{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T18:50:27Z","timestamp":1725475827410},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540677420"},{"type":"electronic","value":"9783540450306"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/10718964_18","type":"book-chapter","created":{"date-parts":[[2006,12,29]],"date-time":"2006-12-29T16:04:09Z","timestamp":1167408249000},"page":"220-233","source":"Crossref","is-referenced-by-count":13,"title":["Iterative Probabilistic Cryptanalysis of RC4 Keystream Generator"],"prefix":"10.1007","author":[{"given":"Jovan D.","family":"Goli\u0107","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"18_CR1","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1109\/TIT.1974.1055186","volume":"IT-20","author":"L.R. Bahl","year":"1974","unstructured":"Bahl, L.R., Cocke, J., Jelinek, F., Raviv, J.: Optimal decoding of linear codes for minimizing symbol error rate. IEEE Trans. Inform. Theory\u00a0IT-20, 284\u2013287 (1974)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"18_CR2","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/12.481485","volume":"C-45","author":"J.D. Goli\u0107","year":"1996","unstructured":"Goli\u0107, J.D.: Linear models for keystream generators. IEEE Trans. Computers\u00a0C-45, 41\u201349 (1996)","journal-title":"IEEE Trans. Computers"},{"key":"18_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1007\/3-540-69053-0_16","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"J.D.. Goli\u0107","year":"1997","unstructured":"Goli\u0107, J.D.: Linear statistical weakness of alleged RC4 keystream generator. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.\u00a01233, pp. 226\u2013238. Springer, Heidelberg (1997)"},{"key":"18_CR4","first-page":"183","volume":"64\/78","author":"J.D. Goli\u0107","year":"1998","unstructured":"Goli\u0107, J.D.: Recent advances in stream cipher cryptanalysis. Publications de l\u2019Institut Mathematique\u00a064\/78, 183\u2013204 (1998)","journal-title":"Publications de l\u2019Institut Mathematique"},{"key":"18_CR5","doi-asserted-by":"crossref","first-page":"2374","DOI":"10.1109\/18.796378","volume":"IT-45","author":"J.D. Goli\u0107","year":"1999","unstructured":"Goli\u0107, J.D.: Linear models for a time-variant permutation generator. IEEE Trans. Inform. Theory\u00a0IT-45, 2374\u20132382 (1999)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"18_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/3-540-49649-1_26","volume-title":"Advances in Cryptology - ASIACRYPT\u201998","author":"L. Knudsen","year":"1998","unstructured":"Knudsen, L., Meier, W., Preneel, B., Rijmen, V., Verdoolaege, S.: Analysis me- thods for (alleged) RC4. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol.\u00a01514, pp. 327\u2013341. Springer, Heidelberg (1998)"},{"key":"18_CR7","volume-title":"Handbook of Applied Cryptography","author":"A. Menezes","year":"1997","unstructured":"Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)"},{"key":"18_CR8","unstructured":"Rivest, R.L.: The RC4 encryption algorithm. RSA Data Security, Inc. (March 1992)"},{"key":"18_CR9","volume-title":"Applied Cryptography","author":"B. Schneier","year":"1996","unstructured":"Schneier, B.: Applied Cryptography. Wiley, Chichester (1996)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/10718964_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,25]],"date-time":"2019-01-25T14:22:00Z","timestamp":1548426120000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/10718964_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540677420","9783540450306"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/10718964_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2000]]}}}