{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T16:35:41Z","timestamp":1743006941492,"version":"3.40.3"},"publisher-location":"Boston, MA","reference-count":9,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780792375586"},{"type":"electronic","value":"9780306469589"}],"license":[{"start":{"date-parts":[[2002,1,1]],"date-time":"2002-01-01T00:00:00Z","timestamp":1009843200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/0-306-46958-8_5","type":"book-chapter","created":{"date-parts":[[2006,2,20]],"date-time":"2006-02-20T04:49:39Z","timestamp":1140410979000},"page":"61-73","source":"Crossref","is-referenced-by-count":1,"title":["Probabilistic Relations for the Solitaire Keystream Generator"],"prefix":"10.1007","author":[{"given":"Marina","family":"Pudovkina","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","unstructured":"Schneier B., \u201cThe Solitaire Encryption Algorithm\u201d, http:\/\/www.counterpane.com\/solitaire.html ."},{"key":"5_CR2","unstructured":"Pudovkina M, Varfolomeev A.A. \u201cA Cycle Structure of the Solitaire Keystream Generator\u201d. 3nd International Workshop on Computer Science and Information Technologies CSIT\u20192001, YFA, 2001."},{"key":"5_CR3","unstructured":"Pudovkina M., \u201cWeakness in the Key Scheduling Algorithm of the Solitaire Keystream Generator\u201d, SIBCOM-2001, TOMSK. (the paper is being published)"},{"key":"5_CR4","volume-title":"Analysis of Stream Ciphers","author":"A.A. Varfolomeev","year":"2000","unstructured":"Varfolomeev A.A., Zhukov A.E., Pudovkina M., \u201cAnalysis of Stream Ciphers\u2019, Moscow, MEPhI, 2000."},{"key":"5_CR5","unstructured":"Crowley P. \u201cProblems with Bruce Schneier \u201cSolitaire\u201d\u201d., http:\/\/www.hedonism.demon.co.uk\/paul\/solitaire\/"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Rueppel R.A. \u201cAnalysis and Design of Stream Ciphers\u201d, Springer-Verlag, Communications and Control Engineering Series, 1986.","DOI":"10.1007\/978-3-642-82865-2"},{"key":"5_CR7","unstructured":"Rivest R.L., \u201cThe RC4 encryption algorithm\u201d, RSA Data Security, Inc., Mar. 1992"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"R.J. Jenkins, \u201cISAAC\u201d, Fast Software Encryption-Cambridge 1996, vol. 1039, D. Gollmann ed.. Springer-Verlag.","DOI":"10.1007\/3-540-60865-6_41"},{"key":"5_CR9","unstructured":"Simeon V. Maltchev and Peter T. Antonov. \u201cThe SCOP Stream Cipher\u201d, ftp:\/\/ftp.funet.fi\/pub\/crypt\/cryptography\/symmetric\/scop\/scop.tar.gz , Dec. 1997."}],"container-title":["IFIP Advances in Information and Communication Technology","Advances in Network and Distributed Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-306-46958-8_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,16]],"date-time":"2019-04-16T20:47:00Z","timestamp":1555447620000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-306-46958-8_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9780792375586","9780306469589"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/0-306-46958-8_5","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2002]]}}}