{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T02:43:04Z","timestamp":1747104184486},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540648925"},{"type":"electronic","value":"9783540684626"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/bfb0055730","type":"book-chapter","created":{"date-parts":[[2006,7,27]],"date-time":"2006-07-27T17:12:36Z","timestamp":1154020356000},"page":"212-222","source":"Crossref","is-referenced-by-count":22,"title":["Cryptanalysis of block ciphers with probabilistic non-linear relations of low degree"],"prefix":"10.1007","author":[{"given":"Thomas","family":"Jakobsen","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,5,28]]},"reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Sigal Ar, Richard J. Lipton, Ronitt Rubinfeld, and Madhu Sudan. Reconstructing Algebraic Functions from Mixed Data, Proceedings of the 33rd Annual IEEE Symposium on Foundations of Computer Science, 1992, pp. 503\u2013512. To appear SIAM Journal on Computing.","DOI":"10.1109\/SFCS.1992.267801"},{"issue":"no.111","key":"15_CR2","doi-asserted-by":"publisher","first-page":"713","DOI":"10.2307\/2004849","volume":"24","author":"E. R. Berlekamp","year":"1970","unstructured":"Elwyn R. Berlekamp. Factoring Polynomials over Large Finite Fields. Mathematics of Computation, pp. 713, vol. 24, no. 111, 1970.","journal-title":"Mathematics of Computation"},{"key":"15_CR3","doi-asserted-by":"crossref","first-page":"261","DOI":"10.4153\/CJM-1965-025-1","volume":"17","author":"L. Carlitz","year":"1965","unstructured":"Leonard Carlitz. The Distribution of Irreducible Polynomials in Several Indeterminates II. Canadian Journal of Mathematics 17:261\u2013266, 1965.","journal-title":"Canadian Journal of Mathematics"},{"key":"15_CR4","volume-title":"On Decoding Reed-Solomon Codes Beyond the Packing Radii","author":"W. Feng","year":"1997","unstructured":"Weishi Feng and Richard E. Blahut. On Decoding Reed-Solomon Codes Beyond the Packing Radii. Preprint. Coordinated Science Laboratory, University of Illinois at Urbana-Champaign, Nov., 1997."},{"key":"15_CR5","doi-asserted-by":"publisher","first-page":"251","DOI":"10.2307\/2008063","volume":"45","author":"J. Gathen von zur","year":"1985","unstructured":"Joachim von zur Gathen and Erich Kaltofen. Factoring multivariate polynomials over finite fields. Math. Comput, 45:251\u2013261, 1985.","journal-title":"Math. Comput"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Carlo Harpes, Gerhard G. Kramer, and James L. Massey. A Generalization of Linear Cryptanalysis and the Applicability of Matsui's Piling-up Lemma. Eurocrypt '95, Lectures Notes in Computer Science, Springer, 1995.","DOI":"10.1007\/3-540-49264-X_3"},{"key":"15_CR7","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-3849-0","volume-title":"Algebraic Geometry","author":"R. Hartshorne","year":"1977","unstructured":"Robin Hartshorne. Algebraic Geometry. Springer-Verlag, New York, 1977."},{"key":"15_CR8","unstructured":"Tom Hoholdt. Private communication."},{"key":"15_CR9","series-title":"Lecture Notes in Computer Science","volume-title":"Fast Software Encryption IV","author":"T. Jakobsen","year":"1997","unstructured":"Thomas Jakobsen and Lars R. Knudsen. The Interpolation Attack on Block Ciphers. Fast Software Encryption IV, Lecture Notes in Computer Science, Springer, Haifa, 1997."},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Xueijia Lai. Higher order derivatives and differential cryptanalysis. In Proc.\u201cSymposium on Communication, Coding and Cryptography\u201d, in honor of James L. Massey on the occasion of his 60'th birthday, Feb. 10\u201313, 1994, Monte-Verita, Ascona, Switzerland, 1994.","DOI":"10.1007\/978-1-4615-2694-0_23"},{"key":"15_CR11","first-page":"389","volume-title":"A Proposal for a New Block Encryption Standard","author":"X. Lai","year":"1991","unstructured":"Xuejia Lai and James L. Massey. A Proposal for a New Block Encryption Standard, Advances in Cryptology \u2014 Eurocrypt '90 Proceedings, Springer-Verlag, Berlin, 1991, pp. 389\u2013404."},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Xuejia Lai, James L. Massey, and Sean Murphy. Markov ciphers and differential cryptanalysis. Advances in Cryptology, Proceedings Eurocrypt '91, LNCS 547, D. W. Davies, Ed., Springer-Verlag, 1991, pp. 17\u201338.","DOI":"10.1007\/3-540-46416-6_2"},{"key":"15_CR13","unstructured":"Florence J. MacWilliams and Neil J. A. Sloane. The Theory of Error-Correcting Codes. North-Holland, 1977."},{"key":"15_CR14","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume":"765","author":"M. Matsui","year":"1994","unstructured":"Mitsuru Matsui. Linear cryptanalysis for DES cipher. Lecture Notes in Computer Science, 765 (1994), 386\u2013397. (Advances in Cryptology \u2014 EUROCRYPT '93.)","journal-title":"Lecture Notes in Computer Science"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Kaisa Nyberg and Lars R. Knudsen. Provable Security Against a Differential Attack. Journal of Cryptology, vol. 8, no. 1, 1995.","DOI":"10.1007\/BF00204800"},{"key":"15_CR16","first-page":"86","volume-title":"Lecture Notes in Computer Science, vol. 1008","author":"R. L. Rivest","year":"1995","unstructured":"Ronald L. Rivest. The RC5 encryption algorithm. In Bart Preneel, editor, Fast Software Encryption: Second International Workshop, Lecture Notes in Computer Science, vol. 1008, pp. 86\u201396, Leuven, Belgium, Springer-Verlag, Published 1995."},{"key":"15_CR17","volume-title":"Decoding Reed Solomon Codes beyond the Error-Correction Diameter","author":"M. Sudan","year":"1997","unstructured":"Madhu Sudan. Decoding Reed Solomon Codes beyond the Error-Correction Diameter. Proc. 35th Annual Allerton Conference on Communication, Control and Computing, University of Illinois at Urbana-Champaign, 1997."},{"issue":"1","key":"15_CR18","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1006\/jcom.1997.0439","volume":"13","author":"M. Sudan","year":"1997","unstructured":"Madhu Sudan. Decoding of Reed Solomon Codes beyond the Error-Correction Bound. Journal of Complexity, 13(1):180\u2013193, March 1997.","journal-title":"Journal of Complexity"},{"key":"15_CR19","unstructured":"Madhu Sudan. Preprint. May 1998."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO '98"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0055730","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,20]],"date-time":"2019-04-20T05:09:00Z","timestamp":1555736940000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0055730"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540648925","9783540684626"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/bfb0055730","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1998]]}}}