{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T15:29:55Z","timestamp":1767972595804,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540632474","type":"print"},{"value":"9783540692430","type":"electronic"}],"license":[{"start":{"date-parts":[[1997,1,1]],"date-time":"1997-01-01T00:00:00Z","timestamp":852076800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1997]]},"DOI":"10.1007\/bfb0052344","type":"book-chapter","created":{"date-parts":[[2006,6,7]],"date-time":"2006-06-07T04:15:39Z","timestamp":1149653739000},"page":"166-171","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["XMX: A firmware-oriented block cipher based on modular multiplications"],"prefix":"10.1007","author":[{"given":"David","family":"M\u2019Ra\u00cfhi","sequence":"first","affiliation":[]},{"given":"David","family":"Naccache","sequence":"additional","affiliation":[]},{"given":"Jacques","family":"Stern","sequence":"additional","affiliation":[]},{"given":"Serge","family":"Vaudenay","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,5,17]]},"reference":[{"key":"15_CR1","unstructured":"F. Chabaud and R. Lercier, The ZEN library, http:\/\/lix.polytechnique.fr\/~zen\/"},{"key":"15_CR2","unstructured":"FIPS PUB 46, 1977, Data Encryption Standard."},{"key":"15_CR3","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume":"1109","author":"P. Kocher","year":"1996","unstructured":"P. Kocher, Timing attacks in implementations of Diffie-Hellman, RSA, DSS and other systems, Advances in Cryptology \u2014 CRYPTO \u201996, LNCS 1109, 1996, pp. 104\u2013113.","journal-title":"Advances in Cryptology \u2014 CRYPTO \u201996, LNCS"},{"key":"15_CR4","first-page":"1","volume":"809","author":"J. Massey","year":"1993","unstructured":"J. Massey, SAFER K-64: a byte oriented block cipher algorithm, Fast Software Encryption, Cambridge Security Workshop, 1993, LNCS 809, pp. 1\u201317.","journal-title":"LNCS"},{"issue":"no.3","key":"15_CR5","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/40.502402","volume":"16","author":"D. Naccache","year":"1996","unstructured":"D. Naccache and D. M\u2019Ra\u00cfhi, Cryptographic smart cards, IEEE Micro, June 1996, vol. 16, no. 3, pp. 14\u201323.","journal-title":"IEEE Micro"},{"key":"15_CR6","first-page":"210","volume-title":"Parallel collision search with application to hash functions and discrete logarithms","author":"P. Oorschot van","year":"1994","unstructured":"P. van Oorschot and M. J. Wiener, Parallel collision search with application to hash functions and discrete logarithms, 2 nd ACM Conference on Computer and Communication Security, Fairfax, Virginia, ACM Press, 1994, pp. 210\u2013218."},{"key":"15_CR7","first-page":"429","volume":"434","author":"J-J. Quisquater","year":"1990","unstructured":"J-J. Quisquater and J-P. Delescaille, How easy is collision search? Application to DES, Advances in Cryptology \u2014 EUROCRYPT\u201989, LNCS 434, 1990, pp. 429\u2013434.","journal-title":"LNCS"},{"key":"15_CR8","unstructured":"B. Serpette, J. Vuillemenin and J. C. Herv\u00e9, BIGNUM: a portable and efficient package for arbitrary-precision arithmetic, PRL Research Report #2, 1989, ftp:\/\/ftp.digital.com\/pub\/DEC\/PRL\/research-reports\/PRL-RR-2.ps.Z."},{"key":"15_CR9","first-page":"363","volume":"1008","author":"D. J. Wheeler","year":"1994","unstructured":"D. J. Wheeler and R. M. Needham, TEA, a tiny encryption algorithm, Fast Software Encryption, Leuven, LNCS 1008, 1994, pp. 363\u2013366.","journal-title":"LNCS"}],"container-title":["Lecture Notes in Computer Science","Fast Software Encryption"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0052344","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,15]],"date-time":"2020-04-15T09:04:42Z","timestamp":1586941482000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0052344"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997]]},"ISBN":["9783540632474","9783540692430"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/bfb0052344","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[1997]]},"assertion":[{"value":"17 May 2006","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}