{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T16:52:11Z","timestamp":1725900731013},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642145964"},{"type":"electronic","value":"9783642145971"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14597-1_16","type":"book-chapter","created":{"date-parts":[[2010,7,9]],"date-time":"2010-07-09T13:50:13Z","timestamp":1278683413000},"page":"250-262","source":"Crossref","is-referenced-by-count":4,"title":["Bitwise Higher Order Differential Cryptanalysis"],"prefix":"10.1007","author":[{"given":"Bo","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Kefei","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Xuejia","family":"Lai","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","doi-asserted-by":"crossref","unstructured":"Winternitz, R.: A secure one-way hash function built from DES. In: Proceedings of the IEEE Symposium on Information Security and Privacy, pp. 88\u201390 (1984)","DOI":"10.1109\/SP.1984.10027"},{"key":"16_CR2","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"M. Bellare","year":"1996","unstructured":"Bellare, M., Canetti, R., Krawczyk, H.: Keying hash functions for message authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 1\u201315. Springer, Heidelberg (1996)"},{"key":"16_CR3","unstructured":"Ferguson, N.: AES-CBC + Elephant diffuser: A disk encryption algorithm for Windows Vista, http:\/\/download.microsoft.com\/"},{"key":"16_CR4","unstructured":"FIPS PUB 197: Advanced Encryption Standard (AES). National Institute of Standards and Technology, NIST (2001)"},{"key":"16_CR5","unstructured":"Trusted Computing Group: Summary of features under consideration for the next generation of TPM, http:\/\/www.trustedcomputinggroup.org\/"},{"key":"16_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1007\/978-3-540-74735-2_31","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"A. Bogdanov","year":"2007","unstructured":"Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y., Vikkelsoe, C.: PRESENT: An ultra-lightweight block cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol.\u00a04727, pp. 450\u2013466. Springer, Heidelberg (2007)"},{"key":"16_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1007\/978-3-642-04138-9_20","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2009","author":"C.D. Canni\u00e8re","year":"2009","unstructured":"Canni\u00e8re, C.D., Dunkelman, O., Knezevic, M.: KATAN and KTANTAN - a family of small and efficient hardware-oriented block ciphers. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol.\u00a05747, pp. 272\u2013288. Springer, Heidelberg (2009)"},{"issue":"1","key":"16_CR8","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E. Biham","year":"1991","unstructured":"Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. Journal of Cryptology\u00a04(1), 3\u201372 (1991)","journal-title":"Journal of Cryptology"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Lai, X.: Higher order derivatives and differential cryptanalysis. Communications and Cryptography: Two Sides of One Tapestry, 227 (1994)","DOI":"10.1007\/978-1-4615-2694-0_23"},{"key":"16_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1007\/3-540-60590-8_16","volume-title":"Fast Software Encryption","author":"L.R. Knudsen","year":"1995","unstructured":"Knudsen, L.R.: Truncated and higher order differentials. In: Preneel, B. (ed.) FSE 1994. LNCS, vol.\u00a01008, pp. 196\u2013211. Springer, Heidelberg (1995)"},{"key":"16_CR11","volume-title":"Cryptographic Boolean Functions and Applications","author":"T. Cusick","year":"2009","unstructured":"Cusick, T., Stanica, P.: Cryptographic Boolean Functions and Applications. Academic Press, London (2009)"},{"key":"16_CR12","volume-title":"Encyclopedia of Cryptography and Security","author":"C. Carlet","year":"2005","unstructured":"Carlet, C.: Boolean Function. In: Encyclopedia of Cryptography and Security. Springer, Heidelberg (2005)"},{"issue":"2","key":"16_CR13","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/s12204-009-0219-8","volume":"14","author":"Y. Luo","year":"2009","unstructured":"Luo, Y., Lai, X.: On the security of multivariate hash functions. Journal of Shanghai Jiaotong University (Science)\u00a014(2), 219\u2013222 (2009)","journal-title":"Journal of Shanghai Jiaotong University (Science)"},{"key":"16_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"447","DOI":"10.1007\/3-540-39799-X_34","volume-title":"Advances in Cryptology","author":"M. Luby","year":"1986","unstructured":"Luby, M., Rackoff, C.: How to construct pseudo-random permutations from pseudo-random functions. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol.\u00a0218, p. 447. Springer, Heidelberg (1986)"},{"key":"16_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1007\/3-540-68339-9_27","volume-title":"Advances in Cryptology - EUROCRYPT \u201996","author":"W. Aiello","year":"1996","unstructured":"Aiello, W., Venkatesan, R.: Foiling birthday attacks in length-doubling transformations - benes: A non-reversible alternative to feistel. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol.\u00a01070, pp. 307\u2013320. Springer, Heidelberg (1996)"},{"key":"16_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1007\/3-540-45661-9_9","volume-title":"Fast Software Encryption","author":"L.R. Knudsen","year":"2002","unstructured":"Knudsen, L.R., Wagner, D.: Integral cryptanalysis. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol.\u00a02365, pp. 112\u2013127. Springer, Heidelberg (2002)"},{"key":"16_CR17","unstructured":"Cho, J.Y.: Linear cryptanalysis of reduced-round PRESENT. Cryptology ePrint Archive, Report 2009\/397 (2009), http:\/\/eprint.iacr.org\/"}],"container-title":["Lecture Notes in Computer Science","Trusted Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14597-1_16.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:55:18Z","timestamp":1606186518000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14597-1_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642145964","9783642145971"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14597-1_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}