{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T13:46:08Z","timestamp":1773236768972,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642210303","type":"print"},{"value":"9783642210310","type":"electronic"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-21031-0_19","type":"book-chapter","created":{"date-parts":[[2011,5,6]],"date-time":"2011-05-06T06:04:00Z","timestamp":1304661840000},"page":"247-256","source":"Crossref","is-referenced-by-count":5,"title":["On the Security of 4-Bit Involutive S-Boxes for Lightweight Designs"],"prefix":"10.1007","author":[{"given":"Bozhong","family":"Liu","sequence":"first","affiliation":[]},{"given":"Zheng","family":"Gong","sequence":"additional","affiliation":[]},{"given":"Weidong","family":"Qiu","sequence":"additional","affiliation":[]},{"given":"Dong","family":"Zheng","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1007\/3-540-38424-3_1","volume-title":"Advances in Cryptology - CRYPTO \u201990","author":"E. Biham","year":"1991","unstructured":"Biham, E., Shamir, A.: Differential cryptanalysis of des-like cryptosystems. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol.\u00a0537, pp. 2\u201321. Springer, Heidelberg (1991)"},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"Daemen, J., Peeters, M., Assche, G.V., Rijmen, V.: The noekeon block cipher. The NESSIE Proposal (2000)","DOI":"10.1007\/10721064_22"},{"key":"19_CR3","unstructured":"Gong, Z., Nikova, S.I., Law, Y.W.: Klein: A new family of lightweight block ciphers. Technical Report TR-CTIT-10-33, Centre for Telematics and Information Technology, University of Twente, Enschede (May 2010)"},{"key":"19_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1007\/11767480_29","volume-title":"Applied Cryptography and Network Security","author":"P. Ke","year":"2006","unstructured":"Ke, P., Zhang, J., Wen, Q.: Results on almost resilient functions. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, vol.\u00a03989, pp. 421\u2013432. Springer, Heidelberg (2006)"},{"issue":"4","key":"19_CR5","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/s00145-001-0010-y","volume":"14","author":"K. Kurosawa","year":"2001","unstructured":"Kurosawa, K., Johansson, T., Stinson, D.R.: Almost k-wise independent sample spaces and their cryptologic applications. J. Cryptology\u00a014(4), 231\u2013253 (2001)","journal-title":"J. Cryptology"},{"key":"19_CR6","unstructured":"Knudsen, L.: Private commuication"},{"key":"19_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/978-3-540-73074-3_13","volume-title":"Arithmetic of Finite Fields","author":"G. Leander","year":"2007","unstructured":"Leander, G., Poschmann, A.: On the classification of 4 bit s-boxes. In: Carlet, C., Sunar, B. (eds.) WAIFI 2007. LNCS, vol.\u00a04547, pp. 159\u2013176. Springer, Heidelberg (2007)"},{"key":"19_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1007\/11935308_38","volume-title":"Information and Communications Security","author":"S. Nikova","year":"2006","unstructured":"Nikova, S., Rechberger, C., Rijmen, V.: Threshold implementations against side-channel attacks and glitches. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol.\u00a04307, pp. 529\u2013545. Springer, Heidelberg (2006)"},{"key":"19_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/978-3-642-00730-9_14","volume-title":"Information Security and Cryptology \u2013 ICISC 2008","author":"S. Nikova","year":"2009","unstructured":"Nikova, S., Rijmen, V., Schl\u00e4ffer, M.: Secure hardware implementation of non-linear functions in the presence of glitches. In: Lee, P., Cheon, J. (eds.) ICISC 2008. LNCS, vol.\u00a05461, pp. 218\u2013234. Springer, Heidelberg (2009)"},{"key":"19_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1007\/3-540-46416-6_32","volume-title":"Advances in Cryptology - EUROCRYPT \u201991","author":"K. Nyberg","year":"1991","unstructured":"Nyberg, K.: Perfect nonlinear s-boxes. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol.\u00a0547, pp. 378\u2013386. Springer, Heidelberg (1991)"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-21031-0_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,23]],"date-time":"2019-05-23T02:51:39Z","timestamp":1558579899000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-21031-0_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642210303","9783642210310"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-21031-0_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011]]}}}