{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,7]],"date-time":"2025-12-07T13:04:51Z","timestamp":1765112691314},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642119248"},{"type":"electronic","value":"9783642119255"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-11925-5_22","type":"book-chapter","created":{"date-parts":[[2010,2,15]],"date-time":"2010-02-15T02:41:05Z","timestamp":1266201665000},"page":"318-333","source":"Crossref","is-referenced-by-count":15,"title":["Dependent Linear Approximations: The Algorithm of Biryukov and Others Revisited"],"prefix":"10.1007","author":[{"given":"Miia","family":"Hermelin","sequence":"first","affiliation":[]},{"given":"Kaisa","family":"Nyberg","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"M. Matsui","year":"1994","unstructured":"Matsui, M.: Linear Cryptanalysis Method for DES Cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 386\u2013397. Springer, Heidelberg (1994)"},{"key":"22_CR2","series-title":"Lecture Notes in Computer Science","first-page":"26","volume-title":"Advances in Cryptology - CRYPTO \u201994","author":"S. Burton","year":"1994","unstructured":"Burton, S., Kaliski, J., Robshaw, M.J.B.: Linear Cryptanalysis Using Multiple Approximations. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol.\u00a0839, pp. 26\u201339. Springer, Heidelberg (1994)"},{"key":"22_CR3","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Advances in Cryptology \u2013 CRYPTO 2004","author":"A. Biryukov","year":"2004","unstructured":"Biryukov, A., Canni\u00e8re, C.D., Quisquater, M.: On Multiple Linear Approximations. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol.\u00a03152, pp. 1\u201322. Springer, Heidelberg (2004)"},{"issue":"12","key":"22_CR4","doi-asserted-by":"publisher","first-page":"5510","DOI":"10.1109\/TIT.2006.885528","volume":"52","author":"S. Murphy","year":"2006","unstructured":"Murphy, S.: The Independence of Linear Approximations in Symmetric Cryptology. IEEE Transactions on Information Theory\u00a052(12), 5510\u20135518 (2006)","journal-title":"IEEE Transactions on Information Theory"},{"key":"22_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/978-3-540-70500-0_15","volume-title":"Information Security and Privacy","author":"M. Hermelin","year":"2008","unstructured":"Hermelin, M., Nyberg, K., Cho, J.Y.: Multidimensional Linear Cryptanalysis of Reduced Round Serpent. In: Mu, Y., Susilo, W., Seberry, J. (eds.) ACISP 2008. LNCS, vol.\u00a05107, pp. 203\u2013215. Springer, Heidelberg (2008)"},{"key":"22_CR6","series-title":"Lecture Notes in Computer Science","volume-title":"EUROCRYPT 2009 - POSTER SESSION","author":"M. Hermelin","year":"2009","unstructured":"Hermelin, M., Cho, J.Y., Nyberg, K.: Statistical Tests for Key Recovery Using Multidimensional Extension of Matsui\u2019s Algorithm 1. In: Joux, A. (ed.) EUROCRYPT 2009 - POSTER SESSION. LNCS, vol.\u00a05479. Springer, Heidelberg (2009)"},{"key":"22_CR7","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1145\/238168.238206","volume-title":"CCS 1996: Proceedings of the 3rd ACM conference on Computer and communications security","author":"S. Vaudenay","year":"1996","unstructured":"Vaudenay, S.: An experiment on DES statistical cryptanalysis. In: CCS 1996: Proceedings of the 3rd ACM conference on Computer and communications security, pp. 139\u2013147. ACM, New York (1996)"},{"key":"22_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/978-3-642-03317-9_13","volume-title":"Fast Software Encryption","author":"M. Hermelin","year":"2009","unstructured":"Hermelin, M., Cho, J.Y., Nyberg, K.: Multidimensional Extension of Matsui\u2019s Algorithm 2. In: Dunkelman, O. (ed.) Fast Software Encryption. LNCS, vol.\u00a05665, pp. 209\u2013227. Springer, Heidelberg (2009)"},{"key":"22_CR9","doi-asserted-by":"crossref","unstructured":"G\u00e9rard, B., Tillich, J.: On linear cryptanalysis with many linear approximations (2009)","DOI":"10.1007\/978-3-642-10868-6_8"},{"key":"22_CR10","unstructured":"Hermelin, M., Nyberg, K.: Multidimensional Linear Distinguishing Attacks and Boolean Functions. In: Fourth International Workshop on Boolean Functions: Cryptography and Applications (2008)"},{"key":"22_CR11","volume-title":"Elements of Information Theory","author":"T.M. Cover","year":"2006","unstructured":"Cover, T.M., Thomas, J.A.: 11. Wiley Series in Telecommunications and Signal Processing. In: Elements of Information Theory, 2nd edn. Wiley Interscience, Hoboken (2006)","edition":"2"},{"key":"22_CR12","volume-title":"Detection of Signals in Noise","author":"R.N. McDonough","year":"1995","unstructured":"McDonough, R.N., Whalen, A.D.: 5. In: Detection of Signals in Noise, 2nd edn. Academic Press, London (1995)","edition":"2"},{"key":"22_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1007\/978-3-540-71039-4_24","volume-title":"Fast Software Encryption","author":"B. Collard","year":"2008","unstructured":"Collard, B., Standaert, F.X., Quisquater, J.J.: Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol.\u00a05086, pp. 382\u2013397. Springer, Heidelberg (2008)"},{"key":"22_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1007\/978-3-540-85093-9_20","volume-title":"Information Theoretic Security","author":"T. Baign\u00e8res","year":"2008","unstructured":"Baign\u00e8res, T., Vaudenay, S.: The Complexity of Distinguishing Distributions (Invited Talk). In: Safavi-Naini, R. (ed.) ICITS 2008. LNCS, vol.\u00a05155, pp. 210\u2013222. Springer, Heidelberg (2008)"},{"key":"22_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"432","DOI":"10.1007\/978-3-540-30539-2_31","volume-title":"Advances in Cryptology - ASIACRYPT 2004","author":"T. Baign\u00e8res","year":"2004","unstructured":"Baign\u00e8res, T., Junod, P., Vaudenay, S.: How Far Can We Go Beyond Linear Cryptanalysis? In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol.\u00a03329, pp. 432\u2013450. Springer, Heidelberg (2004)"},{"key":"22_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1007\/3-540-69710-1_15","volume-title":"Fast Software Encryption","author":"E. Biham","year":"1998","unstructured":"Biham, E., Anderson, R., Knudsen, L.: Serpent: A New Block Cipher Proposal. In: Vaudenay, S. (ed.) FSE 1998. LNCS, vol.\u00a01372, pp. 222\u2013238. Springer, Heidelberg (1998)"},{"issue":"1","key":"22_CR17","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/s00145-007-9013-7","volume":"21","author":"A.A. Sel\u00e7uk","year":"2008","unstructured":"Sel\u00e7uk, A.A.: On probability of success in linear and differential cryptanalysis. Journal of Cryptology\u00a021(1), 131\u2013147 (2008)","journal-title":"Journal of Cryptology"},{"issue":"3","key":"22_CR18","doi-asserted-by":"publisher","first-page":"569","DOI":"10.1109\/18.6037","volume":"34","author":"G.Z. Xiao","year":"1988","unstructured":"Xiao, G.Z., Massey, J.L.: A Spectral Characterization of Correlation-Immune Combining Functions. IEEE Transactions on Information Theory\u00a034(3), 569\u2013571 (1988)","journal-title":"IEEE Transactions on Information Theory"},{"key":"22_CR19","volume-title":"Statistical Inference","author":"V.K. Rohatgi","year":"1984","unstructured":"Rohatgi, V.K.: 6.7. Wiley Series in Probability and Mathematical Statistics. In: Statistical Inference, 1st edn. John Wiley & Sons, New York (1984)","edition":"1"}],"container-title":["Lecture Notes in Computer Science","Topics in Cryptology - CT-RSA 2010"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-11925-5_22.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T21:45:24Z","timestamp":1606167924000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-11925-5_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642119248","9783642119255"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-11925-5_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}