{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T12:52:10Z","timestamp":1725454330329},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540593393"},{"type":"electronic","value":"9783540492368"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1995]]},"DOI":"10.1007\/bfb0000450","type":"book-chapter","created":{"date-parts":[[2005,10,7]],"date-time":"2005-10-07T15:27:29Z","timestamp":1128698849000},"page":"385-397","source":"Crossref","is-referenced-by-count":3,"title":["A unified Markov approach to differential and linear cryptanalysis"],"prefix":"10.1007","author":[{"given":"Luke","family":"O'Connor","sequence":"first","affiliation":[]},{"given":"Jovan Dj.","family":"Goli\u0107","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,9,8]]},"reference":[{"key":"31_CR1","volume-title":"Information Theory","author":"R. B. Ash","year":"1965","unstructured":"R. B. Ash. Information Theory. New York: Dover Publications, 1965."},{"issue":"1","key":"31_CR2","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E. Biham","year":"1991","unstructured":"E. Biham and A. Shamir. Differential cryptanalysis of DES-like cryptosystems. Journal of Cryptology, 4(1):3\u201372, 1991.","journal-title":"Journal of Cryptology"},{"key":"31_CR3","volume-title":"An Introduction to Probability Theory and its Applications","author":"W. Feller","year":"1968","unstructured":"W. Feller. An Introduction to Probability Theory and its Applications. New York: Wiley, 3rd edition, Volume 1, 1968.","edition":"3rd edition"},{"key":"31_CR4","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/4347.001.0001","volume-title":"Low Density Parity Check Codes","author":"R. G. Gallager","year":"1963","unstructured":"R. G. Gallager. Low Density Parity Check Codes. MIT Press, Cambridge. Mass., 1963."},{"doi-asserted-by":"crossref","unstructured":"G. Hornauer, W. Stephan, and R. Wernsdorf. Markov ciphers and alternating groups. Advances in Cryptology, EUROCRYPT 93, Lecture Notes in Computer Science, vol. 765, T. Helleseth ed., Springer-Verlag, pages 453\u2013460, 1994.","key":"31_CR5","DOI":"10.1007\/3-540-48285-7_41"},{"key":"31_CR6","volume-title":"ETH Series in Information Processing","author":"X. Lai","year":"1992","unstructured":"X. Lai. On the design and security of block ciphers. ETH Series in Information Processing, editor J. Massey, Hartung-Gorre Verlag Konstanz, 1992."},{"doi-asserted-by":"crossref","unstructured":"X. Lai, J. Massey, and S. Murphy. Markov ciphers and differential analysis. In Advances in Cryptology, EUROCRYPT 91, Lecture Notes in Computer Science, vol. 547, D. W. Davies ed., Springer-Verlag, pages 17\u201338, 1991.","key":"31_CR7","DOI":"10.1007\/3-540-46416-6_2"},{"unstructured":"M. Matsui. Linear cryptanalysis of DES cipher (I). (version 1.03) private communication.","key":"31_CR8"},{"doi-asserted-by":"crossref","unstructured":"M. Matsui. Linear cryptanalysis method for DES cipher. Advances in Cryptology, EUROCRYPT 93, Lecture Notes in Computer Science, vol. 765, T. Helleseth ed., Springer-Verlag, pages 386\u2013397, 1994.","key":"31_CR9","DOI":"10.1007\/3-540-48285-7_33"},{"doi-asserted-by":"crossref","unstructured":"W. Meier and O. Staffelbach. Nonlinearity criteria for cryptographic functions. Advances in Cryptology, EUROCRYPT 89, Lecture Notes in Computer Science, vol. 434, J.-J. Quisquater, J. Vandewalle eds., Springer-Verlag, pages 549\u2013562, 1990.","key":"31_CR10","DOI":"10.1007\/3-540-46885-4_53"},{"doi-asserted-by":"crossref","unstructured":"K. Nyberg and L. R. Knudsen. Provable security against differential cryptanalysis. Advances in Cryptology, CRYPTO 92, Lecture Notes in Computer Science, vol. 740, E. F. Brickell ed., Springer-Verlag, pages 566\u2013574, 1993.","key":"31_CR11","DOI":"10.1007\/3-540-48071-4_41"},{"key":"31_CR12","first-page":"205","volume":"1","author":"I. Pal\u00e1sti","year":"1966","unstructured":"I. Pal\u00e1sti. On the strong connectedness of random graphs. Studia Sci. Math. Hungar., 1:205\u2013214, 1966.","journal-title":"Studia Sci. Math. Hungar."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 ASIACRYPT'94"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0000450","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,10]],"date-time":"2020-04-10T06:18:02Z","timestamp":1586499482000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0000450"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995]]},"ISBN":["9783540593393","9783540492368"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/bfb0000450","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1995]]}}}