{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T19:05:56Z","timestamp":1754161556794,"version":"3.41.2"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[1997,11,1]],"date-time":"1997-11-01T00:00:00Z","timestamp":878342400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[1997,11,1]],"date-time":"1997-11-01T00:00:00Z","timestamp":878342400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Designs, Codes and Cryptography"],"published-print":{"date-parts":[[1997,11]]},"DOI":"10.1023\/a:1008276912749","type":"journal-article","created":{"date-parts":[[2002,12,22]],"date-time":"2002-12-22T08:47:34Z","timestamp":1040546854000},"page":"267-282","source":"Crossref","is-referenced-by-count":6,"title":["Resistance of a CAST-Like Encryption Algorithm to Linear and Differential Cryptanalysis"],"prefix":"10.1007","volume":"12","author":[{"given":"J.","family":"Lee","sequence":"first","affiliation":[]},{"given":"H.M.","family":"Heys","sequence":"additional","affiliation":[]},{"given":"S.E.","family":"Tavares","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"141939_CR1","volume-title":"A Formal and Practical Design Procedure for Substitution-Permutation Network Cryptosystems","author":"C. M. Adams","year":"1990","unstructured":"C. M. Adams. A Formal and Practical Design Procedure for Substitution-Permutation Network Cryptosystems. PhD thesis, Queen's University, Kingston, Canada, 1990."},{"key":"141939_CR2","first-page":"129","volume-title":"Workshop on Selected Areas of Cryptography (SAC) '94","author":"C. M. Adams","year":"1994","unstructured":"C. M. Adams. Simple and effective key scheduling for symmetric ciphers. In Workshop on Selected Areas of Cryptography (SAC) '94, pages 129\u2013133, Queen's University, Kingston, Ontario, Canada, May 1994."},{"key":"141939_CR3","unstructured":"C. M. Adams and S. E. Tavares. Designing s-boxes resistant to differential cryptanalysis. In Proceedings of 3rd Symposium on the State and Progress of Research in Cryptography, pages 181\u2013190, Rome, Italy, 1994."},{"key":"141939_CR4","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4613-9314-6","volume-title":"Differential Cryptanalysis of the Data Encryption Standard","author":"E. Biham","year":"1993","unstructured":"E. Biham and A. Shamir. Differential Cryptanalysis of the Data Encryption Standard. New York: Springer-Verlag, 1993."},{"key":"141939_CR5","volume-title":"An Introduction to Probability Theory and its Applications","author":"W. Feller","year":"1968","unstructured":"W. Feller. An Introduction to Probability Theory and its Applications. New York: Wiley, 1968."},{"key":"141939_CR6","doi-asserted-by":"crossref","unstructured":"H. M. Heys and S. E. Tavares. On the security of the CAST encryption algorithm. In Canadian Conference on Electrical and Computer Engineering, pages 332\u2013335, Halifax, Nova Scotia, Canada, Sept. 1994.","DOI":"10.1109\/CCECE.1994.405756"},{"key":"141939_CR7","first-page":"26","volume-title":"Advances in Cryptology: Proceedings of CRYPTO '94","author":"B. S. Kaliski","year":"1994","unstructured":"B. S. Kaliski and M. J. B. Robshaw. Linear Cryptanalysis Using Multiple Approximations. In Advances in Cryptology: Proceedings of CRYPTO '94, pages 26\u201339, Springer-Verlag, Berlin, 1994."},{"key":"141939_CR8","volume-title":"Block Ciphers \u2014 Analysis, Design and Applications","author":"L. R. Knudsen","year":"1994","unstructured":"L. R. Knudsen. Block Ciphers \u2014 Analysis, Design and Applications. PhD thesis, Aarhus University, Denmark, July 1994."},{"key":"141939_CR9","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1007\/3-540-46416-6_2","volume-title":"Advances in Cryptology: Proceedings of EUROCRYPT '91","author":"X. Lai","year":"1991","unstructured":"X. Lai, J. L. Massey, and S. Murphy. Markov Ciphers and Differential Cryptanalysis. In Advances in Cryptology: Proceedings of EUROCRYPT '91, pages 17\u201338. Springer-Verlag, Berlin, 1991."},{"key":"141939_CR10","volume-title":"An Investigation of Some Security Aspects of the CAST Encryption Algorithm","author":"J. Lee","year":"1995","unstructured":"J. Lee. An Investigation of Some Security Aspects of the CAST Encryption Algorithm. Master's thesis, Queen's University, Kingston, Ontario, Canada, 1995."},{"key":"141939_CR11","first-page":"386","volume-title":"Advances in Cryptology: Proceedings of EUROCRYPT '93","author":"M. Matsui","year":"1994","unstructured":"M. Matsui. Linear Cryptanalysis Method for DES Cipher. In Advances in Cryptology: Proceedings of EUROCRYPT '93, pages 386\u2013397. Springer-Verlag, Berlin, 1994."},{"key":"141939_CR12","first-page":"1","volume-title":"Advances in Cryptology: Proceedings of CRYPTO '94","author":"M. Matsui","year":"1994","unstructured":"M. Matsui. The First Experimental Cryptanalysis of the Data Encryption Standard. In Advances in Cryptology: Proceedings of CRYPTO '94, pages 1\u201311. Springer-Verlag, Berlin, 1994."},{"key":"141939_CR13","first-page":"549","volume-title":"Advances in Cryptology: Proceedings of EUROCRYPT '89","author":"W. Meier","year":"1990","unstructured":"W. Meier and O. Staffelbach. Nonlinearity Criteria for Cryptographic Functions. In Advances in Cryptology: Proceedings of EUROCRYPT '89, pages 549\u2013562. Springer-Verlag, Berlin, 1990."},{"key":"141939_CR14","first-page":"476","volume-title":"Advances in Cryptology: Proceedings of CRYPTO '90","author":"R. C. Merkle","year":"1991","unstructured":"R. C. Merkle. Fast software encryption functions. In Advances in Cryptology: Proceedings of CRYPTO '90, pages 476\u2013501. Springer-Verlag, Berlin, 1991."},{"key":"141939_CR15","first-page":"92","volume-title":"Advances in Cryptology: Proceedings of EUROCRYPT '92","author":"K. Nyberg","year":"1992","unstructured":"K. Nyberg. On the Construction of Highly Nonlinear Permutations. In Advances in Cryptology: Proceedings of EUROCRYPT '92, pages 92\u201398. Springer-Verlag, Berlin, 1992."},{"key":"141939_CR16","unstructured":"National Bureau of Standards. Data Encryption Standard. Federal Information Processing Standard Publication 46, 1977."},{"key":"141939_CR17","unstructured":"B. O'Higgins. BNR leads industry in client\/server network security. Telesis, pages 181\u2013190, Feb. 1994."},{"key":"141939_CR18","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C. E. Shannon","year":"1949","unstructured":"C. E. Shannon. Communication Theory of Secrecy System. Bell System Technical Journal, volume 28:pages 656\u2013715, 1949.","journal-title":"Bell System Technical Journal"},{"key":"141939_CR19","first-page":"267","volume-title":"Advances in Cryptology: Proceedings of EUROCRYPT '87","author":"A. Shimizu","year":"1988","unstructured":"A. Shimizu and S. Miyaguchi. Fast Data Encryption Algorithm FEAL. In Advances in Cryptology: Proceedings of EUROCRYPT '87, pages 267\u2013278. Springer-Verlag, Berlin, 1988."},{"key":"141939_CR20","series-title":"Technical Report","volume-title":"Efficient DES key search","author":"M. J. Wiener","year":"1994","unstructured":"M. J. Wiener. Efficient DES key search. Technical Report TR-244, School of Computer Science, Carleton University, Ottawa, Canada, May 1994. (Also presented at the Rump Session of CRYPTO '93)."},{"issue":"25","key":"141939_CR21","doi-asserted-by":"crossref","first-page":"2165","DOI":"10.1049\/el:19951466","volume":"31","author":"A. Youssef","year":"1995","unstructured":"A. Youssef, S.E. Tavares, S. Mister, and C.A. Adams. Linear Approximation of Injective S-boxes. IEE Electronics Letters, volume 31,no. 25:pages 2165\u20132166, Dec. 1995.","journal-title":"IEE Electronics Letters"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1008276912749.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1023\/A:1008276912749\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1008276912749.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,29]],"date-time":"2025-07-29T02:34:14Z","timestamp":1753756454000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1023\/A:1008276912749"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997,11]]},"references-count":21,"journal-issue":{"issue":"3","published-print":{"date-parts":[[1997,11]]}},"alternative-id":["141939"],"URL":"https:\/\/doi.org\/10.1023\/a:1008276912749","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"type":"print","value":"0925-1022"},{"type":"electronic","value":"1573-7586"}],"subject":[],"published":{"date-parts":[[1997,11]]}}}