{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T14:52:46Z","timestamp":1761663166372,"version":"3.44.0"},"reference-count":10,"publisher":"IEEE","license":[{"start":{"date-parts":[[2012,12,1]],"date-time":"2012-12-01T00:00:00Z","timestamp":1354320000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2012,12,1]],"date-time":"2012-12-01T00:00:00Z","timestamp":1354320000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,12]]},"DOI":"10.1109\/glocom.2012.6503220","type":"proceedings-article","created":{"date-parts":[[2013,4,26]],"date-time":"2013-04-26T19:29:23Z","timestamp":1367004563000},"page":"856-861","source":"Crossref","is-referenced-by-count":4,"title":["Linear cryptanalysis against block ciphered system under noisy ciphertexts"],"prefix":"10.1109","author":[{"given":"Yahya S.","family":"Khiabani","sequence":"first","affiliation":[{"name":"School of Electrical Engineering and Computer Science, Louisiana State University (LSU), Baton Rouge, 70803, USA"}]},{"given":"Shuangqing","family":"Wei","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering and Computer Science, Louisiana State University (LSU), Baton Rouge, 70803, USA"}]},{"given":"Jian","family":"Yuan","sequence":"additional","affiliation":[{"name":"Department of Electronic Engineering, Tsinghua University, Beijing, China, 100084"}]},{"given":"Jian","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of Electronic Engineering, Tsinghua University, Beijing, China, 100084"}]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2011.6162585"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2010.5680485"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48658-5_1"},{"key":"1","first-page":"153","article-title":"Performance of BCH codes with des encryption in a digital mobile channel","volume":"793","author":"ferland","year":"1994","journal-title":"Information Theory and Applications Third Canadian Workshop Rockland Ontario Canada Lecture Notes in Computer Science Springer-Verlag"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1138127.1138130"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2009.071278"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/RWS.2011.5725509"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2001.941144"},{"key":"9","first-page":"174","article-title":"On probability of success in linear and differential cryptanalysis","author":"selcuk","year":"2002","journal-title":"SCN"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48285-7_33"}],"event":{"name":"GLOBECOM 2012 - 2012 IEEE Global Communications Conference","start":{"date-parts":[[2012,12,3]]},"location":"Anaheim, CA, USA","end":{"date-parts":[[2012,12,7]]}},"container-title":["2012 IEEE Global Communications Conference (GLOBECOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6490098\/6503052\/06503220.pdf?arnumber=6503220","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T19:06:34Z","timestamp":1756235194000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6503220\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,12]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/glocom.2012.6503220","relation":{},"subject":[],"published":{"date-parts":[[2012,12]]}}}