{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,18]],"date-time":"2025-04-18T05:25:38Z","timestamp":1744953938137},"reference-count":25,"publisher":"Informa UK Limited","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptologia"],"published-print":{"date-parts":[[2008,1,10]]},"DOI":"10.1080\/01611190701743690","type":"journal-article","created":{"date-parts":[[2008,1,10]],"date-time":"2008-01-10T19:20:37Z","timestamp":1199992837000},"page":"13-22","source":"Crossref","is-referenced-by-count":4,"title":["Improved Related-key Attacks on DESX and DESX+"],"prefix":"10.1080","volume":"32","author":[{"given":"Raphael C.-W.","family":"Phan","sequence":"first","affiliation":[]},{"given":"Adi","family":"Shamir","sequence":"additional","affiliation":[]}],"member":"301","published-online":{"date-parts":[[2008,1,10]]},"reference":[{"key":"CIT0001","first-page":"491","volume-title":"Advances in Cryptology\u2014Eurocrypt '03, Lecture Notes in Computer Science","volume":"2656","author":"Bellare M.","year":"2003"},{"key":"CIT0002","first-page":"398","volume-title":"Advances in Cryptology\u2014Eurocrypt '93, Lecture Notes in Computer Science","volume":"765","author":"Biham E.","year":"1994"},{"key":"CIT0003","first-page":"507","volume-title":"Advances in Cryptology\u2014Eurocrypt '05, Lecture Notes in Computer Science","volume":"3494","author":"Biham E.","year":"2005"},{"key":"CIT0004","first-page":"443","volume-title":"Advances in Cryptology\u2014Asiacrypt '05, Lecture Notes in Computer Science","volume":"3788","author":"Biham E.","year":"2005"},{"key":"CIT0005","first-page":"20","volume-title":"Topics in Cryptology\u2014CT-RSA '07, Lecture Notes in Computer Science","volume":"4377","author":"Biham E.","year":"2007"},{"key":"CIT0006","doi-asserted-by":"crossref","first-page":"487","DOI":"10.1007\/3-540-48071-4_34","volume-title":"Advances in Cryptology\u2014Crypto '92, Lecture Notes in Computer Science","volume":"740","author":"Biham E.","year":"1993"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1007\/BF00630563"},{"key":"CIT0008","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1007\/BFb0052259","volume-title":"Advances in Cryptology\u2014Crypto '97, Lecture Notes in Computer Science","volume":"1294","author":"Biham E.","year":"1997"},{"key":"CIT0009","first-page":"589","volume-title":"Advances in Cryptology\u2014Eurocrypt '00, Lecture Notes in Computer Science","volume":"1807","author":"Biryukov A.","year":"2000"},{"key":"CIT0010","first-page":"220","volume-title":"Proceedings of Cryptographic Hardware and Embedded Systems (CHES '01), Lecture Notes in Computer Science","volume":"2162","author":"Bond M.","year":"2001"},{"key":"CIT0011","doi-asserted-by":"crossref","first-page":"495","DOI":"10.1007\/3-540-57332-1_46","volume-title":"Advances in Cryptology\u2014Asiacrypt '91, Lecture Notes in Computer Science","volume":"739","author":"Daemen J.","year":"1992"},{"key":"CIT0012","first-page":"213","volume-title":"Proceedings of Fast Software Encryption (FSE '00), Lecture Notes in Computer Science","volume":"1978","author":"Ferguson N.","year":"2000"},{"key":"CIT0013","first-page":"237","volume-title":"Advances in Cryptology\u2014Crypto '96, Lecture Notes in Computer Science","volume":"1109","author":"Kelsey J.","year":"1996"},{"key":"CIT0014","first-page":"233","volume-title":"Proceedings of Information and Communications Security (ICICS '97), Lecture Notes in Computer Science","volume":"1334","author":"Kelsey J.","year":"1997"},{"key":"CIT0015","first-page":"252","volume-title":"Advances in Cryptology\u2014Crypto '96, Lecture Notes in Computer Science","volume":"1109","author":"Kilian J.","year":"1996"},{"issue":"1","key":"CIT0016","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1007\/s001450010015","volume":"14","author":"Kilian J.","year":"2001","journal-title":"Journal of Cryptology"},{"key":"CIT0017","first-page":"225","volume-title":"Proceedings of Fast Software Encryption (FSE '07), Lecture Notes in Computer Science","volume":"4593","author":"Kim J.","year":"2007"},{"key":"CIT0018","first-page":"359","volume-title":"Proceedings of Fast Software Encryption (FSE '04), Lecture Notes in Computer Science","volume":"3017","author":"Lucks S.","year":"2004"},{"key":"CIT0019","unstructured":"NIST. 26 July 2004. Announcing Proposed Withdrawal of Federal Information Processing Standard (FIPS) for Data Encryption Standard (DES) and Request for Comments  , edited by    \n                     Jianying   Zhou    ,    \n                     Javier   Lopez    ,    \n                     Robert A.   Deng    , and    \n                     Feng   Bao    .   Berlin  ,      http:\/\/csrc.nist.gov\/Federal-register\/July26-2004-FR-DES-Notice.pdf (accessed 03 December 2004)"},{"key":"CIT0020","first-page":"15","volume-title":"Topics in Cryptology\u2014CT-RSA '04, Lecture Notes in Computer Science","volume":"2964","author":"Phan R. C.-W.","year":"2004"},{"key":"CIT0021","first-page":"111","volume-title":"Proceedings of Information Security Conference (ISC '04), Lecture Notes in Computer Science","volume":"3225","author":"Phan R. C.-W.","year":"2004"},{"key":"CIT0022","unstructured":"Phan  ,   R. C.W.     and    \n                     A.   Shamir    .     7 December 2004. Improved Related-Key Attacks on DESX and DESX+, Presented at the Rump Session of Asiacrypt '04, Jeju Island, Korea, http:\/\/www.iris.re.kr\/ac04\/presentation.htm (accessed 27 November 2007)  ."},{"key":"CIT0023","first-page":"425","volume-title":"Proceedings of Information Security (IS '06), OTM 2006 Confederated Conferences, Lecture Notes in Computer Science","volume":"4277","author":"Razali E.","year":"2006"},{"key":"CIT0024","first-page":"188","volume-title":"Proceedings of Provable Security (ProvSec '07), Lecture Notes in Computer Science","volume":"4784","author":"Razali E.","year":"2007"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1080\/0161-118791861749"}],"container-title":["Cryptologia"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/01611190701743690","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T10:46:02Z","timestamp":1509101162000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/01611190701743690"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,1,10]]},"references-count":25,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2008,1,10]]},"published-print":{"date-parts":[[2008,1,10]]}},"alternative-id":["10.1080\/01611190701743690"],"URL":"https:\/\/doi.org\/10.1080\/01611190701743690","relation":{},"ISSN":["0161-1194","1558-1586"],"issn-type":[{"value":"0161-1194","type":"print"},{"value":"1558-1586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,1,10]]}}}