{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T16:25:20Z","timestamp":1725899120255},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642385186"},{"type":"electronic","value":"9783642385193"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38519-3_16","type":"book-chapter","created":{"date-parts":[[2013,5,2]],"date-time":"2013-05-02T07:59:28Z","timestamp":1367481568000},"page":"246-262","source":"Crossref","is-referenced-by-count":1,"title":["Estimating Resistance against Multidimensional Linear Attacks: An Application on DEAN"],"prefix":"10.1007","author":[{"given":"Risto M.","family":"Hakala","sequence":"first","affiliation":[]},{"given":"Atle","family":"Kivel\u00e4","sequence":"additional","affiliation":[]},{"given":"Kaisa","family":"Nyberg","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1007\/978-3-540-30539-2_31","volume-title":"Advances in Cryptology - ASIACRYPT 2004","author":"T. Baign\u00e8res","year":"2004","unstructured":"Baign\u00e8res, T., Junod, P., Vaudenay, S.: How far can we go beyond linear cryptanalysis? In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol.\u00a03329, pp. 432\u2013450. Springer, Heidelberg (2004)"},{"key":"16_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1007\/978-3-540-77360-3_13","volume-title":"Selected Areas in Cryptography","author":"T. Baign\u00e8res","year":"2007","unstructured":"Baign\u00e8res, T., Stern, J., Vaudenay, S.: Linear cryptanalysis of non binary ciphers. In: Adams, C., Miri, A., Wiener, M. (eds.) SAC 2007. LNCS, vol.\u00a04876, pp. 184\u2013211. Springer, Heidelberg (2007)"},{"key":"16_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1007\/978-3-540-85093-9_20","volume-title":"Information Theoretic Security","author":"T. Baign\u00e8res","year":"2008","unstructured":"Baign\u00e8res, T., Vaudenay, S.: The complexity of distinguishing distributions (invited talk). In: Safavi-Naini, R. (ed.) ICITS 2008. LNCS, vol.\u00a05155, pp. 210\u2013222. Springer, Heidelberg (2008)"},{"key":"16_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1007\/978-3-540-74735-2_31","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"A. Bogdanov","year":"2007","unstructured":"Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y., Vikkelsoe, C.: PRESENT: An ultra-lightweight block cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol.\u00a04727, pp. 450\u2013466. Springer, Heidelberg (2007)"},{"key":"16_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1007\/978-3-642-11925-5_21","volume-title":"Topics in Cryptology - CT-RSA 2010","author":"J.Y. Cho","year":"2010","unstructured":"Cho, J.Y.: Linear cryptanalysis of reduced-round PRESENT. In: Pieprzyk, J. (ed.) CT-RSA 2010. LNCS, vol.\u00a05985, pp. 302\u2013317. Springer, Heidelberg (2010)"},{"doi-asserted-by":"crossref","unstructured":"Daemen, J., Rijmen, V.: The Design of Rijndael \u2013 AES, the Advanced Encryption Standard. Springer (2002)","key":"16_CR6","DOI":"10.1007\/978-3-662-04722-4"},{"key":"16_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/3-540-60590-8_21","volume-title":"Fast Software Encryption","author":"J. Daemen","year":"1995","unstructured":"Daemen, J., Govaerts, R., Vandewalle, J.: Correlation matrices. In: Preneel, B. (ed.) FSE 1994. LNCS, vol.\u00a01008, pp. 275\u2013285. Springer, Heidelberg (1995)"},{"issue":"15","key":"16_CR8","doi-asserted-by":"publisher","first-page":"3320","DOI":"10.1016\/j.dam.2009.06.029","volume":"157","author":"K. Drakakis","year":"2009","unstructured":"Drakakis, K., Gow, R., McGuire, G.: APN permutations on \u2124\n                  n\n                 and Costas arrays. Discrete Applied Mathematics\u00a0157(15), 3320\u20133326 (2009)","journal-title":"Discrete Applied Mathematics"},{"key":"16_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/978-3-642-20465-4_18","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2011","author":"G. Leander","year":"2011","unstructured":"Leander, G.: On linear hulls, statistical saturation attacks, PRESENT and a cryptanalysis of PUFFIN. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol.\u00a06632, pp. 303\u2013322. Springer, Heidelberg (2011)"},{"unstructured":"Lidl, R., Niederreiter, H.: Finite fields, 2nd edn. Encyclopedia of mathematics and its applications, vol.\u00a020. Cambridge University Press (1997)","key":"16_CR10"},{"key":"16_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-58108-1_1","volume-title":"Fast Software Encryption","author":"J.L. Massey","year":"1994","unstructured":"Massey, J.L.: SAFER K-64: A byte-oriented block-ciphering algorithm. In: Anderson, R. (ed.) FSE 1993. LNCS, vol.\u00a0809, pp. 1\u201317. Springer, Heidelberg (1994)"},{"key":"16_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1007\/3-540-60590-8_17","volume-title":"Fast Software Encryption","author":"J.L. Massey","year":"1995","unstructured":"Massey, J.L.: SAFER K-64: One year later. In: Preneel, B. (ed.) FSE 1994. LNCS, vol.\u00a01008, pp. 212\u2013241. Springer, Heidelberg (1995)"},{"key":"16_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume-title":"Advances in Cryptology - EUROCRYPT 1993","author":"M. Matsui","year":"1994","unstructured":"Matsui, M.: Linear cryptanalysis method for DES cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 386\u2013397. Springer, Heidelberg (1994)"},{"key":"16_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1007\/978-3-642-10433-6_5","volume-title":"Cryptology and Network Security","author":"J. Nakahara Jr.","year":"2009","unstructured":"Nakahara Jr., J., Sepehrdad, P., Zhang, B., Wang, M.: Linear (hull) and algebraic cryptanalysis of the block cipher PRESENT. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol.\u00a05888, pp. 58\u201375. Springer, Heidelberg (2009)"},{"key":"16_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1007\/BFb0053460","volume-title":"Advances in Cryptology - EUROCRYPT 1994","author":"K. Nyberg","year":"1995","unstructured":"Nyberg, K.: Linear approximation of block ciphers. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 439\u2013444. Springer, Heidelberg (1995)"},{"issue":"1-2","key":"16_CR16","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1016\/S0166-218X(00)00351-6","volume":"111","author":"K. Nyberg","year":"2001","unstructured":"Nyberg, K.: Correlation theorems in cryptanalysis. Discrete Applied Mathematics\u00a0111(1-2), 177\u2013188 (2001)","journal-title":"Discrete Applied Mathematics"},{"doi-asserted-by":"crossref","unstructured":"Vaudenay, S.: An experiment on DES statistical cryptanalysis. In: Gong, L., Stern, J. (eds.) CCS 1996, pp. 139\u2013147. ACM Press (1996)","key":"16_CR17","DOI":"10.1145\/238168.238206"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38519-3_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,12]],"date-time":"2019-05-12T19:24:36Z","timestamp":1557689076000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38519-3_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642385186","9783642385193"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38519-3_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}