{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T13:21:58Z","timestamp":1725456118896},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540636960"},{"type":"electronic","value":"9783540696285"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1997]]},"DOI":"10.1007\/bfb0028481","type":"book-chapter","created":{"date-parts":[[2005,11,22]],"date-time":"2005-11-22T03:09:54Z","timestamp":1132628994000},"page":"258-268","source":"Crossref","is-referenced-by-count":1,"title":["On strict estimation method of provable security against differential and linear cryptanalysis"],"prefix":"10.1007","author":[{"given":"Yasuyoshi","family":"Kaneko","sequence":"first","affiliation":[]},{"given":"Shiho","family":"Moriai","sequence":"additional","affiliation":[]},{"given":"Kazuo","family":"Ohta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,17]]},"reference":[{"issue":"1","key":"25_CR1","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E. Biham","year":"1991","unstructured":"E.Biham and A. Shamir. Differential Cryptanalysis of DES-like Cryptosystems. Journal of Cryptology, Volume 4, Number 1, pp.3\u201372, Springer-Verlag, 1991.","journal-title":"Journal of Cryptology"},{"key":"25_CR2","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1007\/3-540-46416-6_2","volume":"547","author":"X. Lai","year":"1992","unstructured":"X.Lai, J.L.Massey and S.Murphy. Markov Ciphers and Differential Cryptanalysis. Advances in Cryptology-EUROCRYPT'91, Lecture Notes in Computer Sciences 547, pp.17\u201338, Springer-Verlag, 1992.","journal-title":"Advances in Cryptology-EUROCRYPT'91"},{"key":"25_CR3","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume":"765","author":"M. Matsui","year":"1994","unstructured":"M.Matsui. Linear Cryptanalysis Method for DES Cipher. Advances in CryptologyEUROCRYPT'93, Lecture Notes in Computer Sciences 765, pp.386\u2013397, Springer-Verlag, 1994.","journal-title":"Advances in CryptologyEUROCRYPT'93, Lecture Notes in Computer Sciences"},{"key":"25_CR4","doi-asserted-by":"crossref","first-page":"366","DOI":"10.1007\/BFb0053451","volume":"950","author":"M. Matsui","year":"1995","unstructured":"M.Matsui. On Correlation Between the Order of S-boxes and the Strength of DES. Advances in Cryptology-EUROCRYPT'94, Lecture Notes in Computer Sciences 950, pp.366\u2013375, Springer-Verlag, 1995.","journal-title":"Advances in Cryptology-EUROCRYPT'94, Lecture Notes in Computer Sciences"},{"key":"25_CR5","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1007\/3-540-60865-6_54","volume":"1039","author":"M. Matsui","year":"1996","unstructured":"M.Matsui. New Structure of Block Ciphers with Provable Security against Differential and Linear Cryptanalysis. In Proceedings of the third international workshop of fast software encryption, Lecture Notes in Computer Science 1039, pp.205\u2013218, Springer-Verlag, 1996.","journal-title":"Proceedings of the third international workshop of fast software encryption, Lecture Notes in Computer Science"},{"key":"25_CR6","doi-asserted-by":"crossref","first-page":"439","DOI":"10.1007\/BFb0053460","volume":"950","author":"K. Nyberg","year":"1995","unstructured":"K.Nyberg. Linear Approximation of Block Ciphers. Advances in CryptologyEUROCRYPT'94, Lecture Notes in Computer Sciences 950, pp.439\u2013444, Springer-Verlag, 1995.","journal-title":"Advances in CryptologyEUROCRYPT'94, Lecture Notes in Computer Sciences"},{"issue":"1","key":"25_CR7","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/BF00204800","volume":"8","author":"K. Nyberg","year":"1995","unstructured":"K.Nyberg and L.R.Knudsen. Provable Security Against a Differential Attack. Journal of Cryptology, Volume 8, Number 1, pp.27\u201337, Springer-Verlag, 1995.","journal-title":"Journal of Cryptology"},{"key":"25_CR8","first-page":"387","volume":"917","author":"L. O'Connor","year":"1995","unstructured":"L.O'Connor and J.D.Golic. A Unified Markov Approach to Differential and Linear Cryptanalysis. Advances in Cryptology-ASIACRYPT'94, Lecture Notes in Computer Sciences 917, pp.387\u2013397, Springer-Verlag, 1995.","journal-title":"Advances in Cryptology-ASIACRYPT'94, Lecture Notes in Computer Sciences"},{"key":"25_CR9","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1007\/3-540-44750-4_13","volume":"963","author":"K. Ohta","year":"1995","unstructured":"K.Ohta, S.Moriai and K.Aoki. Improving the Search Algorithm for the Best Linear Expression. Advances in Cryptology-CRYPTO'95, Lecture Notes in Computer Science 963, pp.157\u2013170, Springer-Verlag, 1995.","journal-title":"Advances in Cryptology-CRYPTO'95, Lecture Notes in Computer Science"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0028481","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,5]],"date-time":"2019-02-05T09:55:35Z","timestamp":1549360535000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0028481"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997]]},"ISBN":["9783540636960","9783540696285"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/bfb0028481","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1997]]}}}