{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:46:11Z","timestamp":1767339971327,"version":"3.41.2"},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[1997,11,1]],"date-time":"1997-11-01T00:00:00Z","timestamp":878342400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[1997,11,1]],"date-time":"1997-11-01T00:00:00Z","timestamp":878342400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Designs, Codes and Cryptography"],"published-print":{"date-parts":[[1997,11]]},"DOI":"10.1023\/a:1008224928678","type":"journal-article","created":{"date-parts":[[2002,12,22]],"date-time":"2002-12-22T08:47:34Z","timestamp":1040546854000},"page":"253-266","source":"Crossref","is-referenced-by-count":17,"title":["On Weaknesses of Non\u2013surjective Round Functions"],"prefix":"10.1007","volume":"12","author":[{"given":"Vincent","family":"Rijmen","sequence":"first","affiliation":[]},{"given":"Bart","family":"Preneel","sequence":"additional","affiliation":[]},{"given":"Erik","family":"De Win","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"C.M. Adams and S.E. Tavares, Designing S-boxes for ciphers resistant to differential cryptanalysis, Proc. of the 3rd symposium on State and Progress of Research in Cryptography, W. Wolfowicz, Ed., Fondazione Ugo Bordoni, 1993, pp. 181\u2013190.","key":"141938_CR1"},{"key":"141938_CR2","first-page":"129","volume-title":"Workshop on Selected Areas in Cryptography","author":"C.M. Adams","year":"1994","unstructured":"C.M. Adams, Simple and effective key scheduling for symmetric ciphers, Workshop on Selected Areas in Cryptography, pp. 129\u2013133, Queen's University, Kingston, Ontario, Canada, May 1994."},{"key":"141938_CR3","volume-title":"Walsh Functions and Their Applications","author":"K.G. Beauchamp","year":"1975","unstructured":"K.G. Beauchamp, Walsh Functions and Their Applications, Academic Press, New York, 1975."},{"doi-asserted-by":"crossref","unstructured":"E. Biham and A. Shamir, Differential Cryptanalysis of the Data Encryption Standard, Springer-Verlag, 1993.a","key":"141938_CR4","DOI":"10.1007\/978-1-4613-9314-6"},{"unstructured":"A. Bosselaers, propriety DES software, KULeuven.","key":"141938_CR5"},{"doi-asserted-by":"crossref","unstructured":"W. Diffie and M. Hellman, Exhaustive cryptanalysis of the NBS data encryption standard, Computer, pp. 74\u201378, 1977.","key":"141938_CR6","DOI":"10.1109\/C-M.1977.217750"},{"issue":"11","key":"141938_CR7","doi-asserted-by":"crossref","first-page":"1545","DOI":"10.1109\/PROC.1975.10005","volume":"63","author":"H. Feistel","year":"1975","unstructured":"H. Feistel, W.A. Notz, and J.L. Smith, \u201cSome cryptographic techniques for machine-to-machine data communications,\u201d Proc. IEEE, Vol. 63,No. 11, November 1975, pp. 1545\u20131554.","journal-title":"Proc. IEEE"},{"unstructured":"Data Encryption Standard, Federal Information Processing Standard (FIPS), Publication 46, National Bureau of Standards, U.S. Department of Commerce, Washington D.C., January 1977.","key":"141938_CR8"},{"doi-asserted-by":"crossref","unstructured":"H.M. Heys and S.E. Tavares, On the security of the CAST encryption algorithm, Canadian Conference on Electrical and Computer Engineering, pp. 332\u2013335, Sept. 1994, Halifax, Canada.","key":"141938_CR9","DOI":"10.1109\/CCECE.1994.405756"},{"doi-asserted-by":"crossref","unstructured":"L.R. Knudsen, Block ciphers \u2014 analysis, design and applications, PhD. Thesis, DAIMI PB-485, Aarhus University, 1994.","key":"141938_CR10","DOI":"10.7146\/dpb.v23i485.6978"},{"doi-asserted-by":"crossref","unstructured":"L. Brown, M. Kwan, J. Pieprzyk and J. Seberry, Improving resistance against differential cryptanalysis and the redesign of LOKI, Advances in Cryptology, Proc. AsiaCrypt'91, LNCS 453, H. Imai, R. L. Rivest and T. Matsumoto, Eds., Springer-Verlag, 1993, pp. 36\u201350.","key":"141938_CR11","DOI":"10.1007\/3-540-57332-1_3"},{"doi-asserted-by":"crossref","unstructured":"M. Matsui, Linear cryptanalysis method for DES cipher, Advances in Cryptology, Proc. Eurocrypt'93, LNCS 765, T. Helleseth, Ed., Springer-Verlag, 1994, pp. 386\u2013397.","key":"141938_CR12","DOI":"10.1007\/3-540-48285-7_33"},{"doi-asserted-by":"crossref","unstructured":"M. Matsui, The first experimental cryptanalysis of the Data Encryption Standard, Advances in Cryptology, Proc. Crypto'94, LNCS 839, Y. Desmedt, Ed., Springer-Verlag, 1994, pp. 1\u201311.","key":"141938_CR13","DOI":"10.1007\/3-540-48658-5_1"},{"unstructured":"S. Miyaguchi, The Feal cipher family, Advances in Cryptology, Proc. Crypto'90, LNCS 537, S. Vanstone, Ed., Springer-Verlag, 1991, pp. 627\u2013638.","key":"141938_CR14"},{"doi-asserted-by":"crossref","unstructured":"B. Schneier, Description of a new variable-length key, 64-bit block cipher (Blowfish), Fast Software Encryption, LNCS 809, R. Anderson, Ed., Springer-Verlag, 1994, pp. 191\u2013204.","key":"141938_CR15","DOI":"10.1007\/3-540-58108-1_24"},{"unstructured":"T. Tokita, T. Sorimachi, and M. Matsui, \u201cLinear cryptanalysis of LOKI and s\n2DES,\u201d Advances in Cryptology, Proc. Asiacrypt'94, LNCS, J. Pieprzyk, Ed., Springer-Verlag, to appear.293303","key":"141938_CR16"},{"unstructured":"Wiener, M., 1993, Efficient DES key search, presentation at Rump Session of Crypto (August, 1993), Santa Barbara, CA. Available as TR-244, School of Computer Science, Carleton University, Ottawa, Canada, May 1994.","key":"141938_CR17"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1008224928678.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1023\/A:1008224928678\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1008224928678.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,29]],"date-time":"2025-07-29T02:41:45Z","timestamp":1753756905000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1023\/A:1008224928678"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997,11]]},"references-count":17,"journal-issue":{"issue":"3","published-print":{"date-parts":[[1997,11]]}},"alternative-id":["141938"],"URL":"https:\/\/doi.org\/10.1023\/a:1008224928678","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"type":"print","value":"0925-1022"},{"type":"electronic","value":"1573-7586"}],"subject":[],"published":{"date-parts":[[1997,11]]}}}