{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,28]],"date-time":"2024-06-28T22:13:35Z","timestamp":1719612815494},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2006,12,1]],"date-time":"2006-12-01T00:00:00Z","timestamp":1164931200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2006,12,1]],"date-time":"2006-12-01T00:00:00Z","timestamp":1164931200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des Codes Crypt"],"published-print":{"date-parts":[[2007,1]]},"DOI":"10.1007\/s10623-006-9012-y","type":"journal-article","created":{"date-parts":[[2006,11,30]],"date-time":"2006-11-30T14:46:13Z","timestamp":1164897973000},"page":"21-42","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["The design of composite permutations with applications to DES-like S-boxes"],"prefix":"10.1007","volume":"42","author":[{"given":"Peter","family":"Roelse","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,12,1]]},"reference":[{"key":"9012_CR1","unstructured":"Anderson R, Biham E, Knudsen L (1998) Serpent: a proposal for the Advanced Encryption Standard, AES CD-1: Documentation. National Institute of Standards and Technology, Information Technology Laboratory"},{"key":"9012_CR2","unstructured":"ANSI X3.92 (1981) American National Standard\u2014Data Encryption Algorithm. American National Standards Institute"},{"key":"9012_CR3","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/s001459900027","volume":"10","author":"E Biham","year":"1997","unstructured":"Biham E, Biryukov A (1997) An improvement of Davies\u2019 attack on DES. J Cryptol 10: 195\u2013205","journal-title":"J Cryptol"},{"key":"9012_CR4","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E Biham","year":"1991","unstructured":"Biham E, Shamir A (1991) Differential cryptanalysis of DES-like cryptosystems. J Cryptol 4:3\u201372","journal-title":"J Cryptol"},{"key":"9012_CR5","first-page":"33","volume-title":"Advances in cryptology\u2014proceedings EUROCRYPT \u201903, LNCS 2656","author":"A Biryukov","year":"2003","unstructured":"Biryukov A, De Canniere C, Braeken A, Preneel B (2003). A toolbox for cryptanalysis: linear and affine equivalence algorithms. In: Biham E (eds). Advances in cryptology\u2014proceedings EUROCRYPT \u201903, LNCS 2656. Springer-Verlag, Berlin, pp. 33\u201350"},{"key":"9012_CR6","first-page":"250","volume-title":"Selected Areas in Cryptography, 9th Annual International Workshop, SAC 2002. LNCS 2595","author":"S Chow","year":"2003","unstructured":"Chow S, Eisen P, Johnson H, van Oorschot PC (2003). White-box cryptography and an AES implementation. In: Nyberg K, Heys H (eds). Selected Areas in Cryptography, 9th Annual International Workshop, SAC 2002. LNCS 2595, Springer-Verlag, Berlin, pp. 250\u2013270"},{"key":"9012_CR7","first-page":"1","volume-title":"Digital Rights Management, ACM CCS-9 Workshop, DRM 2002, LNCS 2696","author":"S Chow","year":"2003","unstructured":"Chow S, Eisen P, Johnson H, van Oorschot PC (2003). A white-box DES implementation for DRM applications. In: Feigenbaum J (eds). Digital Rights Management, ACM CCS-9 Workshop, DRM 2002, LNCS 2696. Springer-Verlag, Berlin, pp. 1\u201315"},{"issue":"3","key":"9012_CR8","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1147\/rd.383.0243","volume":"38","author":"D Coppersmith","year":"1994","unstructured":"Coppersmith D (1994) The Data Encryption Standard (DES) and its strength against attacks. IBM J Res Dev 38(3):243\u2013250","journal-title":"IBM J Res Dev"},{"key":"9012_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BF00204799","volume":"8","author":"DW Davies","year":"1995","unstructured":"Davies DW, Murphy S (1995) Pairs and triplets of DES S-boxes. J Cryptol 8:1\u201325","journal-title":"J Cryptol"},{"key":"9012_CR10","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The design of Rijndael","author":"J Daemen","year":"2002","unstructured":"Daemen J, Rijmen V (2002) The design of Rijndael. Springer-Verlag, Berlin"},{"key":"9012_CR11","unstructured":"FIPS 46, Data Encryption Standard, Federal Information Processing Standards, Publication 46, U.S. Department of Commerce, National Bureau of Standards, National Technical Information Service, 1977 (revised versions: FIPS 46-1, 1988; FIPS 46-2, 1993; FIPS 46-3, 1999)"},{"key":"9012_CR12","unstructured":"FIPS 197, Advanced Encryption Standard, Federal Information Processing Standards, Publication 197, U.S. Department of Commerce, National Institute for Standards and Technology, Information Technology Laboratory, 2001"},{"key":"9012_CR13","unstructured":"Kim K, Lee S, Park S, Lee D (1995) Securing DES S-boxes against three robust cryptanalysis. Workshop record, 2nd Workshop on Selected Areas in Cryptology (SAC \u201995), Ottawa, Canada, pp 145\u2013157"},{"key":"9012_CR14","unstructured":"Kim K, Park S, Lee S (1993) Reconstruction of S\n                           2DES S-boxes and their immunity to differential cryptanalysis. In: Proceedings of JW-ISC \u201993, Oct. 24\u201326, Seoul, Korea"},{"key":"9012_CR15","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1007\/s00145-001-0009-4","volume":"14","author":"AK Lenstra","year":"2001","unstructured":"Lenstra AK, Verheul ER (2001) Selecting cryptographic key sizes. J Cryptol 14:255\u2013293","journal-title":"J Cryptol"},{"key":"9012_CR16","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1002\/j.1538-7305.1963.tb04003.x","volume":"42","author":"FJ MacWilliams","year":"1963","unstructured":"MacWilliams FJ (1963) A theorem on the distribution of weights in a systematic code. Bell Syst Tech J 42:79\u201394","journal-title":"Bell Syst Tech J"},{"key":"9012_CR17","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume-title":"Advances in cryptology\u2014Proceedings EUROCRYPT \u201993, LNCS 765","author":"M Matsui","year":"1994","unstructured":"Matsui M (1994). Linear cryptanalysis method for DES cipher. In: Helleseth T (eds). Advances in cryptology\u2014Proceedings EUROCRYPT \u201993, LNCS 765. Springer-Verlag, Berlin, pp. 386\u2013397"},{"key":"9012_CR18","volume-title":"Handbook of applied cryptography","author":"AJ Menezes","year":"1996","unstructured":"Menezes AJ, van Oorschot PC, Vanstone SA (1996) Handbook of applied cryptography. CRC Press, New York"},{"key":"9012_CR19","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1007\/3-540-48285-7_6","volume-title":"Advances in cryptology\u2014proceedings EUROCRYPT \u201993, LNCS 765","author":"K Nyberg","year":"1994","unstructured":"Nyberg K (1994). Differentially uniform mappings for cryptography. In: Helleseth T. (eds). Advances in cryptology\u2014proceedings EUROCRYPT \u201993, LNCS 765. Springer-Verlag, Berlin, pp. 55\u201364"},{"key":"9012_CR20","doi-asserted-by":"crossref","first-page":"566","DOI":"10.1007\/3-540-48071-4_41","volume-title":"Advances in cryptology\u2014proceedings CRYPTO \u201992, LNCS 740","author":"K Nyberg","year":"1993","unstructured":"Nyberg K, Knudsen L (1993). Provable security against differential cryptanalysis. In: Brickell EF (eds). Advances in cryptology\u2014proceedings CRYPTO \u201992, LNCS 740. Springer-Verlag, Berlin, pp. 566\u2013574"},{"key":"9012_CR21","doi-asserted-by":"crossref","first-page":"403","DOI":"10.1007\/3-540-48329-2_34","volume-title":"Advances in cryptology\u2014Proceedings CRYPTO \u201993, LNCS 773.","author":"LJ O\u2019Connor","year":"1994","unstructured":"O\u2019Connor LJ (1994). On the distribution of characteristics in composite permutations. In: DR (eds). Advances in cryptology\u2014Proceedings CRYPTO \u201993, LNCS 773. Springer-Verlag, Berlin, pp. 403\u2013412"},{"key":"9012_CR22","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/S0019-9958(63)90189-X","volume":"6","author":"V Pless","year":"1963","unstructured":"Pless V (1963) Power moment identities on weight distributions in error-correcting codes. Info Control 6:147\u2013152","journal-title":"Info Control"},{"key":"9012_CR23","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1007\/978-3-642-59435-9_22","volume-title":"Finite fields with applications to coding theory, cryptography and related areas, Oaxaca, 2001","author":"P Roelse","year":"2002","unstructured":"Roelse P (2002). Differential and linear distributions of substitution boxes for symmetric-key cryptosystems. In: Mullen GL, Stichtenoth H, Tapia-Recillas H (eds). Finite fields with applications to coding theory, cryptography and related areas, Oaxaca, 2001. Springer-Verlag, Berlin, pp. 270\u2013285"},{"key":"9012_CR24","unstructured":"Special Publication 800-67, Recommendation for the Triple Data Encryption Algorithm (TDEA) block cipher, U.S. Department of Commerce, Technology Administration, National Institute for Standards and Technology, 2004"},{"key":"9012_CR25","first-page":"73","volume-title":"Advances in cryptology\u2014proceedings LNCS 739","author":"J-H Yang","year":"1993","unstructured":"Yang J-H, Dai Z-D, Zeng K-C (1993). The data base of selected permutations (Extended Abstract). In: Imai H, Rivest RL, Matsumoto T (eds). Advances in cryptology\u2014proceedings LNCS 739. Springer-Verlag, Berlin, pp. 73\u201381"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-006-9012-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10623-006-9012-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-006-9012-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-006-9012-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,16]],"date-time":"2022-05-16T08:55:38Z","timestamp":1652691338000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10623-006-9012-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,12,1]]},"references-count":25,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2007,1]]}},"alternative-id":["9012"],"URL":"https:\/\/doi.org\/10.1007\/s10623-006-9012-y","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,12,1]]},"assertion":[{"value":"15 November 2004","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 March 2006","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 July 2006","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 December 2006","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}