{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,4]],"date-time":"2025-04-04T07:26:09Z","timestamp":1743751569016},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540265412"},{"type":"electronic","value":"9783540316695"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11502760_6","type":"book-chapter","created":{"date-parts":[[2010,7,14]],"date-time":"2010-07-14T21:36:47Z","timestamp":1279143407000},"page":"83-97","source":"Crossref","is-referenced-by-count":38,"title":["F-FCSR: Design of a New Class of Stream Ciphers"],"prefix":"10.1007","author":[{"given":"Fran\u00e7ois","family":"Arnault","sequence":"first","affiliation":[]},{"given":"Thierry P.","family":"Berger","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1007\/3-540-36231-2_3","volume-title":"Progress in Cryptology - INDOCRYPT 2002","author":"F. Arnault","year":"2002","unstructured":"Arnault, F., Berger, T., Necer, A.: A new class of stream ciphers combining LFSR and FCSR architectures. In: Menezes, A., Sarkar, P. (eds.) INDOCRYPT 2002. LNCS, vol.\u00a02551, pp. 22\u201333. Springer, Heidelberg (2002)"},{"issue":"5","key":"6_CR2","doi-asserted-by":"publisher","first-page":"910","DOI":"10.1109\/TIT.2004.826651","volume":"50","author":"F. Arnault","year":"2004","unstructured":"Arnault, F., Berger, T.P., Necer, A.: Feedback with Carry Shift Registers synthesis with the Euclidean Algorithm. IEEE Trans. Inform. Theory\u00a050(5), 910\u2013917 (2004)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"6_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44448-3_1","volume-title":"Advances in Cryptology - ASIACRYPT 2000","author":"A. Biryukov","year":"2000","unstructured":"Biryukov, A., Shamir, A.: Cryptanalytic time\/Memory\/Data tradeoffs for stream ciphers. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol.\u00a01976, pp. 1\u201313. Springer, Heidelberg (2000)"},{"key":"6_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1007\/3-540-48329-2_3","volume-title":"Advances in Cryptology - CRYPTO \u201993","author":"D. Coppersmith","year":"1994","unstructured":"Coppersmith, D., Krawczyk, H., Mansour, Y.: The shrinking generator. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol.\u00a0773, pp. 22\u201339. Springer, Heidelberg (1994)"},{"key":"6_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1007\/3-540-39200-9_21","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"N. Courtois","year":"2003","unstructured":"Courtois, N., Meier, W.: Algebraic attack on stream ciphers with linear feedback. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656, pp. 345\u2013359. Springer, Heidelberg (2003)"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Faug\u00e8re, J.C.: A new efficient algorithm for computing Gr\u00f6bner bases without reduction to zero (F 5). In: Proceedings of International Symposium on Symbolic and Algebraic Computation, ISSAC 2002, Villeneuve d\u2019Ascq, pp. 75\u201383.","DOI":"10.1145\/780506.780516"},{"key":"6_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"174","DOI":"10.1007\/3-540-58108-1_21","volume-title":"Fast Software Encryption","author":"A. Klapper","year":"1994","unstructured":"Klapper, A., Goresky, M.: 2-adic shift registers, fast software encryption. In: Anderson, R. (ed.) FSE 1993. LNCS, vol.\u00a0809, pp. 174\u2013178. Springer, Heidelberg (1994)"},{"key":"6_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"262","DOI":"10.1007\/3-540-44750-4_21","volume-title":"Advances in Cryptology - CRYPTO \u201995","author":"A. Klapper","year":"1995","unstructured":"Klapper, A., Goresky, M.: Cryptanalysis based on 2-adic rational approximation. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol.\u00a0963, pp. 262\u2013273. Springer, Heidelberg (1995)"},{"key":"6_CR9","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/s001459900024","volume":"10","author":"A. Klapper","year":"1997","unstructured":"Klapper, A., Goresky, M.: Feedback shift registers, 2-adic span, and combiners with memory. Journal of Cryptology\u00a010, 11\u2013147 (1997)","journal-title":"Journal of Cryptology"},{"key":"6_CR10","doi-asserted-by":"publisher","first-page":"2826","DOI":"10.1109\/TIT.2002.804048","volume":"48","author":"A. Klapper","year":"2002","unstructured":"Klapper, A., Goresky, M.: Fibonacci and Galois representation of feedback with carry shift registers. IEEE Trans. Inform. Theory\u00a048, 2826\u20132836 (2002)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"6_CR11","volume-title":"p-adic Numbers, p-adic analysis and Zeta-Functions","author":"N. Koblitz","year":"1997","unstructured":"Koblitz, N.: p-adic Numbers, p-adic analysis and Zeta-Functions. Springer, Heidelberg (1997)"},{"key":"6_CR12","doi-asserted-by":"publisher","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Cryptography","author":"A.J. Menezes","year":"1996","unstructured":"Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)"},{"key":"6_CR13","unstructured":"A Statistical Test Suite for the Validation of Random Number Generators and Pseudo Random Number Generators for Cryptographic Applications, http:\/\/csrc.nist.gov\/rng\/"},{"key":"6_CR14","series-title":"Lecture Notes in Computer Science","first-page":"288","volume-title":"Smart Card. Research and Applications","author":"J. Daemen","year":"2000","unstructured":"Daemen, J., Rijmen, V.: The Block Cipher Rijndael. In: Schneier, B., Quisquater, J.-J. (eds.) CARDIS 1998. LNCS, vol.\u00a01820, pp. 288\u2013296. Springer, Heidelberg (2000)"},{"key":"6_CR15","unstructured":"http:\/\/csrc.nist.gov\/CryptoToolkit\/aes\/"},{"key":"6_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"260","DOI":"10.1007\/3-540-39799-X_20","volume-title":"Advances in Cryptology","author":"R.A. Rueppel","year":"1986","unstructured":"Rueppel, R.A.: Correlation immunity and the summation generator. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol.\u00a0218, pp. 260\u2013272. Springer, Heidelberg (1986)"},{"key":"6_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/3-540-39805-8_21","volume-title":"Advances in Cryptology - EUROCRYPT \u201985","author":"R.A. Rueppel","year":"1986","unstructured":"Rueppel, R.A.: Linear complexity and random sequences. In: Pichler, F. (ed.) EUROCRYPT 1985. LNCS, vol.\u00a0219, pp. 167\u2013188. Springer, Heidelberg (1986)"}],"container-title":["Lecture Notes in Computer Science","Fast Software Encryption"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11502760_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:02:27Z","timestamp":1605643347000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11502760_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540265412","9783540316695"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/11502760_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}