{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T12:26:03Z","timestamp":1744892763926},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642041167"},{"type":"electronic","value":"9783642041174"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-04117-4_5","type":"book-chapter","created":{"date-parts":[[2010,2,22]],"date-time":"2010-02-22T11:44:00Z","timestamp":1266839040000},"page":"81-89","source":"Crossref","is-referenced-by-count":1,"title":["Block Cipher Cryptanalysis"],"prefix":"10.1007","author":[{"given":"Christopher","family":"Swenson","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"issue":"4","key":"5_CR1","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1109\/TIT.1980.1056220","volume":"26","author":"M. Hellman","year":"1980","unstructured":"M.\u00a0Hellman: A cryptanlaytic time\u2013memory trade-off, IEEE Trans. Inf. Theory 26(4), 401\u2013406 (1980)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"5_CR2","doi-asserted-by":"crossref","first-page":"617","DOI":"10.1007\/978-3-540-45146-4_36","volume-title":"Advances in Cryptology \u2013 CRYPTO 2003","author":"P. Oechslin","year":"2003","unstructured":"P.\u00a0Oechslin: Making a faster cryptanalytic time-memory trade-off. In: Advances in Cryptology \u2013 CRYPTO 2003 (Springer, Berlin 2003) pp. 617\u2013630"},{"key":"5_CR3","volume-title":"Cryptography and Data Security","author":"D. Denning","year":"1982","unstructured":"D.\u00a0Denning: Cryptography and Data Security (Addison-Wesley, Reading 1982)"},{"key":"5_CR4","first-page":"2","volume-title":"Advances in Cryptology \u2013 Crypto \u201990","author":"E. Biham","year":"1990","unstructured":"E.\u00a0Biham, A.\u00a0Shamir: Differential cryptanalysis of DES-like cryptosystems (extended abstract). In: Advances in Cryptology \u2013 Crypto \u201990, ed. by A.J.\u00a0Menezes, S.A.\u00a0Vanstone (Springer, Berlin 1990) pp. 2\u201321"},{"issue":"3","key":"5_CR5","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1080\/0161-110291890885","volume":"26","author":"H. Heys","year":"2002","unstructured":"H.\u00a0Heys: A tutorial on linear and differential cryptanalysis, Cryptologia 26(3), 189\u2013221 (2002)","journal-title":"Cryptologia"},{"key":"5_CR6","volume-title":"Applied Cryptography","author":"B. Schneier","year":"1996","unstructured":"B.\u00a0Schneier: Applied Cryptography (Wiley, New York 1996)"},{"key":"5_CR7","volume-title":"Modern Cryptanlaysis","author":"C. Swenson","year":"2008","unstructured":"C.\u00a0Swenson: Modern Cryptanlaysis (Wiley, New York 2008)"}],"container-title":["Handbook of Information and Communication Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04117-4_5.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T06:57:27Z","timestamp":1619765847000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04117-4_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642041167","9783642041174"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04117-4_5","relation":{},"subject":[],"published":{"date-parts":[[2010]]}}}