{"@context":{"@vocab":"https://cir.nii.ac.jp/schema/1.0/","rdfs":"http://www.w3.org/2000/01/rdf-schema#","dc":"http://purl.org/dc/elements/1.1/","dcterms":"http://purl.org/dc/terms/","foaf":"http://xmlns.com/foaf/0.1/","prism":"http://prismstandard.org/namespaces/basic/2.0/","cinii":"http://ci.nii.ac.jp/ns/1.0/","datacite":"https://schema.datacite.org/meta/kernel-4/","ndl":"http://ndl.go.jp/dcndl/terms/","jpcoar":"https://github.com/JPCOAR/schema/blob/master/2.0/"},"@id":"https://cir.nii.ac.jp/crid/1520009407532766080.json","@type":"Article","productIdentifier":[{"identifier":{"@type":"NDL_BIB_ID","@value":"6555787"}},{"identifier":{"@type":"URI","@value":"http://id.ndl.go.jp/bib/6555787"}},{"identifier":{"@type":"URI","@value":"https://ndlsearch.ndl.go.jp/books/R000000004-I6555787"}},{"identifier":{"@type":"NDL_BIB_ID","@value":"6554977"}},{"identifier":{"@type":"URI","@value":"http://id.ndl.go.jp/bib/6554977"}},{"identifier":{"@type":"URI","@value":"https://ndlsearch.ndl.go.jp/books/R000000004-I6554977"}},{"identifier":{"@type":"NDL_BIB_ID","@value":"6556202"}},{"identifier":{"@type":"URI","@value":"http://id.ndl.go.jp/bib/6556202"}},{"identifier":{"@type":"URI","@value":"https://ndlsearch.ndl.go.jp/books/R000000004-I6556202"}},{"identifier":{"@type":"NDL_BIB_ID","@value":"6551724"}},{"identifier":{"@type":"URI","@value":"http://id.ndl.go.jp/bib/6551724"}},{"identifier":{"@type":"URI","@value":"https://ndlsearch.ndl.go.jp/books/R000000004-I6551724"}},{"identifier":{"@type":"NAID","@value":"110003296075"}},{"identifier":{"@type":"NAID","@value":"110003171571"}},{"identifier":{"@type":"NAID","@value":"110003177750"}},{"identifier":{"@type":"NAID","@value":"110003288826"}}],"dc:title":[{"@value":"DESの分割統治的攻撃法(その6)i.i.d.系列の最尤推定器を用いたDESの最終段鍵の感度解析"},{"@language":"ja-Kana","@value":"DES ノ ブンカツ トウチテキ コウゲキホウ ソノ 6 i i d ケイレツ ノ サイユウ スイテイキ オ モチイタ DES ノ サイシュウダン カギ ノ カンド カイセキ"}],"dcterms:alternative":[{"@value":"DESの分割統治的攻撃法(その6)i.i.d.系列の最尤推定器を用いたDESの最終段鍵の感度解析"},{"@value":"モバイル環境におけるPerson to person高信頼性情報流通技術(情報通信サブソサイエティ合同研究会)"},{"@language":"ja-Kana","@value":"モバイル カンキョウ ニ オケル Person to person コウシンライ セイジョウホウ リュウツウ ギジュツ ジョウホウ ツウシン サブソサイエティ ゴウドウ ケンキュウカイ"}],"dc:language":"ja","creator":[{"@id":"https://cir.nii.ac.jp/crid/1030003658312512389","@type":"Researcher","personIdentifier":[{"@type":"KAKEN_RESEARCHERS","@value":"20038102"},{"@type":"NRID","@value":"1000020038102"},{"@type":"NRID","@value":"9000258450167"},{"@type":"NRID","@value":"9000004564633"},{"@type":"NRID","@value":"9000004827993"},{"@type":"NRID","@value":"9000241950671"},{"@type":"NRID","@value":"9000018403220"},{"@type":"NRID","@value":"9000022351334"},{"@type":"NRID","@value":"9000006085365"},{"@type":"NRID","@value":"9000004830814"},{"@type":"NRID","@value":"9000297484440"},{"@type":"NRID","@value":"9000004564635"},{"@type":"NRID","@value":"9000004828347"},{"@type":"NRID","@value":"9000018342832"},{"@type":"NRID","@value":"9000296676184"},{"@type":"NRID","@value":"9000016595156"},{"@type":"NRID","@value":"9000004564638"},{"@type":"NRID","@value":"9000004878471"},{"@type":"NRID","@value":"9000251015111"},{"@type":"NRID","@value":"9000004800398"},{"@type":"NRID","@value":"9000283636347"},{"@type":"NRID","@value":"9000258255647"},{"@type":"NRID","@value":"9000006204346"},{"@type":"NRID","@value":"9000006297942"},{"@type":"NRID","@value":"9000003295123"},{"@type":"NRID","@value":"9000004831264"},{"@type":"NRID","@value":"9000283831401"},{"@type":"NRID","@value":"9000310731912"},{"@type":"NRID","@value":"9000018313120"},{"@type":"NRID","@value":"9000019071655"},{"@type":"NRID","@value":"9000322738476"},{"@type":"NRID","@value":"9000004794547"},{"@type":"RESEARCHMAP","@value":"https://researchmap.jp/read0172027"}],"foaf:name":[{"@value":"香田 徹"}]},{"@id":"https://cir.nii.ac.jp/crid/1581698602292640898","@type":"Researcher","personIdentifier":[{"@type":"NRID","@value":"9000004740494"}],"foaf:name":[{"@value":"鶴田 貴之"}]},{"@id":"https://cir.nii.ac.jp/crid/1581698602292640768","@type":"Researcher","personIdentifier":[{"@type":"NRID","@value":"9000004740493"}],"foaf:name":[{"@value":"石原 博志"}]}],"publication":{"publicationIdentifier":[{"@type":"NDL_BIB_ID","@value":"000000050569"},{"@type":"ISSN","@value":"09135685"},{"@type":"LISSN","@value":"09135685"},{"@type":"NCID","@value":"AA1123312X"}],"prism:publicationName":[{"@value":"電子情報通信学会技術研究報告 = IEICE technical report : 信学技報"}],"dc:publisher":[{"@value":"東京 : 電子情報通信学会"}],"prism:publicationDate":"2003-03-27","prism:volume":"102","prism:number":"746","prism:startingPage":"15","prism:endingPage":"22"},"url":[{"@id":"http://id.ndl.go.jp/bib/6555787"},{"@id":"https://ndlsearch.ndl.go.jp/books/R000000004-I6555787"},{"@id":"http://id.ndl.go.jp/bib/6554977"},{"@id":"https://ndlsearch.ndl.go.jp/books/R000000004-I6554977"},{"@id":"http://id.ndl.go.jp/bib/6556202"},{"@id":"https://ndlsearch.ndl.go.jp/books/R000000004-I6556202"},{"@id":"http://id.ndl.go.jp/bib/6551724"},{"@id":"https://ndlsearch.ndl.go.jp/books/R000000004-I6551724"}],"foaf:topic":[{"@id":"https://cir.nii.ac.jp/all?q=%E5%88%86%E5%89%B2%E7%B5%B1%E6%B2%BB%E6%B3%95","dc:title":"分割統治法"},{"@id":"https://cir.nii.ac.jp/all?q=%E5%8F%8C%E5%AF%BE%E8%A1%A8%E7%8F%BE","dc:title":"双対表現"},{"@id":"https://cir.nii.ac.jp/all?q=%CF%872%E6%A4%9C%E5%AE%9A","dc:title":"χ2検定"},{"@id":"https://cir.nii.ac.jp/all?q=%E6%9A%97%E5%8F%B7%E6%96%87%E5%8D%98%E7%8B%AC%E6%94%BB%E6%92%83%E8%80%90%E6%80%A7","dc:title":"暗号文単独攻撃耐性"},{"@id":"https://cir.nii.ac.jp/all?q=S-box-and-bit-slicing","dc:title":"S-box-and-bit-slicing"},{"@id":"https://cir.nii.ac.jp/all?q=dual%20representation","dc:title":"dual representation"},{"@id":"https://cir.nii.ac.jp/all?q=i.%20i.%20d.%20sequence","dc:title":"i. i. d. sequence"},{"@id":"https://cir.nii.ac.jp/all?q=maximum-likelihood%20estimator","dc:title":"maximum-likelihood estimator"},{"@id":"https://cir.nii.ac.jp/all?q=%CF%872-test","dc:title":"χ2-test"},{"@id":"https://cir.nii.ac.jp/all?q=resistance%20for%20ciphertext-only%20attack","dc:title":"resistance for ciphertext-only attack"}],"relatedProduct":[{"@id":"https://cir.nii.ac.jp/crid/1364233268146824320","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@value":"Information sources using chaotic dynamics"}]},{"@id":"https://cir.nii.ac.jp/crid/1520009407445712768","@type":"Article","relationType":["cites","isCitedBy"],"jpcoar:relatedTitle":[{"@value":"DESの分割統治的攻撃法(その5)DESの鍵感度解析のための2段DESの双対表現"},{"@language":"ja-Kana","@value":"DES ノ ブンカツ トウチテキ コウゲキホウ ソノ 5 DES ノ カギ カンド カイセキ ノ タメ ノ 2ダン DES ノ ソウツイ ヒョウゲン"}]},{"@id":"https://cir.nii.ac.jp/crid/1520009407826090112","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@value":"DESの分割統治的攻撃法(4)Trellisを用いた暗号文単独攻撃"},{"@language":"ja-Kana","@value":"DES ノ ブンカツ トウチテキ コウゲキホウ 4 Trellis オ モチイタ アンゴウブン タンドク コウゲキ"}]},{"@id":"https://cir.nii.ac.jp/crid/1520290883998187904","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@value":"DESの分割統治的攻撃法(3)暗号文単独による鍵の情報理論的感度解析"},{"@language":"ja-Kana","@value":"DES ノ ブンカツ トウチテキ コウゲキホウ 3 アンゴウブン タンドク ニ ヨル カギ ノ ジョウホウ リロンテキ カンド カイセキ"}]},{"@id":"https://cir.nii.ac.jp/crid/1570009750783405696","@type":"Article","relationType":["cites"]},{"@id":"https://cir.nii.ac.jp/crid/1570291225721880832","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Partitioning Cryptanalysis"}]},{"@id":"https://cir.nii.ac.jp/crid/1570291225760116480","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Partitioning Cryptanalysis"}]},{"@id":"https://cir.nii.ac.jp/crid/1570572700698590848","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@value":"DESの分割統治的攻撃法 : (その2) 鍵の感度解析"}]},{"@id":"https://cir.nii.ac.jp/crid/1570572700698772736","@type":"Article","relationType":["cites"]},{"@id":"https://cir.nii.ac.jp/crid/1570572700698773888","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"From Differential Cryptanalysis to Cipher-Only Attacks"}]},{"@id":"https://cir.nii.ac.jp/crid/1570854175675479680","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@value":"DESの分割統治的攻撃法 : (その2) 鍵の感度解析"}]},{"@id":"https://cir.nii.ac.jp/crid/1570854175675483264","@type":"Article","relationType":["cites"]},{"@id":"https://cir.nii.ac.jp/crid/1570854175675484544","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Partitioning Cryptanalysis"}]},{"@id":"https://cir.nii.ac.jp/crid/1570854176721948672","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"A generalisation of linear cryptanalysis and applicability of Matsui's piling-up lemma"}]},{"@id":"https://cir.nii.ac.jp/crid/1571135650652009344","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Linear Cryptanalysis Method for DES Cipher"}]},{"@id":"https://cir.nii.ac.jp/crid/1571135650652014080","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"The First Experimental Cryptanalysis of the Data Encryption Standard"}]},{"@id":"https://cir.nii.ac.jp/crid/1571135650690250240","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@value":"DESの分割統治的攻撃法 : (その1) S-Box の入出力特性"}]},{"@id":"https://cir.nii.ac.jp/crid/1571417125628905728","@type":"Article","relationType":["cites"]},{"@id":"https://cir.nii.ac.jp/crid/1571698600605436160","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Differential Power Analysis"}]},{"@id":"https://cir.nii.ac.jp/crid/1571980075168466176","@type":"Article","relationType":["isCitedBy"],"jpcoar:relatedTitle":[{"@language":"ja","@value":"DESの分割統治的攻撃法(その7) : 複数個の偏りに対する最尤推定法を用いた暗号文単独攻撃"},{"@language":"en","@value":"S-box-and-Bit-Sliced Analysis of DES (VII) : Ciphertext-only Attack by Maximum Likelihood Method"}]},{"@id":"https://cir.nii.ac.jp/crid/1571980075582144896","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"An experiment on DES Statistical Cryptanalysis"}]},{"@id":"https://cir.nii.ac.jp/crid/1571980075582324352","@type":"Article","relationType":["cites"]},{"@id":"https://cir.nii.ac.jp/crid/1571980075620377344","@type":"Article","relationType":["cites"]},{"@id":"https://cir.nii.ac.jp/crid/1571980075620378496","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Differential Power Analysis"}]},{"@id":"https://cir.nii.ac.jp/crid/1572261550558852096","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@value":"DESの分割統治的攻撃法 : (その1) S-Box の入出力特性"}]},{"@id":"https://cir.nii.ac.jp/crid/1572261550558856576","@type":"Article","relationType":["cites"]},{"@id":"https://cir.nii.ac.jp/crid/1572261550558857856","@type":"Article","relationType":["cites"]},{"@id":"https://cir.nii.ac.jp/crid/1572261550559035392","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Differential Power Analysis"}]},{"@id":"https://cir.nii.ac.jp/crid/1572543025535744128","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Linear Cryptanalysis Method for DES Cipher"}]},{"@id":"https://cir.nii.ac.jp/crid/1572543025535748480","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@value":"DESの分割統治的攻撃法 : (その1) S-Box の入出力特性"}]},{"@id":"https://cir.nii.ac.jp/crid/1572543025573801856","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"An experiment on DES Statistical Cryptanalysis"}]},{"@id":"https://cir.nii.ac.jp/crid/1572824500512454272","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"An experiment on DES Statistical Cryptanalysis"}]},{"@id":"https://cir.nii.ac.jp/crid/1573105975527224320","@type":"Article","relationType":["cites"]},{"@id":"https://cir.nii.ac.jp/crid/1573387450465699200","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"From Differential Cryptanalysis to Cipher-Only Attacks"}]},{"@id":"https://cir.nii.ac.jp/crid/1573387450465700352","@type":"Article","relationType":["cites"]},{"@id":"https://cir.nii.ac.jp/crid/1573668925442405504","@type":"Article","relationType":["cites"]},{"@id":"https://cir.nii.ac.jp/crid/1573668925480642688","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"From Differential Cryptanalysis to Cipher-Only Attacks"}]},{"@id":"https://cir.nii.ac.jp/crid/1573668925480645120","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@value":"DESの分割統治的攻撃法 : (その2) 鍵の感度解析"}]},{"@id":"https://cir.nii.ac.jp/crid/1573950400419116544","@type":"Article","relationType":["cites"]},{"@id":"https://cir.nii.ac.jp/crid/1573950400419297024","@type":"Article","relationType":["cites"]},{"@id":"https://cir.nii.ac.jp/crid/1573950400457354368","@type":"Article","relationType":["cites"]},{"@id":"https://cir.nii.ac.jp/crid/1574231875434063104","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Linear Cryptanalysis Method for DES Cipher"}]},{"@id":"https://cir.nii.ac.jp/crid/1574231875434066304","@type":"Article","relationType":["cites"]},{"@id":"https://cir.nii.ac.jp/crid/1574231876416186112","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"\"The first experimental cryptanalysis of the data encryption standard,\" Advances in Cryptology-CRYPTO 1994"}]}],"dataSourceIdentifier":[{"@type":"NDL_SEARCH","@value":"oai:ndlsearch.ndl.go.jp:R000000004-I6555787"},{"@type":"NDL_SEARCH","@value":"oai:ndlsearch.ndl.go.jp:R000000004-I6554977"},{"@type":"NDL_SEARCH","@value":"oai:ndlsearch.ndl.go.jp:R000000004-I6556202"},{"@type":"NDL_SEARCH","@value":"oai:ndlsearch.ndl.go.jp:R000000004-I6551724"},{"@type":"CIA","@value":"110003296075"},{"@type":"CIA","@value":"110003171571"},{"@type":"CIA","@value":"110003288826"},{"@type":"CIA","@value":"110003177750"}]}