{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T18:50:15Z","timestamp":1725475815972},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540677420"},{"type":"electronic","value":"9783540450306"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/10718964_19","type":"book-chapter","created":{"date-parts":[[2006,12,29]],"date-time":"2006-12-29T21:04:09Z","timestamp":1167426249000},"page":"234-241","source":"Crossref","is-referenced-by-count":4,"title":["Security Weaknesses in a Randomized Stream Cipher"],"prefix":"10.1007","author":[{"given":"Niels","family":"Ferguson","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Bruce","family":"Schneier","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"David","family":"Wagner","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"19_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/BFb0052339","volume-title":"Fast Software Encryption","author":"R. Anderson","year":"1997","unstructured":"Anderson, R., Manifavas, C.: Chameleon \u2013 A New Kind of Stream Cipher. In: Biham, E. (ed.) FSE 1997. LNCS, vol.\u00a01267, pp. 107\u2013113. Springer, Heidelberg (1997)"},{"key":"19_CR2","first-page":"1","volume-title":"SODA 1995","author":"W. Aiello","year":"1995","unstructured":"Aiello, W., Venkatesan, S., Venkatesan, R.: Design of practical and pro- vably good random number generators. In: SODA 1995, pp. 1\u20139. ACM, New York (1995)"},{"key":"19_CR3","unstructured":"Beckman, D.: TriStrata: A Giant Step In Enterprise Security. Network Computing, September 15 (1998)"},{"key":"19_CR4","unstructured":"Kahn, D.: The Codebreakers (1968)"},{"key":"19_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1007\/3-540-46877-3_33","volume-title":"Advances in Cryptology - EUROCRYPT \u201990","author":"U.M. Maurer","year":"1991","unstructured":"Maurer, U.M.: A Provably-Secure Strongly-Randomized Cipher. In: Damg\u00e5rd, I.B. (ed.) EUROCRYPT 1990. LNCS, vol.\u00a0473, pp. 361\u2013373. Springer, Heidelberg (1991)"},{"key":"19_CR6","volume-title":"Elementary Cryptanalysis, A Mathematical Approach","author":"A. Sinkov","year":"1968","unstructured":"Sinkov, A.: Elementary Cryptanalysis, A Mathematical Approach. Random House, New York (1968)"},{"key":"19_CR7","unstructured":"TriStrata webpage, \n                    \n                      http:\/\/www.tristrata.com"},{"key":"19_CR8","unstructured":"Tuckerman, B.: A study of the Vigenere-Vernam single and multiple loop enciphering systems, IBM Research Report RC2879, May 14, Yorktown Heights NY (1970)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/10718964_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,18]],"date-time":"2019-03-18T03:19:38Z","timestamp":1552879178000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/10718964_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540677420","9783540450306"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/10718964_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2000]]}}}