{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:54:54Z","timestamp":1773615294701,"version":"3.50.1"},"reference-count":22,"publisher":"Allerton Press","issue":"1","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2019,1]]},"DOI":"10.3103\/s0146411619010036","type":"journal-article","created":{"date-parts":[[2019,4,16]],"date-time":"2019-04-16T15:41:50Z","timestamp":1555429310000},"page":"39-44","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Security Evaluation of a Brute-force Attack on a Cipher Using a Statistical Criterion for Plaintext"],"prefix":"10.3103","volume":"53","author":[{"given":"A. V.","family":"Babash","sequence":"first","affiliation":[]},{"given":"V. A.","family":"Sizov","sequence":"additional","affiliation":[]},{"given":"A. A.","family":"Mikryukov","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2019,4,16]]},"reference":[{"key":"7103_CR1","unstructured":"Banks, M.J., A Search-Based Tool for the Automated Cryptanalysis of Classical Ciphers, 2008."},{"key":"7103_CR2","unstructured":"Encyclopedia of Cryptography and Security, van Tilborg, H.C.A., Ed., Springer Science+Business Media, Inc., 2005."},{"key":"7103_CR3","unstructured":"Schneier, B., Applied Cryptography: Protocols, Algorithms, and Source Code in C, 1993."},{"key":"7103_CR4","volume-title":"Introduction to Modern Cryptography","author":"J. Katz","year":"2015","unstructured":"Katz, J. and Lindell, Y., Introduction to Modern Cryptography, CRC Press, 2015, 2nd ed."},{"key":"7103_CR5","volume-title":"Automatic Processing of Natural Language","author":"A.V. Lukanin","year":"2011","unstructured":"Lukanin, A.V., Automatic Processing of Natural Language, Chelyabinsk: SUSU, 2011."},{"key":"7103_CR6","unstructured":"Graham, R.D., Password Cracking, Mining, and GPUs, 2011."},{"key":"7103_CR7","volume-title":"Works on Information Theory and Cybernetics","author":"C. Shannon","year":"1963","unstructured":"Shannon, C., Works on Information Theory and Cybernetics, Moscow: Inostr. Liter., 1963."},{"key":"7103_CR8","doi-asserted-by":"crossref","unstructured":"Neyman, J. and Pearson, E.S., On the problem of the most efficient tests of statistical hypotheses, Philos. Trans. R. Soc., A, 1933, vol. 231, pp. 289\u2013337.","DOI":"10.1098\/rsta.1933.0009"},{"key":"7103_CR9","doi-asserted-by":"publisher","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Cryptography","author":"A.J. Menezes","year":"1996","unstructured":"Menezes, A.J., Van Oorschot, P., and Vanstone, S., Handbook of Applied Cryptography, New York: CRC Press, 1996."},{"key":"7103_CR10","unstructured":"Rasoolzadeh, S., Ahmadian, Z., Salmasizadeh, M., and Aref, M.R., Total break of Zorro using linear and differential attacks, IACR Cryptol. ePrint Arch., 2014, vol. 220. http:\/\/eprint.iacr.org\/2014\/220."},{"key":"7103_CR11","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511987045","volume-title":"A Course in Combinatorics","author":"J.H. Van Lint","year":"2001","unstructured":"Van Lint, J.H. and Wilson, R.M., A Course in Combinatorics, Cambridge University Press, 2001."},{"key":"7103_CR12","volume-title":"Differential cryptanalysis of the stream ciphers Py, Py6 and Pypy cryptology","author":"Hongjun Wu","year":"2007","unstructured":"Hongjun Wu and Bart Preneel, Differential cryptanalysis of the stream ciphers Py, Py6 and Pypy cryptology, EUROCRYPT, 2007, pp. 276\u2013290."},{"key":"7103_CR13","doi-asserted-by":"crossref","unstructured":"Differential cryptanalysis and linear distinguisher of full-round Zorro, Applied Cryptography and Network Security\u2014ACNS 2014; Lect. Notes Comput. Sci., 2014, vol. 8479, pp. 308\u2013323.","DOI":"10.1007\/978-3-319-07536-5_19"},{"key":"7103_CR14","first-page":"229","volume":"765","author":"E. Biham","year":"1994","unstructured":"Biham, E., New type of cryptanalytic attacks using related key, EUROCRYPT'93; Lect. Notes Comput. Sci., 1994, vol. 765, pp. 229\u2013246.","journal-title":"Lect. Notes Comput. Sci."},{"key":"7103_CR15","unstructured":"NIST, Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher, (Archive 23.01.2012) Special Publication 800-67, p. 14."},{"key":"7103_CR16","doi-asserted-by":"crossref","unstructured":"Fluhrer, S., Mantin, I., and Shamir, A., Weaknesses in the key scheduling algorithm of RC4, Eighth Annual Workshop on Selected Areas in Cryptography (August\n                           2001). http:\/\/citeseer.ist.psu.edu\/fluhrer01weaknesses.html. Accessed September 17, 2001.","DOI":"10.1007\/3-540-45537-X_1"},{"key":"#cr-split#-7103_CR17.1","doi-asserted-by":"crossref","unstructured":"Zheng, Y. and Wu, W., Biclique Attack of Block Cipher SKINNY, Information Security and Cryptology. Inscrypt 2016","DOI":"10.1007\/978-3-319-54705-3_1"},{"key":"#cr-split#-7103_CR17.2","unstructured":"Lect. Notes Comput. Sci., 2017, vol. 10143."},{"key":"7103_CR18","doi-asserted-by":"crossref","unstructured":"\u00c7oban, M., Karako\u00e7, F., and Boztas, \u00d6., Biclique Cryptanalysis of TWINE, Cryptology and Network Security. CANS 2012; Lect. Notes Comput. Sci., 2012, vol. 7712.","DOI":"10.1007\/978-3-642-35404-5_5"},{"key":"#cr-split#-7103_CR19.1","doi-asserted-by":"crossref","unstructured":"Rechberger, C., On bruteforce-like cryptanalysis: New meet-in-the-middle attacks in symmetric cryptanalysis, Information Security and Cryptology-ICISC 2012","DOI":"10.1007\/978-3-642-37682-5_3"},{"key":"#cr-split#-7103_CR19.2","unstructured":"Lect. Notes Comput. Sci., 2013, vol. 7839."},{"key":"7103_CR20","unstructured":"Babash, A.V., Cryptographic and Theoretical Automaton Aspects of Modern Information Protection, Moscow: International Consortium \u201cElectronic University,\u201d Eurasian Open Institute, MESI, 2008, vol. 1."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411619010036.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411619010036","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411619010036.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T21:57:59Z","timestamp":1773611879000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411619010036"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1]]},"references-count":22,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,1]]}},"alternative-id":["7103"],"URL":"https:\/\/doi.org\/10.3103\/s0146411619010036","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1]]},"assertion":[{"value":"20 February 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 July 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 July 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 April 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}