{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T13:00:42Z","timestamp":1772283642790,"version":"3.50.1"},"reference-count":7,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2015,11,26]],"date-time":"2015-11-26T00:00:00Z","timestamp":1448496000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2017,3]]},"DOI":"10.1007\/s12095-015-0166-1","type":"journal-article","created":{"date-parts":[[2015,11,26]],"date-time":"2015-11-26T08:19:15Z","timestamp":1448525955000},"page":"217-239","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Counting and characterising functions with \u201cfast points\u201d for differential attacks"],"prefix":"10.1007","volume":"9","author":[{"given":"Ana","family":"S\u0103l\u0103gean","sequence":"first","affiliation":[]},{"given":"Matei","family":"Mandache-S\u0103l\u0103gean","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,26]]},"reference":[{"issue":"1","key":"166_CR1","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E Biham","year":"1991","unstructured":"Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. J. Cryptol. 4(1), 3\u201372 (1991)","journal-title":"J. Cryptol."},{"key":"166_CR2","doi-asserted-by":"crossref","unstructured":"Dinur, I., Shamir, A.: Cube attacks on tweakable black box polynomials. In: EUROCRYPT, pp. 278\u2013299 (2009)","DOI":"10.1007\/978-3-642-01001-9_16"},{"key":"166_CR3","doi-asserted-by":"crossref","unstructured":"Duan, M., Lai, X.: Higher order differential cryptanalysis framework and its applications. In: International Conference on Information Science and Technology (ICIST), pp. 291\u2013297 (2011)","DOI":"10.1109\/ICIST.2011.5765256"},{"key":"166_CR4","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1016\/j.ins.2014.02.108","volume":"271","author":"M Duan","year":"2014","unstructured":"Duan, M., Yang, M., Sun, X., Zhu, B., Lai, X.: Distinguishing properties and applications of higher order derivatives of boolean functions. Inf. Sci. 271, 224\u2013235 (2014)","journal-title":"Inf. Sci."},{"issue":"3\u20134","key":"166_CR5","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1007\/s12095-012-0071-9","volume":"4","author":"S Knellwolf","year":"2012","unstructured":"Knellwolf, S., Meier, W.: High order differential attacks on stream ciphers. Cryptogr. Commun. 4(3\u20134), 203\u2013215 (2012)","journal-title":"Cryptogr. Commun."},{"key":"166_CR6","doi-asserted-by":"crossref","unstructured":"Lai, X.: Higher order derivatives and differential cryptanalysis. In: Blahut, R.E., Costello, D.J. Jr., Maurer, U., Mittelholzer, T. (eds.) Communications and Cryptography. The Springer International Series in Engineering and Computer Science, vol. 276, pp. 227\u2013233. Springer Verlag (1994)","DOI":"10.1007\/978-1-4615-2694-0_23"},{"key":"166_CR7","unstructured":"Vielhaber, M.: Breaking ONE.FIVIUM by AIDA an algebraic IV differential attack. Cryptology ePrint Archive, Report 2007\/413. http:\/\/eprint.iacr.org\/ (2007)"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-015-0166-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12095-015-0166-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-015-0166-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-015-0166-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,26]],"date-time":"2019-03-26T19:06:54Z","timestamp":1553627214000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12095-015-0166-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11,26]]},"references-count":7,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017,3]]}},"alternative-id":["166"],"URL":"https:\/\/doi.org\/10.1007\/s12095-015-0166-1","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"value":"1936-2447","type":"print"},{"value":"1936-2455","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,11,26]]}}}