied Cryptography","author":"A.J. Menezes","year":"1997","unstructured":"Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)"},{"key":"18_CR13","unstructured":"Takaragi, K., Nakagawa, F., Sasaki, R.: U.S. patent no. 4982429 (1989)"},{"key":"18_CR14","unstructured":"Takaragi, K., Nakagawa, F., Sasaki, R.: U.S. patent no. 5103479 (1990)"},{"key":"18_CR15","volume-title":"8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security (CMS)","author":"R.-P. Weinmann","year":"2004","unstructured":"Weinmann, R.-P., Wirt, K.: Analysis of the DVB common scrambling algorithm. In: 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security (CMS). Springer, Heidelberg (2004)"},{"key":"18_CR16","unstructured":"Wikipedia. Mobaho! (accessed February 5, 2009)"},{"key":"18_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1007\/11424826_61","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2005","author":"K. Wirt","year":"2005","unstructured":"Wirt, K.: Fault attack on the DVB common scrambling algorithm. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Lagan\u00e1, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol.\u00a03481, pp. 577\u2013584. Springer, Heidelberg (2005)"},{"issue":"1","key":"18_CR18","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1109\/JPROC.2005.859708","volume":"94","author":"T. Yoshimura","year":"2006","unstructured":"Yoshimura, T.: Conditional access system for digital broadcasting in Japan. Proceedings of the IEEE\u00a094(1), 318\u2013322 (2006)","journal-title":"Proceedings of the IEEE"}],"container-title":["Lecture Notes in Computer Science","Fast Software Encryption"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-03317-9_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,29]],"date-time":"2020-01-29T14:17:40Z","timestamp":1580307460000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-03317-9_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642033162","9783642033179"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-03317-9_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}