{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T00:50:34Z","timestamp":1743036634109,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540562467"},{"type":"electronic","value":"9783540474883"}],"license":[{"start":{"date-parts":[[1992,1,1]],"date-time":"1992-01-01T00:00:00Z","timestamp":694224000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1992]]},"DOI":"10.1007\/bfb0013911","type":"book-chapter","created":{"date-parts":[[2005,11,23]],"date-time":"2005-11-23T07:24:15Z","timestamp":1132730655000},"page":"419-434","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["A hardware design model for cryptographic algorithms"],"prefix":"10.1007","author":[{"given":"Joan","family":"Daemen","sequence":"first","affiliation":[]},{"given":"Ren\u00e9","family":"Govaerts","sequence":"additional","affiliation":[]},{"given":"Joos","family":"Vandewalle","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,9]]},"reference":[{"key":"23_CR1","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C.E. Shannon","year":"1949","unstructured":"C.E. Shannon, Communication theory of secrecy systems, Bell Syst. Tech. Journal, Vol. 28, pp. 656\u2013715, 1949.","journal-title":"Bell Syst. Tech. Journal"},{"key":"23_CR2","doi-asserted-by":"publisher","first-page":"1045","DOI":"10.1214\/aoms\/1177705677","volume":"31","author":"B. Harris","year":"1959","unstructured":"B. Harris, Probability Distributions Related to Random Mappings, Annals of Mathematical Statistics, 31 (1959), 1045\u20131062.","journal-title":"Annals of Mathematical Statistics"},{"key":"23_CR3","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E. Biham","year":"1991","unstructured":"E. Biham and A. Shamir, Differential Cryptanalysis of DES-like Cryptosystems, Journal of Cryptology (1991) 4: 3\u201372.","journal-title":"Journal of Cryptology"},{"key":"23_CR4","volume-title":"Cryptography and Data Security","author":"D. E. Denning","year":"1982","unstructured":"D. E. Denning, Cryptography and Data Security, Addison-Wesley, Reading, MA, 1982."},{"key":"23_CR5","series-title":"Lecture notes in Computer Science, vol. 304","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1007\/3-540-39118-5_19","volume-title":"Advances in Cryptology-Eurocrypt '87","author":"I. Damg\u00e5rd","year":"1988","unstructured":"I. Damg\u00e5rd, Collision-Free Hash Functions and Public-Key Signature Schemes. In Advances in Cryptology-Eurocrypt '87, pp. 203\u2013217. Lecture notes in Computer Science, vol. 304, Springer-Verlag, Berlin 1988."},{"key":"23_CR6","unstructured":"J. Daemen, R. Govaerts and J. Vandewalle, A Framework for the Design of One-Way Hash Functions Including Cryptanalysis of Damg\u00e5rd's One-Way Function Based on a Cellular Automaton, Abstracts Asiacrypt '91."},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"J. Daemen, R. Govaerts and J. Vandewalle, On the Design of Self-Synchronizing Stream Ciphers, Proceedings ISITA '92, Singapore, Nov. 16\u201320 1992.","DOI":"10.1109\/ICCS.1992.254997"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2014 ESORICS 92"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0013911","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,5]],"date-time":"2025-01-05T21:36:57Z","timestamp":1736113017000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0013911"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1992]]},"ISBN":["9783540562467","9783540474883"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/bfb0013911","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1992]]},"assertion":[{"value":"9 June 2005","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}