{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T03:03:24Z","timestamp":1775012604529,"version":"3.50.1"},"reference-count":14,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2005,10,1]],"date-time":"2005-10-01T00:00:00Z","timestamp":1128124800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2005,10,1]],"date-time":"2005-10-01T00:00:00Z","timestamp":1128124800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Probl Inf Transm"],"published-print":{"date-parts":[[2005,10]]},"DOI":"10.1007\/s11122-006-0006-1","type":"journal-article","created":{"date-parts":[[2006,1,25]],"date-time":"2006-01-25T05:22:36Z","timestamp":1138166556000},"page":"385-394","source":"Crossref","is-referenced-by-count":5,"title":["A New Type of Attacks on Block Ciphers"],"prefix":"10.1007","volume":"41","author":[{"given":"B. Ya.","family":"Ryabko","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"V. A.","family":"Monarev","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yu. I.","family":"Shokin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"issue":"1","key":"6_CR1","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1080\/0161-110091888754","volume":"24","author":"B. Schneier","year":"2000","unstructured":"Schneier, B., A Self-Study Course in Block-Cipher Cryptanalysis, Cryptologia, 2000, vol. 24, no.1, pp. 18\u201334.","journal-title":"Cryptologia"},{"key":"6_CR2","unstructured":"Biryukov, A., Block Ciphers and Stream Ciphers: The State of the Art, Cryptology ePrint Archive, 2004, Report 2004\/094. Available at http:\/\/eprint.iacr.org\/2004\/094\/."},{"key":"6_CR3","volume-title":"Handbook of Applied Cryptography","author":"A.J. Menezes","year":"1997","unstructured":"Menezes, A.J., van Oorschot, P.C., and Vanstone, S.A., Handbook of Applied Cryptography, Boca Raton: CRC Press, 1997."},{"key":"6_CR4","volume-title":"Osnovy sovremennoi kriptografii dlya spetsialistov v informatsionnykh tekhnologiyakh","author":"B. Ryabko","year":"2004","unstructured":"Ryabko, B. and Fionov, A., Osnovy sovremennoi kriptografii dlya spetsialistov v informatsionnykh tekhnologiyakh, Moscow: Nauchn. Mir, 2004. Extended English version: Basics of Contemporary Cryptography for IT Practitioners, Singapore: World Scientific, 2005."},{"key":"6_CR5","volume-title":"Applied Cryptography: Protocols, Algorithms, and Source Code in C","author":"B. Schneier","year":"1996","unstructured":"Schneier, B., Applied Cryptography: Protocols, Algorithms, and Source Code in C, New York: Wiley, 1996, 2nd ed.","edition":"2nd ed."},{"key":"6_CR6","unstructured":"Knudsen, R.L. and Meier, W., Correlation in RC6, July 1999. Available at http:\/\/csrc.nist.gov\/CryptoToolkit\/aes\/round2\/comments\/19990812-lknudsen.pdf."},{"key":"6_CR7","unstructured":"Shimoyama, T., Takeuchi, K., and Hayakawa, J., Correlation Attack to the Block Cipher RC5 and the Simplified Variants of RC6, in Proc. 3rd AES Candidate Conf., New York, 2000. Available at http:\/\/csrc.nist.gov\/CryptoToolkit\/aes\/round2\/conf3\/papers\/36-tshimoyama.pdf."},{"key":"6_CR8","unstructured":"Nechvatal, J., Barker, E., Bassham, L., Burr, W., Dworkin, M., Foti, J., and Roback, E., Report on the Development of the Advanced Encryption Standart (AES), October 2000. Available at http:\/\/csrc.nist.gov\/encryption\/aes\/round2\/r2report.pdf."},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Soto, J. and Bassham, L., Randomness Testing of the Advanced Encryption Standard Finalist Candidates, in Proc. 3rd AES Candidate Conf., New York, 2000. Available at http:\/\/csrc.nist.gov\/encryption\/aes\/round2\/conf3\/papers\/30-jsoto.pdf.","DOI":"10.6028\/NIST.IR.6483"},{"key":"6_CR10","volume-title":"The Art of Computer Programming, vol. 1: Fundamental Algorithms","author":"D.E. Knuth","year":"1973","unstructured":"Knuth, D.E., The Art of Computer Programming, vol. 1: Fundamental Algorithms, Reading: Addison Wesley, 1973\u20131981, 2nd ed. Translated under the title Iskusstvo programmirovaniya na EVM: Osnovnye algoritmy, Moscow: Mir, 1984.","edition":"2nd ed."},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Rukhin, A., Soto, J., Nechvatal, J., Smid, M., Barker, E., Leigh, S., Levenson, M., Vangel, M., Banks, D., Heckert, N., Dray, J., and Vo, S., A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications, NIST Special Publication (SP 800-22), 2001. Available at http:\/\/csrc.nist.gov\/rng\/SP800-22b.pdf.","DOI":"10.6028\/NIST.SP.800-22"},{"issue":"1","key":"6_CR12","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1016\/j.jspi.2004.02.010","volume":"133","author":"B.Ya. Ryabko","year":"2005","unstructured":"Ryabko, B.Ya. and Monarev, V.A., Using Information Theory Approach to Randomness Testing, J. Stat. Plan. Inference, 2005, vol. 133, no.1, pp. 95\u2013110.","journal-title":"J. Stat. Plan. Inference"},{"issue":"2","key":"6_CR13","first-page":"53","volume":"39","author":"B.Ya. Ryabko","year":"2003","unstructured":"Ryabko, B.Ya., Stognienko, V.S., and Shokin, Yu.I., Adaptive \u03c72 Test for Discriminating between Close Hypotheses with a Large Number of Classes and Its Application to Some Cryptography Problems, Probl. Peredachi Inf., 2003, vol. 39, no.2, pp. 53\u201362 [Probl. Inf. Trans. (Engl. Transl.), 2003, vol. 39, no. 2, pp. 207\u2013215].","journal-title":"Probl. Peredachi Inf."},{"issue":"1","key":"6_CR14","first-page":"73","volume":"40","author":"B.Ya. Ryabko","year":"2004","unstructured":"Ryabko, B.Ya. and Pestunov, A.I., \u201cBook Stack\u201d as a New Statistical Test for Random Numbers, Probl. Peredachi Inf., 2004, vol. 40, no.1, pp. 73\u201378 [Probl. Inf. Trans. (Engl. Transl.), 2004, vol. 40, no. 1, pp. 66\u201371].","journal-title":"Probl. Peredachi Inf."}],"container-title":["Problems of Information Transmission"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11122-006-0006-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11122-006-0006-1","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11122-006-0006-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11122-006-0006-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T02:00:41Z","timestamp":1775008841000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11122-006-0006-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,10]]},"references-count":14,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2005,10]]}},"alternative-id":["6"],"URL":"https:\/\/doi.org\/10.1007\/s11122-006-0006-1","relation":{},"ISSN":["0032-9460","1608-3253"],"issn-type":[{"value":"0032-9460","type":"print"},{"value":"1608-3253","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005,10]]}}}