{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T23:54:06Z","timestamp":1725580446180},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642202667"},{"type":"electronic","value":"9783642202674"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-20267-4_30","type":"book-chapter","created":{"date-parts":[[2011,4,8]],"date-time":"2011-04-08T20:34:38Z","timestamp":1302294878000},"page":"285-294","source":"Crossref","is-referenced-by-count":0,"title":["Cryptanalytic Attack on the Self-Shrinking Sequence Generator"],"prefix":"10.1007","author":[{"given":"Maria Eugenia","family":"Pazo-Robles","sequence":"first","affiliation":[]},{"given":"Amparo","family":"F\u00faster-Sabater","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Bluetooth, Specifications of the Bluetooth system, Version 1.1, \n \n http:\/\/www.bluetooth.com\/","key":"30_CR1"},{"key":"30_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1007\/3-540-48329-2_3","volume-title":"Advances in Cryptology - CRYPTO \u201993","author":"D. Coppersmith","year":"1994","unstructured":"Coppersmith, D., Krawczyk, H., Mansour, Y.: The Shrinking Generator. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol.\u00a0773, pp. 22\u201339. Springer, Heidelberg (1994)"},{"issue":"12","key":"30_CR3","doi-asserted-by":"publisher","first-page":"1427","DOI":"10.1016\/j.am1.2002.09.003","volume":"17","author":"A. F\u00faster-Sabater","year":"2004","unstructured":"F\u00faster-Sabater, A.: Run Distribution in Nonlinear Binary Generators. Applied Mathematics Letters\u00a017(12), 1427\u20131432 (2004)","journal-title":"Applied Mathematics Letters"},{"issue":"3","key":"30_CR4","doi-asserted-by":"publisher","first-page":"530","DOI":"10.1016\/j.tcs.2008.09.030","volume":"409","author":"A. F\u00faster-Sabater","year":"2008","unstructured":"F\u00faster-Sabater, A., Caballero-Gil, P.: Strategic Attack on the Shrinking Generator. Theoretical Computer Science\u00a0409(3), 530\u2013536 (2008)","journal-title":"Theoretical Computer Science"},{"key":"30_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"621","DOI":"10.1007\/978-3-642-01970-8_61","volume-title":"Computational Science \u2013 ICCS 2009","author":"A. F\u00faster-Sabater","year":"2009","unstructured":"F\u00faster-Sabater, A., Caballero-Gil, P., Delgado-Mohatar, O.: Deterministic Computation of Pseudorandomness in Sequences of Cryptographic Application. In: Allen, G., Nabrzyski, J., Seidel, E., van Albada, G.D., Dongarra, J., Sloot, P.M.A. (eds.) ICCS 2009. LNCS, vol.\u00a05544, pp. 621\u2013630. Springer, Heidelberg (2009)"},{"key":"30_CR6","volume-title":"Shift Register-Sequences","author":"S.W. Golomb","year":"1982","unstructured":"Golomb, S.W.: Shift Register-Sequences. Aegean Park Press, Laguna Hill (1982)"},{"unstructured":"GSM, Global Systems for Mobile Communications, \n \n http:\/\/cryptome.org\/gsm-a512.htm","key":"30_CR7"},{"issue":"4","key":"30_CR8","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1109\/TIT.1980.1056220","volume":"26","author":"M. Hellman","year":"1980","unstructured":"Hellman, M.: A Cryptanalytic Time-Memory Trade-Off. IEEE Trans. Informat. Theory\u00a026(4), 234\u2013247 (1980)","journal-title":"IEEE Trans. Informat. Theory"},{"key":"30_CR9","doi-asserted-by":"publisher","first-page":"714","DOI":"10.1109\/TIT.2004.825256","volume":"50","author":"Y. Hu","year":"2004","unstructured":"Hu, Y., Xiao, G.: Generalized Self-Shrinking Generator. IEEE Trans. Inform. Theory\u00a050, 714\u2013719 (2004)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"30_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/BFb0053436","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"W. Meier","year":"1995","unstructured":"Meier, W., Staffelbach, O.: The Self-shrinking Generator. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 205\u2013214. Springer, Heidelberg (1995)"},{"key":"30_CR11","volume-title":"Handbook of Applied Cryptography","author":"A.J. Menezes","year":"1997","unstructured":"Menezes, A.J., et al.: Handbook of Applied Cryptography. CRC Press, New York (1997)"},{"key":"30_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1007\/BFb0023298","volume-title":"Information Security and Privacy","author":"M.J. Mihaljevic","year":"1996","unstructured":"Mihaljevic, M.J.: A Faster Cryptanalysis of the Self-Shrinking Generator. In: Pieprzyk, J.P., Seberry, J. (eds.) ACISP 1996. LNCS, vol.\u00a01172, pp. 182\u2013189. Springer, Heidelberg (1996)"},{"unstructured":"Rivest, R.L.: The RC4 Encryption Algorithm. RSA Data Sec., Inc. (March 1998)","key":"30_CR13"},{"unstructured":"Stork Project, \n \n http:\/\/www.stork.eu.org\/documents\/RUB-D6-2-1.pdf","key":"30_CR14"},{"unstructured":"Xilinx, \n \n http:\/\/www.xilinx.com\n \n \n 11. National Instruments, \n \n http:\/\/www.ni.com\/pdf\/products\/us\/cat-flexriofpga.pdf","key":"30_CR15"},{"key":"30_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/11935230_4","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2006","author":"B. Zhang","year":"2006","unstructured":"Zhang, B., Feng, D.: New Guess-and-Determine Attack on the Self-Shrinking Generator. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol.\u00a04284, pp. 54\u201368. Springer, Heidelberg (2006)"}],"container-title":["Lecture Notes in Computer Science","Adaptive and Natural Computing Algorithms"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-20267-4_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T21:10:50Z","timestamp":1558559450000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-20267-4_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642202667","9783642202674"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-20267-4_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}