{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:08:08Z","timestamp":1775066888048,"version":"3.50.1"},"reference-count":12,"publisher":"Informa UK Limited","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptologia"],"published-print":{"date-parts":[[2007,3,28]]},"DOI":"10.1080\/01611190701215640","type":"journal-article","created":{"date-parts":[[2007,3,30]],"date-time":"2007-03-30T06:16:02Z","timestamp":1175235362000},"page":"143-151","source":"Crossref","is-referenced-by-count":10,"title":["A Simplified IDEA Algorithm"],"prefix":"10.1080","volume":"31","author":[{"given":"Nick","family":"Hoffman","sequence":"first","affiliation":[]}],"member":"301","reference":[{"key":"CIT0001","first-page":"389","volume-title":"Advances in Cryptology\u2014EUROCRYPT '90, Lecture Notes in Computer Science","author":"Lai X.","year":"1991"},{"key":"CIT0002","first-page":"17","volume-title":"Advances in Cryptology\u2014EUROCRYPT '91, Lecture Notes in Computer Science","author":"Lai X.","year":"1991"},{"key":"CIT0003","unstructured":"Mediacrypt AG , The IDEA Block Cipher , submission to the NESSIE Project,http:\/\/cryptonessie.org(last accessed February 23, 2007) ."},{"key":"CIT0004","first-page":"105","volume-title":"Advances in Cryptology\u2014EUROCRYPT \u203293, Lecture Notes in Computer Science","author":"Meier W.","year":"1994"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1201\/9781439821916"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1080\/0161-110391891838"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1080\/0161-110291890948"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1080\/0161-119691884799"},{"key":"CIT0009","volume-title":"Applied Cryptography,","author":"Schneier B.","year":"1996","edition":"2"},{"key":"CIT0010","unstructured":"Schneier , B.1999.Crypto Guru Bruce Schneier Answers. http:\/\/slashdot.org\/interviews\/99\/10\/29\/0832246.shtmllast accessed February 23, 2007."},{"key":"CIT0011","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"Shannon C.","year":"1949","journal-title":"Bell Systems Technical Journal"},{"key":"CIT0012","volume-title":"Introduction to Cryptography with Coding Theory,","author":"Trappe W.","year":"2006","edition":"2"}],"container-title":["Cryptologia"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/01611190701215640","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,17]],"date-time":"2017-06-17T15:51:12Z","timestamp":1497714672000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/01611190701215640"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,3,28]]},"references-count":12,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2007,3,28]]}},"alternative-id":["10.1080\/01611190701215640"],"URL":"https:\/\/doi.org\/10.1080\/01611190701215640","relation":{},"ISSN":["0161-1194","1558-1586"],"issn-type":[{"value":"0161-1194","type":"print"},{"value":"1558-1586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,3,28]]}}}