{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:41:13Z","timestamp":1725550873831},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540441083"},{"type":"electronic","value":"9783540461173"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-46117-5_87","type":"book-chapter","created":{"date-parts":[[2010,3,29]],"date-time":"2010-03-29T21:14:23Z","timestamp":1269897263000},"page":"845-852","source":"Crossref","is-referenced-by-count":1,"title":["An FPGA Implementation of the Linear Cryptanalysis"],"prefix":"10.1007","author":[{"given":"Francois","family":"Koeune","sequence":"first","affiliation":[]},{"given":"Gael","family":"Rouvroy","sequence":"additional","affiliation":[]},{"given":"Standaert","family":"Francois-Xavier","sequence":"additional","affiliation":[]},{"given":"Quisquater","family":"Jean-Jacques","sequence":"additional","affiliation":[]},{"given":"David","family":"Jean-Pierre","sequence":"additional","affiliation":[]},{"given":"Legat","family":"Jean-Didier","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,8,16]]},"reference":[{"key":"87_CR1","series-title":"Lect Notes Comput Sci","first-page":"262","volume-title":"A Chosen-Plaintext Linear Attack on DES","author":"L.R. Knudsen","year":"2000","unstructured":"L.R. Knudsen and J.E. Mathiassen A Chosen-Plaintext Linear Attack on DES. In Bruce Schneier, editor, Proc. of FSE\u201900, LNCS, pages 262\u2013272. Springer, 2000."},{"key":"87_CR2","unstructured":"P. Junod. Linear cryptanalysis of DES. Master\u2019s thesis, Swiss Institute of Technology, Zurich, 2000."},{"key":"87_CR3","series-title":"Lect Notes Comput Sci","first-page":"216","volume-title":"On the complexity of Matsui\u2019s attack","author":"P. Junod","year":"2001","unstructured":"P. Junod. On the complexity of Matsui\u2019s attack. In Proc. of SAC\u201901, LNCS, pages 216\u2013230. Springer, 2001."},{"key":"87_CR4","doi-asserted-by":"crossref","unstructured":"M. Matsui. Linear cryptanalysis method for DES cipher. In Tor Helleseth, editor, Advances in Cryptology-EuroCrypt\u201993, pages 386\u2013397, Berlin, 1993. Springer-Verlag. Lecture Notesin Computer Science Volume 765.","DOI":"10.1007\/3-540-48285-7_33"},{"key":"87_CR5","doi-asserted-by":"crossref","unstructured":"M. Matsui. The first experimental cryptanalysis of the Data Encryption Standard. In Yvo Desmedt, editor, Advances in Cryptology-Crypto\u201994, pages 1\u201311, Berlin, 1994. Springer-Verlag. Lecture Notesin Computer Science Volume 839.","DOI":"10.1007\/3-540-48658-5_1"},{"key":"87_CR6","unstructured":"J.M. Rabaey. Digital Integrated Circuits. Prentice Hall, 1996."},{"key":"87_CR7","unstructured":"Xilinx. Virtex 2.5V field programmable gate arraysd ata sheet. available from http:\/\/www.xilinx.com ."}],"container-title":["Lecture Notes in Computer Science","Field-Programmable Logic and Applications: Reconfigurable Computing Is Going Mainstream"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-46117-5_87","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T19:14:32Z","timestamp":1558984472000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-46117-5_87"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540441083","9783540461173"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/3-540-46117-5_87","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}