{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:37:35Z","timestamp":1767339455260},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642041587"},{"type":"electronic","value":"9783642041594"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04159-4_28","type":"book-chapter","created":{"date-parts":[[2009,8,22]],"date-time":"2009-08-22T05:19:34Z","timestamp":1250918374000},"page":"429-441","source":"Crossref","is-referenced-by-count":15,"title":["New Linear Cryptanalytic Results of Reduced-Round of CAST-128 and CAST-256"],"prefix":"10.1007","author":[{"given":"Meiqin","family":"Wang","sequence":"first","affiliation":[]},{"given":"Xiaoyun","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Changhui","family":"Hu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"28_CR1","doi-asserted-by":"crossref","unstructured":"Adams, C., Tavares, S.: The CAST-128 Encryption Algorithm. RFC 2144 (May 1997)","DOI":"10.17487\/rfc2144"},{"key":"28_CR2","unstructured":"GnuPG, Gnu Privacy Guard, http:\/\/www.gnupg.org\/en\/features.html"},{"key":"28_CR3","unstructured":"PGP, Pretty Good Privacy, http:\/\/www.pgp.com\/"},{"key":"28_CR4","doi-asserted-by":"crossref","unstructured":"Adams, C., Gilchrist, J.: The CAST-256 Encryption Algorithm. RFC 2612 (June 1999)","DOI":"10.17487\/rfc2612"},{"key":"28_CR5","unstructured":"First AES Candidate Conference, http:\/\/csrc.nist.gov\/archive\/aes\/round1\/conf1\/aes1conf.htm"},{"key":"28_CR6","unstructured":"Biham, E.: A Note on Comparing the AES Candidates, The AES Development Process, http:\/\/csrc.nist.gov\/archive\/aes\/round1\/conf2\/papers\/biham2.pdf"},{"issue":"4","key":"28_CR7","first-page":"913","volume":"84A","author":"H. Seki.","year":"2001","unstructured":"Seki., H., Kaneko., T.: Differential Cryptanalysis of CAST-256 Reduced to Nine Quad-rounds. Leice Transactions on Fundamentals of Electronics Communications and Computer Sciences\u00a0E84A(4), 913\u2013918 (2001)","journal-title":"Leice Transactions on Fundamentals of Electronics Communications and Computer Sciences"},{"key":"28_CR8","doi-asserted-by":"crossref","unstructured":"Nakahara Jr., J., Rasmussen, M.: Linear Analysis of Reduced-round CAST-128 and CAST-256, SBSEG2007, pp.45\u201355 (2007)","DOI":"10.5753\/sbseg.2007.20914"},{"key":"28_CR9","unstructured":"NBS, Data Encryption Standard (DES), FIPS PUB 46, Federal Information Processing Standards Publication 46, U.S. Department of Commerce (January 1977)"},{"key":"28_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"M. Matsui","year":"1994","unstructured":"Matsui, M.: Linear cryptanalysis method for DES cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 386\u2013397. Springer, Heidelberg (1994)"},{"key":"28_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1007\/3-540-48519-8_12","volume-title":"Fast Software Encryption","author":"D. Wagner","year":"1999","unstructured":"Wagner, D.: The boomerang attack. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol.\u00a01636, p. 156. Springer, Heidelberg (1999)"}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04159-4_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,26]],"date-time":"2023-05-26T12:15:16Z","timestamp":1685103316000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04159-4_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642041587","9783642041594"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04159-4_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}