{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T23:40:10Z","timestamp":1745365210020,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642357541"},{"type":"electronic","value":"9783642357558"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-35755-8_19","type":"book-chapter","created":{"date-parts":[[2012,11,29]],"date-time":"2012-11-29T11:36:02Z","timestamp":1354188962000},"page":"264-280","source":"Crossref","is-referenced-by-count":1,"title":["A Related-Key Attack against Multiple Encryption Based on Fixed Points"],"prefix":"10.1007","author":[{"given":"Asl\u0131","family":"Bay","sequence":"first","affiliation":[]},{"given":"Atefeh","family":"Mashatan","sequence":"additional","affiliation":[]},{"given":"Serge","family":"Vaudenay","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"7","key":"19_CR1","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1145\/358699.358718","volume":"24","author":"R.C. Merkle","year":"1981","unstructured":"Merkle, R.C., Hellman, M.E.: On the Security of Multiple Encryption. Commun. ACM\u00a024(7), 465\u2013467 (1981)","journal-title":"Commun. ACM"},{"key":"19_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1007\/11761679_25","volume-title":"Advances in Cryptology - EUROCRYPT 2006","author":"M. Bellare","year":"2006","unstructured":"Bellare, M., Rogaway, P.: The Security of Triple Encryption and a Framework\u00a0for\u00a0Code-Based\u00a0Game-Playing\u00a0Proofs. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol.\u00a04004, pp. 409\u2013426. Springer, Heidelberg (2006)"},{"issue":"4","key":"19_CR3","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/BF00203965","volume":"7","author":"E. Biham","year":"1994","unstructured":"Biham, E.: New Types of Cryptanalytic Attacks Using Related Keys. J. Cryptology\u00a07(4), 229\u2013246 (1994)","journal-title":"J. Cryptology"},{"key":"19_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"398","DOI":"10.1007\/3-540-48285-7_34","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"E. Biham","year":"1994","unstructured":"Biham, E.: New Types of Cryptanalytic Attacks Using Related Keys. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 398\u2013409. Springer, Heidelberg (1994)"},{"issue":"3","key":"19_CR5","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/S0020-0190(02)00269-7","volume":"84","author":"E. Biham","year":"2002","unstructured":"Biham, E.: How to decrypt or even substitute DES-encrypted messages in 228 steps. Inf. Process. Lett.\u00a084(3), 117\u2013124 (2002)","journal-title":"Inf. Process. Lett."},{"key":"19_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-10366-7_1","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2009","author":"A. Biryukov","year":"2009","unstructured":"Biryukov, A., Khovratovich, D.: Related-Key Cryptanalysis of the Full AES-192 and AES-256. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol.\u00a05912, pp. 1\u201318. Springer, Heidelberg (2009)"},{"key":"19_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/978-3-642-03356-8_14","volume-title":"Advances in Cryptology - CRYPTO 2009","author":"A. Biryukov","year":"2009","unstructured":"Biryukov, A., Khovratovich, D., Nikoli\u0107, I.: Distinguisher and Related-Key Attack on the Full AES-256. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol.\u00a05677, pp. 231\u2013249. Springer, Heidelberg (2009)"},{"key":"19_CR8","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/C-M.1977.217750","volume":"10","author":"W. Diffie","year":"1977","unstructured":"Diffie, W., Hellman, M.E.: Exhaustive Cryptanalysis of the NBS Data Encryption Standard. Computer\u00a010, 74\u201384 (1977)","journal-title":"Computer"},{"key":"19_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1007\/3-540-68697-5_19","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"J. Kelsey","year":"1996","unstructured":"Kelsey, J., Schneier, B., Wagner, D.: Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 237\u2013251. Springer, Heidelberg (1996)"},{"key":"19_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1007\/3-540-57220-1_62","volume-title":"Advances in Cryptology - AUSCRYPT \u201992","author":"L.R. Knudsen","year":"1993","unstructured":"Knudsen, L.R.: Cryptanalysis of LOKI91. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol.\u00a0718, pp. 196\u2013208. Springer, Heidelberg (1993)"},{"key":"19_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/3-540-69710-1_16","volume-title":"Fast Software Encryption","author":"S. Lucks","year":"1998","unstructured":"Lucks, S.: Attacking Triple Encryption. In: Vaudenay, S. (ed.) FSE 1998. LNCS, vol.\u00a01372, pp. 239\u2013253. Springer, Heidelberg (1998)"},{"key":"19_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/978-3-540-24660-2_2","volume-title":"Topics in Cryptology \u2013 CT-RSA 2004","author":"R.C.-W. Phan","year":"2004","unstructured":"Phan, R.C.-W.: Related-Key Attacks on Triple-DES and DESX Variants. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol.\u00a02964, pp. 15\u201324. Springer, Heidelberg (2004)"},{"key":"19_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"318","DOI":"10.1007\/3-540-46877-3_29","volume-title":"Advances in Cryptology - EUROCRYPT \u201990","author":"P.C. Oorschot van","year":"1991","unstructured":"van Oorschot, P.C., Wiener, M.: A Known-Plaintext Attack on Two-Key Triple Encryption. In: Damg\u00e5rd, I.B. (ed.) EUROCRYPT 1990. LNCS, vol.\u00a0473, pp. 318\u2013325. Springer, Heidelberg (1991)"},{"issue":"1","key":"19_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/PL00003816","volume":"12","author":"P.C. Oorschot van","year":"1999","unstructured":"van Oorschot, P.C., Wiener, M.J.: Parallel Collision Search with Cryptanalytic Applications. J. Cryptology\u00a012(1), 1\u201328 (1999)","journal-title":"J. Cryptology"},{"key":"19_CR15","doi-asserted-by":"crossref","unstructured":"Vaudenay, S.: Related-key Attack against Triple Encryption based on Fixed points. In: Lopez, J., Samarati, P. (eds.) SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications, Seville, Spain, July 18-21, pp. 59\u201367 (2011)","DOI":"10.5220\/0003450900590067"},{"issue":"2","key":"19_CR16","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/s00145-003-0213-5","volume":"17","author":"M.J. Wiener","year":"2004","unstructured":"Wiener, M.J.: The Full Cost of Cryptanalytic Attacks. J. Cryptology\u00a017(2), 105\u2013124 (2004)","journal-title":"J. Cryptology"}],"container-title":["Communications in Computer and Information Science","E-Business and Telecommunications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-35755-8_19.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T23:09:06Z","timestamp":1745363346000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-35755-8_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642357541","9783642357558"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-35755-8_19","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}