{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T09:45:43Z","timestamp":1764841543875,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540650041"},{"type":"electronic","value":"9783540497844"}],"license":[{"start":{"date-parts":[[1998,1,1]],"date-time":"1998-01-01T00:00:00Z","timestamp":883612800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/bfb0055858","type":"book-chapter","created":{"date-parts":[[2006,7,27]],"date-time":"2006-07-27T16:50:09Z","timestamp":1154019009000},"page":"97-110","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":105,"title":["Side channel cryptanalysis of product ciphers"],"prefix":"10.1007","author":[{"given":"John","family":"Kelsey","sequence":"first","affiliation":[]},{"given":"Bruce","family":"Schneier","sequence":"additional","affiliation":[]},{"given":"David","family":"Wagner","sequence":"additional","affiliation":[]},{"given":"Chris","family":"Hall","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,5,28]]},"reference":[{"issue":"n.3","key":"7_CR1","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1023\/A:1008229029587","volume":"12","author":"C. Adams","year":"1997","unstructured":"C. Adams, \u201cConstructing Symmetric Ciphers Using the CAST Design Procedure\u201d, Designs, Codes and Cryptography, v.12, n.3, Nov 1997, pp. 71\u2013104.","journal-title":"Designs, Codes and Cryptography"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"R. Anderson, \u201cOn Fibonacci Keystream Generators,\u201c Fast Software Encryption, 2nd International Workshop Proceedings, Springer-Verlag, 1995, pp. 346\u2013352.","DOI":"10.1007\/3-540-60590-8_26"},{"key":"7_CR3","first-page":"1","volume":"Jul","author":"S. Bellovin","year":"1996","unstructured":"S. Bellovin, \u201cProblem Areas for the IP Security Protocols,\u201c Proceedings of the Sixth Usenix Unix Security Symposium, Jul 1996, pp. 1\u201316.","journal-title":"Proceedings of the Sixth Usenix Unix Security Symposium"},{"key":"7_CR4","unstructured":"ANSI X3.92, \u201cAmerican National Standard for Data Encryption Algorithm (DEA),\u201c American National Standards Institute, 1981."},{"issue":"No.1","key":"7_CR5","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E. Biham","year":"1991","unstructured":"E. Biham and A. Shamir, \u201cDifferential Cryptanalysis of DES-like Cryptosystems,\u201c Journal of Cryptology, Vol. 4, No. 1, 1991, pp. 3\u201372.","journal-title":"Journal of Cryptology"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"E. Biham and A. Shamir, Differential Cryptanalysis of the Data Encryption Standard, Springer-Verlag, 1993.","DOI":"10.1007\/978-1-4613-9314-6"},{"issue":"n.4","key":"7_CR7","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/BF00203965","volume":"7","author":"E. Biham","year":"1994","unstructured":"E. Biham, \u201cNew Types of Cryptanalytic Attacks Using Related Keys,\u201c Journal of Cryptology, v. 7, n. 4, 1994, pp. 229\u2013246.","journal-title":"Journal of Cryptology"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"E. Biham and A. Shamir, \u201cDifferential Fault Analysis of Secret Key CryptoSystems,\u201c Advances in Cryptology\u2014CRYPTO \u201997 Proceedings, Springer-Verlag, 1997, pp. 513\u2013525.","DOI":"10.1007\/BFb0052259"},{"issue":"n.2","key":"7_CR9","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1137\/0215025","volume":"15","author":"L. Blum","year":"1986","unstructured":"L. Blum, M. Blum, and M. Shub, \u201cA Simple Unpredictable Pseudo-Random Number Generator,\u201c SIAM Journal of Computing, v. 15, n. 2, 1986, pp. 364\u2013383.","journal-title":"SIAM Journal of Computing"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"D. Boneh, R.A. Demillo, R.J. Lipton, \u201cOn the Importance of Checking Cryptographic Protocols for Faults,\u201c Advances in Cryptology \u2014 EUROCRYPT \u201997 Proceedings, Springer-Verlag, 1997, pp. 37\u201351.","DOI":"10.1007\/3-540-69053-0_4"},{"issue":"n.1","key":"7_CR11","first-page":"331","volume":"135","author":"W.G. Chambers","year":"1988","unstructured":"W.G. Chambers and D. Gollmann, \u201cGeneratirs for Sequences with Near-Maximal Linear Equivalence,\u201c IEE Proceedings, v. 135, pt. E, n. 1, Jan 1988, pp. 331\u2013343.","journal-title":"IEE Proceedings"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"D. Coppersmith, H. Krawczyk, and Y. Mansour, \u201cThe Shinking Generator,\u201c Advances in Cryptology\u2014CRYPTO \u201993 Proceedings, Springer-Verlag, 1994, pp. 22\u201339.","DOI":"10.1007\/3-540-48329-2_3"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"C. Hall, I. Goldberg, B. Schneier, \u201cReaction Attacks Against Several Public-Key Cryptosystems,\u201c 1998, in preparation.","DOI":"10.1007\/978-3-540-47942-0_2"},{"key":"7_CR14","unstructured":"D. Kahn, The Codebreakers, The MacMillan Company, 1967."},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"J. Kelsey, B. Schneier, and D. Wagner, \u201cKey-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES,\u201c Advances in Cryptology \u2014 CRYPTO \u201996 Proceedings, Springer-Verlag, 1996, pp. 237\u2013251.","DOI":"10.1007\/3-540-68697-5_19"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"J. Kelsey, B. Schneier, and D. Wagner, \u201cRelated-Key Cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA,\u201c Information and Communications Security, First International Conference Proceedings, Springer-Verlag, 1997, pp. 203\u2013207.","DOI":"10.1007\/BFb0028479"},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"P. Kocher, \u201cTiming Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems,\u201c Advances in Cryptology\u2014CRYPTO \u201996 Proceedings, Springer-Verlag, 1996, pp. 104\u2013113.","DOI":"10.1007\/3-540-68697-5_9"},{"key":"7_CR18","unstructured":"P. Kocher, personal communication, 1998."},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"X Lai, J.L. Massey, \u201cA Proposal for a New Block Encryption Standard,\u201c Advances in Cryptology\u2014EUROCRYPT \u201990 Proceedings, Springer-Verlag, pp. 389\u2013404.","DOI":"10.1007\/3-540-46877-3_35"},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"X. Lai, J.L. Massey, and S. Murphy, \u201cMarkov Ciphers and Differential Cryptanalysis,\u201c Advances in Cryptology\u2014EUROCRYPT \u201991 Proceedings, Springer-Verlag, pp. 17\u201338.","DOI":"10.1007\/3-540-46416-6_2"},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"M. Matsui, \u201cLinear Cryptanalysis Method for DES Cipher,\u201c Advances in Cryptology\u2014EUROCRYPT \u201993 Proceedings, Springer-Verlag, 1994, pp. 386\u2013397.","DOI":"10.1007\/3-540-48285-7_33"},{"key":"7_CR22","doi-asserted-by":"crossref","unstructured":"W. Meier and O. Steffelbach, \u201cThe Self-Shrinking Generator,\u201c Communications and Cryptography: Two Sides of One Tapestry, R.E. Blahut et al, eds., Kluwer Academic Publishers, 1994, pp. 287\u2013295.","DOI":"10.1007\/978-1-4615-2694-0_28"},{"key":"7_CR23","unstructured":"R. Merkle, \u201cA Fast Software Encryption Function,\u201c Advances in Cryptology\u2014CRYPTO \u201990 Proceedings, Springer-Verlag, 1991, pp. 476\u2013501."},{"key":"7_CR24","doi-asserted-by":"crossref","unstructured":"B. Schneier, \u201cDescription of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish),\u201c Fast Software Encryption, Cambridge Security Workshop Proceedings, Springer-Verlag, 1994, pp. 191\u2013204.","DOI":"10.1007\/3-540-58108-1_24"},{"key":"7_CR25","unstructured":"B. Schneier, Applied Cryptography, 2nd Edition, John Wiley & Sons, 1996."},{"key":"7_CR26","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1016\/0167-4048(85)90046-X","volume":"4","author":"W. Eck van","year":"1985","unstructured":"W. van Eck, \u201cElectromagnetic Radiation from Video Display Units: An Eavesdropping Risk,\u201c Computers & Security, v. 4, 1985, pp. 269\u2013286.","journal-title":"Computers & Security"},{"key":"7_CR27","unstructured":"P. Wright, Spycatcher, Viking Penguin Inc., 1987."},{"key":"7_CR28","unstructured":"S.B. Xu, D.K. He, and X.M. Wang, \u201cAn Implementation of the GSM General Data Encryption Algorithm A5,\u201c CHIANCRYPT \u201994, 11\u201315 Nov 1994, pp. 287\u2013291."}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2014 ESORICS 98"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0055858","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T20:08:08Z","timestamp":1559506088000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0055858"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540650041","9783540497844"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/bfb0055858","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1998]]},"assertion":[{"value":"28 May 2006","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}