{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T12:12:07Z","timestamp":1773231127059,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540632474","type":"print"},{"value":"9783540692430","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1997]]},"DOI":"10.1007\/bfb0052343","type":"book-chapter","created":{"date-parts":[[2006,6,7]],"date-time":"2006-06-07T04:15:39Z","timestamp":1149653739000},"page":"149-165","source":"Crossref","is-referenced-by-count":443,"title":["The block cipher Square"],"prefix":"10.1007","author":[{"given":"Joan","family":"Daemen","sequence":"first","affiliation":[]},{"given":"Lars","family":"Knudsen","sequence":"additional","affiliation":[]},{"given":"Vincent","family":"Rijmen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,5,17]]},"reference":[{"issue":"No.1","key":"14_CR1","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E. Biham","year":"1991","unstructured":"E. Biham and A. Shamir, \u201cDifferential cryptanalysis of DES-like cryptosystems,\u2253 Journal of Cryptology, Vol. 4, No. 1, 1991, pp. 3\u201372.","journal-title":"Journal of Cryptology"},{"key":"14_CR2","unstructured":"J. Daemen, \u201cCipher and hash function design strategies based on linear and differential cryptanalysis,\u2253 Doctoral Dissertation, March 1995, K.U.Leuven."},{"key":"14_CR3","unstructured":"J. Daemen and V. Rijmen, \u201cSelf-reciprocal cipher structures,\u2253 COSIC internal report 96-3, 1996."},{"key":"14_CR4","unstructured":"T. Jakobsen and L.R. Knudsen, \u201cThe interpolation attack on block ciphers,\u2253 these proceedings."},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"J. Kelsey, B. Schneier and D. Wagner, \u201cKey-schedule cryptanalysis of IDEA, GDES, GOST, SAFER, and Triple-DES,\u2253 Advances in Cryptology, Proceedings Crypto\u201996, LNCS 1109, N. Koblitz, Ed., Springer-Verlag, 1996, pp. 237\u2013252.","DOI":"10.1007\/3-540-68697-5_19"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"L.R. Knudsen, \u201cTruncated and higher order differentials,\u2253 Fast Software Encryption, LNCS 1008, B. Preneel, Ed., Springer-Verlag, 1995, pp. 196\u2013211.","DOI":"10.1007\/3-540-60590-8_16"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"L.R. Knudsen, \u201cA key-schedule weakness in SAFER-K64,\u2253 Advances in Cryptology, Proceedings Crypto\u201995, LNCS 963, D. Coppersmith, Ed., Springer-Verlag, 1995, pp. 274\u2013286.","DOI":"10.1007\/3-540-44750-4_22"},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"L.R. Knudsen and T.A. Berson, \u201cTruncated differentials of SAFER,\u2253 Fast Software Encryption, LNCS 1039, D. Gollmann, Ed., Springer-Verlag, 1996, pp. 15\u201326.","DOI":"10.1007\/3-540-60865-6_38"},{"key":"14_CR9","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4684-0310-7","volume-title":"A Course in Number Theory and Cryptography","author":"N. Koblitz","year":"1987","unstructured":"N. Koblitz, \u201cA Course in Number Theory and Cryptography,\u2253 Springer-Verlag, New York, 1987."},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"X. Lai, J.L. Massey and S. Murphy, \u201cMarkov ciphers and differential cryptanalysis,\u2253 Advances in Cryptology, Proceedings Eurocrypt\u201991, LNCS 547, D.W. Davies, Ed., Springer-Verlag, 1991, pp. 17\u201338.","DOI":"10.1007\/3-540-46416-6_2"},{"key":"14_CR11","unstructured":"F.J. MacWilliams, N.J.A. Sloane, \u201cThe Theory of Error-Correcting Codes,\u2253 North-Holland, Amsterdam, 1977."},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"M. Matsui, \u201cLinear cryptanalysis method for DES cipher,\u2253 Advances in Cryptology, Proceedings Eurocrypt\u201993, LNCS 765, T. Helleseth, Ed., Springer-Verlag, 1994, pp. 386\u2013397.","DOI":"10.1007\/3-540-48285-7_33"},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"K. Nyberg, \u201cDifferentially uniform mappings for cryptography,\u2253 Advances in Cryptology, Proceedings Eurocrypt\u201993, LNCS 765, T. Helleseth, Ed., Springer-Verlag, 1994, pp. 55\u201364.","DOI":"10.1007\/3-540-48285-7_6"},{"issue":"No.2","key":"14_CR14","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1007\/BF00190756","volume":"8","author":"L. O\u2019Connor","year":"1995","unstructured":"L. O\u2019Connor, \u201cOn the distribution of characteristics in bijective mappings,\u2253 Journal of Cryptology, Vol. 8, No. 2, 1995, pp. 67\u201386.","journal-title":"Journal of Cryptology"},{"key":"14_CR15","doi-asserted-by":"crossref","unstructured":"V. Rijmen, J. Daemen et al., \u201cThe cipher SHARK,\u2253 Fast Software Encryption, LNCS 1039, D. Gollmann, Ed., Springer-Verlag, 1996, pp. 99\u2013112.","DOI":"10.1007\/3-540-60865-6_47"}],"container-title":["Lecture Notes in Computer Science","Fast Software Encryption"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0052343","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,15]],"date-time":"2020-04-15T09:04:20Z","timestamp":1586941460000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0052343"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997]]},"ISBN":["9783540632474","9783540692430"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/bfb0052343","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[1997]]}}}