{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T12:56:18Z","timestamp":1772024178286,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":34,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540636960","type":"print"},{"value":"9783540696285","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1997]]},"DOI":"10.1007\/bfb0028479","type":"book-chapter","created":{"date-parts":[[2005,11,22]],"date-time":"2005-11-22T03:09:54Z","timestamp":1132628994000},"page":"233-246","source":"Crossref","is-referenced-by-count":120,"title":["Related-key cryptanalysis of 3-WAY, Biham-DES,CAST, DES-X, NewDES, RC2, and TEA"],"prefix":"10.1007","author":[{"given":"John","family":"Kelsey","sequence":"first","affiliation":[]},{"given":"Bruce","family":"Schneier","sequence":"additional","affiliation":[]},{"given":"David","family":"Wagner","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,17]]},"reference":[{"key":"23_CR1","unstructured":"C. Adams, \u201cSimple and Effective Key Scheduling for Symmetric Ciphers,\u201d Workshop on Selected Areas in Cryptography: SAC '94, 1994, pp 129\u2013133."},{"key":"23_CR2","doi-asserted-by":"crossref","unstructured":"C. Adams, \u201cConstructing Symmetric Ciphers Using the CAST Design Procedure,\u201d Designs, Codes and Cryptography, v 12, n 3, 1997, to appear.","DOI":"10.1023\/A:1008229029587"},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"I. Ben-Aroya and E. Biham, \u201cDifferential Cryptanalysis of Lucifer,\u201d Advances in Cryptology-CRYPTO '93, Springer-Verlag, 1994, pp. 187\u2013199.","DOI":"10.1007\/3-540-48329-2_17"},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"D. Bernstein, personal communication, 1997.","DOI":"10.1006\/jtbi.1997.0459"},{"key":"23_CR5","doi-asserted-by":"crossref","unstructured":"E. Biham, \u201cNew Types of Cryptanalytic Attacks Using Related Keys,\u201d Advances in Cryptology-EUROCRYPT '93, Springer-Verlag, 1994, pp. 398\u2013409.","DOI":"10.1007\/3-540-48285-7_34"},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"E. Biham and A. Biryukov, \u201cHow to Strengthen DES Using Existing Hardware,\u201d Advances in Cryptology-ASIA CRYPT '94, Springer-Verlag, pp. 398\u2013412.","DOI":"10.1007\/BFb0000451"},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"E. Biham and A. Shamir, \u201cDifferential Cryptanalysis of the Full 16-round DES,\u201d Advances in Cryptology-CRYPTO '92, Springer-Verlag 1993, pp. 487\u2013496.","DOI":"10.1007\/3-540-48071-4_34"},{"key":"23_CR8","doi-asserted-by":"crossref","unstructured":"J. Daemen, \u201cLimitations of the Even-Mansour Construction,\u201d Advances in Cryptology-ASIA CRYPT '91, Springer-Verlag, 1992, pp. 495\u2013498.","DOI":"10.1007\/3-540-57332-1_46"},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"J. Daemen, \u201cA New Approach to Block Cipher Design,\u201d Fast Software Encryption, Cambridge Security Workshop Proceedings, Springer-Verlag, 1994, pp. 18\u201332.","DOI":"10.1007\/3-540-58108-1_2"},{"key":"23_CR10","doi-asserted-by":"crossref","unstructured":"I.B. Damgard and L.R. Knudsen, \u201cMultiple Encryption with Minimum Key,\u201d Cryptography: Policy and Algorithms, Springer-Verlag, 1996, pp. 156\u2013164.","DOI":"10.1007\/BFb0032355"},{"key":"23_CR11","doi-asserted-by":"crossref","unstructured":"W. Diffie and M.E. Hellman. \u201cPrivacy and Authentication: An Introduction to Cryptography\u201d. Proceedings of the IEEE, vol 67 no 3, March 1979.","DOI":"10.1109\/PROC.1979.11256"},{"key":"23_CR12","unstructured":"R. Fleming, \u201cAn attack on a weakened version of TEA,\u201d post to the sci.crypt newsgroup, October 1996."},{"key":"23_CR13","unstructured":"COST, Gosudarstvennyi Standard 28147-89, \u201cCryptographic Protection for Data Processing Systems,\u201d Government Committee of the USSR for Standards, 1989."},{"key":"23_CR14","doi-asserted-by":"crossref","unstructured":"J. Kelsey, B. Schneier, and D. Wagner, \u201cKey-Schedule Cryptanalysis of IDEA, G-DES, COST, SAFER, and Triple-DES,\u201d Advances in Cryptology-CRYPTO '96, Springer-Verlag, 1996, pp. 237\u2013251.","DOI":"10.1007\/3-540-68697-5_19"},{"key":"23_CR15","unstructured":"K. Kim, S. Park, and S. Lee, \u201cReconstruction of 82 DES S-Boxes and their Immunity to Differential Cryptanalysis,\u201d Proceedings of the 1993 Japan-Korea Workshop on Information Security and Cryptography, Seoul, Korea, 24\u201326 October 1993, pp. 282\u2013291."},{"key":"23_CR16","doi-asserted-by":"crossref","unstructured":"L.R. Knudsen, \u201cCryptanalysis of LOKI,\u201d Advances in CryptologyASIACRYPT '91, Springer-Verlag, 1993, pp. 22\u201335.","DOI":"10.1007\/3-540-57332-1_2"},{"key":"23_CR17","doi-asserted-by":"crossref","unstructured":"L.R. Knudsen, \u201cCryptanalysis of LOKI91,\u201d Advances in CryptologyAUSCRYPT '92, Springer-Verlag, 1993, pp. 196\u2013208.","DOI":"10.1007\/3-540-57220-1_62"},{"key":"23_CR18","doi-asserted-by":"crossref","unstructured":"L.R. Knudsen, \u201cBlock Ciphers-Analysis, Design, Applications,\u201d Ph.D. dissertation, Aarhus University, Nov 1994.","DOI":"10.7146\/dpb.v23i485.6978"},{"key":"23_CR19","doi-asserted-by":"crossref","unstructured":"L.R. Knudsen, \u201cA Key-schedule Weakness in SAFER K-64,\u201d Advances in Cryptology-CRYPTO '95, Springer-Verlag, 1995, pp. 274\u2013286.","DOI":"10.1007\/3-540-44750-4_22"},{"key":"23_CR20","doi-asserted-by":"crossref","unstructured":"J. Kilian and P. Rogaway, \u201cHow to protect DES against exhaustive key search,\u201d Advances in Cryptology-CRYPTO '96, Springer-Verlag, 1996, pp. 252\u2013267.","DOI":"10.1007\/3-540-68697-5_20"},{"key":"23_CR21","doi-asserted-by":"crossref","unstructured":"X. Lai, J. Massey, and S. Murphy, \u201cMarkov Ciphers and Differential Cryptanalysis,\u201d Advances in Cryptology-CRYPTO '91, Springer-Verlag, 1991, pp. 17\u201338.","DOI":"10.1007\/3-540-46416-6_2"},{"key":"23_CR22","doi-asserted-by":"crossref","unstructured":"J.L. Massey, \u201cSAFER K-64: A Byte-Oriented Block-Ciphering Algorithm\u201d, Fast Software Encryption, Cambridge Security Workshop Proceedings, Springer-Verlag, 1994, pp. 1\u201317.","DOI":"10.1007\/3-540-58108-1_1"},{"key":"23_CR23","unstructured":"A. Pfitzmann and R. Abmann, \u201cEfficient Software Implementations of (Generalized) DES,\u201d Proc. SECURICOM '90, Paris, 1990, pp. 139\u2013158."},{"key":"23_CR24","unstructured":"A. Pfitzmann and R. Abmann, \u201cMore Efficient Software Implementations of (Generalized) DES,\u201d Technical Report PfAb90, Interner Bericht 18\/90, Fakultat fur Informatik, Universitat Karlsruhe, 1990. http:\/\/ www.informatik.uni-hildesheim.de\/\u223csirene\/lit\/abstr90.html#PfAss-90"},{"key":"23_CR25","unstructured":"Research and Development in Advanced Communication Technologies in Europe, RIPE Integrity Primitives: Final Report of RACE Integrity Primitives Evaluation (R1040), RACE, Jun 1992."},{"key":"23_CR26","unstructured":"R. Rivest, personal communication."},{"key":"23_CR27","doi-asserted-by":"crossref","unstructured":"R. Rivest, \u201cA Description of the RC2(r) Encryption Algorithm,\u201d InternetDraft, work in progress, June 1997, ftp:\/\/ds.internic.net\/internetdrafts \/draft-rivest-rc2desc-00.txt","DOI":"10.17487\/rfc2268"},{"key":"23_CR28","doi-asserted-by":"crossref","unstructured":"P. Rogaway and D. Coppersmith, \u201cA Software-Optimized Encryption Algorithm,\u201d Fast Software Encryption, Cambridge Security Workshop Proceedings, Springer-Verlag, 1994, pp. 56\u201363.","DOI":"10.1007\/3-540-58108-1_8"},{"key":"23_CR29","doi-asserted-by":"crossref","unstructured":"B. Schneier, \u201cDescription of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish),\u201d Fast Software Encryption, Cambridge Security Workshop Proceedings, Springer-Verlag, 1994, pp. 191\u2013204.","DOI":"10.1007\/3-540-58108-1_24"},{"issue":"1","key":"23_CR30","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1080\/0161-118591859799","volume":"9","author":"R. Scott","year":"1985","unstructured":"R. Scott, \u201cWide Open Encryption Design Offers Flexible Implementations,\u201d Cryptologia, v. 9, n. 1, Jan 1985, pp. 75\u201390.","journal-title":"Cryptologia"},{"key":"23_CR31","unstructured":"R. Scott, \u201cRevision of NewDES,\u201d personal communication, also posted to the sci.crypt newsgroup on the Internet, May 1996."},{"key":"23_CR32","doi-asserted-by":"crossref","unstructured":"D. Wheeler and R. Needham, \u201cTEA, a Tiny Encryption Algorithm,\u201d Fast Software Encryption, Second International Workshop Proceedings, Springer-Verlag, 1995, pp. 97\u2013110.","DOI":"10.1007\/3-540-60590-8_29"},{"key":"23_CR33","doi-asserted-by":"crossref","unstructured":"R. Winternitz, \u201cProducing One-Way Hash Functions from DES,\u201d Advances in Cryptology: Proceedings of Crypto 83, Plenum Press, 1984, pp. 203\u2013207.","DOI":"10.1007\/978-1-4684-4730-9_17"},{"issue":"1","key":"23_CR34","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1080\/0161-118791861749","volume":"11","author":"R. Winternitz","year":"1987","unstructured":"R. Winternitz and M. Hellman, \u201cChosen-key Attacks on a Block Cipher,\u201d Cryptologia, v. 11, n. 1, Jan 1987, pp. 16\u201320.","journal-title":"Cryptologia"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0028479","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,10]],"date-time":"2020-04-10T22:58:45Z","timestamp":1586559525000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0028479"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997]]},"ISBN":["9783540636960","9783540696285"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/bfb0028479","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[1997]]}}}