{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:44:42Z","timestamp":1767339882149},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540648925"},{"type":"electronic","value":"9783540684626"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/bfb0055728","type":"book-chapter","created":{"date-parts":[[2006,7,27]],"date-time":"2006-07-27T21:12:36Z","timestamp":1154034756000},"page":"186-199","source":"Crossref","is-referenced-by-count":18,"title":["Generalized birthday attacks on unbalanced Feistel networks"],"prefix":"10.1007","author":[{"given":"Charanjit S.","family":"Jutla","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,5,28]]},"reference":[{"key":"13_CR1","doi-asserted-by":"crossref","unstructured":"W. Aiello, R. Venkatesan, Foiling birthday attacks in length-doubling transformations, Eurocrypt 1996, LNCS 1070.","DOI":"10.1007\/3-540-68339-9_27"},{"key":"13_CR2","unstructured":"N. Alon, J.H. Spencer, The probabilistic method, John Wiley and Sons, 1992."},{"key":"13_CR3","volume-title":"Federal Information Processing Standards Publication 46","author":"FIPS 46","year":"1977","unstructured":"FIPS 46, Data Encryption Standard, Federal Information Processing Standards Publication 46, U.S. Department of Commerce\/N.I.S.T., National Technical Information Service, Springfield, Virginia, 1977."},{"key":"13_CR4","unstructured":"D. Coppersmith, Another Birthday attack, Advances in Cryptology, Crypto 1985."},{"key":"13_CR5","unstructured":"D. Coppersmith, Luby-Rackoff: Four rounds is not enough, IBM Research Report, RC20674, Dec. 96."},{"key":"13_CR6","unstructured":"M. Girault, R. Cohen, M. Campana, A Generalized birthday attack, Eurocrypt 1988, LNCS 330."},{"key":"13_CR7","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/s001459900035","volume":"11","author":"L. Knudsen","year":"1998","unstructured":"L. Knudsen, X. Lai, B. Preneel, Attacks on fast double block length hash functions, J. of Cryptology, 1998, 11:59\u201372.","journal-title":"J. of Cryptology"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"M. Luby, Pseudorandomness and cryptographic applications, Princeton University Press, 1996.","DOI":"10.1515\/9780691206844"},{"key":"13_CR9","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1137\/0217022","volume":"17","author":"M. Luby","year":"1988","unstructured":"M. Luby and C. Rackoff, How to construct pseudorandom permutations from pseudorandom functions, SIAM J.of Comp., 17, pp.373\u2013386, 1988.","journal-title":"SIAM J.of Comp."},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"J. Patarin, About Feistel Schemes with Six (or More) Rounds, Proc. Fast Software Encryption, March 1998.","DOI":"10.1007\/3-540-69710-1_8"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"R. Anderson, E. Biham, Two Practical and Provably Secure Block Ciphers: BEAR and LION, 1996 Workshop on Fast Software Encryption.","DOI":"10.1007\/3-540-60865-6_48"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"B. Schneier, J. Kelsey, Unbalanced Feistel Networks and Block-Cipher Design, Fast Software Encryption, Third International Workshop Proceedings (February 1996), Springer-Verlag, 1996, pp. 121\u2013144.","DOI":"10.1007\/3-540-60865-6_49"},{"key":"13_CR13","unstructured":"Moni Naor, O. Reingold, On the Construction of Pseudo-Random Permutations: Luby-Rackoff Revisited, Proc. STOC 97"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO '98"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0055728","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,17]],"date-time":"2020-04-17T14:37:09Z","timestamp":1587134229000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0055728"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540648925","9783540684626"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/bfb0055728","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1998]]}}}