{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T21:25:11Z","timestamp":1757453111406},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540265412"},{"type":"electronic","value":"9783540316695"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11502760_8","type":"book-chapter","created":{"date-parts":[[2010,7,14]],"date-time":"2010-07-14T17:36:47Z","timestamp":1279129007000},"page":"112-125","source":"Crossref","is-referenced-by-count":6,"title":["The ANF of the Composition of Addition and Multiplication mod 2 n with a Boolean Function"],"prefix":"10.1007","author":[{"given":"An","family":"Braeken","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Igor","family":"Semaev","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"8_CR1","unstructured":"Armknecht, F.: A Linearization Attack on the Bluetooth Key Stream Generator, Cryptology ePrint Archive, Report 2002\/191 (2002), \n                    \n                      http:\/\/eprint.iacr.org\/2002\/191"},{"key":"8_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1007\/978-3-540-45146-4_10","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"F. Armknecht","year":"2003","unstructured":"Armknecht, F., Krause, M.: Algebraic attacks on combiners with memory. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 162\u2013175. Springer, Heidelberg (2003)"},{"key":"8_CR3","unstructured":"Bluetooth SIG, Specification of the Bluetooth System, Version 1.1, 1 Feburary 22 (2001), available at \n                    \n                      http:\/\/www.bluetooth.com"},{"key":"8_CR4","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/BF00129836","volume":"4","author":"D.H. Bailey","year":"1990","unstructured":"Bailey, D.H., Lee, K., Simon, H.D.: Using Strassen\u2019s Algorithm to Accelerate the Solution of Linear Systems. J. of Supercomputing\u00a04, 357\u2013371 (1990)","journal-title":"J. of Supercomputing"},{"key":"8_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1007\/3-540-36552-4_13","volume-title":"Information Security and Cryptology - ICISC 2002","author":"N. Courtois","year":"2003","unstructured":"Courtois, N.: Higher order correlation attacks,XL algorithm and cryptanalysis of toyocrypt. In: Lee, P.J., Lim, C.H. (eds.) ICISC 2002. LNCS, vol.\u00a02587, pp. 182\u2013199. Springer, Heidelberg (2003)"},{"key":"8_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39200-9_21","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"N. Courtois","year":"2003","unstructured":"Courtois, N., Meier, W.: Algebraic Attacks on Stream Ciphers with Linear Feedback. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656. Springer, Heidelberg (2003)"},{"key":"8_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1007\/3-540-45539-6_27","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"N. Courtois","year":"2000","unstructured":"Courtois, N., Klimov, A., Patarin, J., Shamir, A.: Efficient algorithms for solving overdefined systems of multivariate polynomial equations. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 392\u2013407. Springer, Heidelberg (2000)"},{"key":"8_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/978-3-540-45146-4_11","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"N. Courtois","year":"2003","unstructured":"Courtois, N.: Fast algebraic attacks on stream ciphers with linear feedback. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 176\u2013194. Springer, Heidelberg (2003)"},{"key":"8_CR9","unstructured":"Courtois, N.: Algebraic Attacks on Combiners with memory and Several Outputs, eprint archive, 2003\/125"},{"key":"8_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/3-540-36178-2_17","volume-title":"Advances in Cryptology - ASIACRYPT 2002","author":"N. Courtois","year":"2002","unstructured":"Courtois, N., Pieprzyk, J.: Cryptanalysis of block ciphers with overdefined systems of equations. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol.\u00a02501, pp. 267\u2013287. Springer, Heidelberg (2002)"},{"key":"8_CR11","series-title":"Lecture Notes in Computer Science","first-page":"44","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"A. Joux","year":"2003","unstructured":"Joux, A., Faug\u00e9re, J.-C.: Algebraic cryptanalysis of hidden field equation (HFE) cryptosystems using gr\u00f6bner bases. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 44\u201360. Springer, Heidelberg (2003)"},{"key":"8_CR12","volume-title":"Stream Ciphers and Number Theory","author":"T.W. Cusick","year":"1998","unstructured":"Cusick, T.W., Ding, C., Renvall, A.: Stream Ciphers and Number Theory. Elsevier, Amsterdam (1998)"},{"key":"8_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1007\/3-540-58108-1_13","volume-title":"Fast Software Encryption","author":"C. Ding","year":"1994","unstructured":"Ding, C.: The Differential Cryptanalysis and Design of the Natural Stream Ciphers. In: Anderson, R. (ed.) FSE 1993. LNCS, vol.\u00a0809, pp. 101\u2013115. Springer, Heidelberg (1994)"},{"key":"8_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1007\/978-3-540-39887-5_24","volume-title":"Fast Software Encryption","author":"N. Ferguson","year":"2003","unstructured":"Ferguson, N., Whiting, D., Schneier, B., Kelsey, J., Lucks, S., Kohno, T.: Helix: Fast encryption and authentication in a single cryptographic primitive. In: Johansson, T. (ed.) FSE 2003. LNCS, vol.\u00a02887, pp. 345\u2013362. Springer, Heidelberg (2003)"},{"key":"8_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-25937-4_1","volume-title":"Fast Software Encryption","author":"A. Klimov","year":"2004","unstructured":"Klimov, A., Shamir, A.: New cryptographic primitives based on multiword T-functions. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol.\u00a03017, pp. 1\u201315. Springer, Heidelberg (2004)"},{"key":"8_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"262","DOI":"10.1007\/3-540-44750-4_21","volume-title":"Advances in Cryptology - CRYPTO \u201995","author":"A. Klapper","year":"1995","unstructured":"Klapper, A., Goresky, M.: Cryptanalysis based on 2-adic rational approximation. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol.\u00a0963, pp. 262\u2013273. Springer, Heidelberg (1995)"},{"key":"8_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/978-3-540-25937-4_3","volume-title":"Fast Software Encryption","author":"D.H. Lee","year":"2004","unstructured":"Lee, D.H., Kim, J., Hong, J., Han, J.W., Moon, D.: Algebraic attacks on summation generators. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol.\u00a03017, pp. 34\u201348. Springer, Heidelberg (2004)"},{"key":"8_CR18","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/S0165-1684(99)00123-1","volume":"80","author":"H. Lee","year":"2000","unstructured":"Lee, H., Moon, S.: On an Improved Summation Generator with 2-bit Memory. Signal Processing\u00a080, 211\u2013217 (2000)","journal-title":"Signal Processing"},{"key":"8_CR19","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1016\/S0165-1684(01)00180-3","volume":"82","author":"H. Lee","year":"2002","unstructured":"Lee, H., Moon, S.: Parallel Stream Cipher for Secure High-Speed Communications. Signal Processing\u00a082, 259\u2013265 (2002)","journal-title":"Signal Processing"},{"key":"8_CR20","first-page":"1","volume-title":"Fast Software Encryption, Cambridge Security Workshop Proceedings","author":"J.L. Massey","year":"1994","unstructured":"Massey, J.L.: SAFER K-64: A Byte-Oriented Block-Ciphering Algorithm. In: Fast Software Encryption, Cambridge Security Workshop Proceedings, pp. 1\u201317. Springer, Heidelberg (1994)"},{"key":"8_CR21","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/BF00191322","volume":"5","author":"W. Meier","year":"1992","unstructured":"Meier, W., Staffelbach, O.: Correlation Properties of Combiners with Memory in Stream Cipher. Journal of Cryptology\u00a05, 67\u201386 (1992)","journal-title":"Journal of Cryptology"},{"key":"8_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1007\/3-540-46877-3_35","volume-title":"Advances in Cryptology - EUROCRYPT \u201990","author":"X. Lai","year":"1991","unstructured":"Lai, X., Massey, J.L.: A proposal for a new block encryption standard. In: Damg\u00e5rd, I.B. (ed.) EUROCRYPT 1990. LNCS, vol.\u00a0473, pp. 389\u2013404. Springer, Heidelberg (1991)"},{"key":"8_CR23","volume-title":"Analytic Number Theory","author":"D.J. Newman","year":"1998","unstructured":"Newman, D.J.: Analytic Number Theory. Springer, New York (1998)"},{"key":"8_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1007\/978-3-540-39887-5_22","volume-title":"Fast Software Encryption","author":"G. Rose","year":"2003","unstructured":"Rose, G., Hawkes, P.: Turing: A fast stream cipher. In: Johansson, T. (ed.) FSE 2003. LNCS, vol.\u00a02887, pp. 307\u2013324. Springer, Heidelberg (2003)"},{"key":"8_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"260","DOI":"10.1007\/3-540-39799-X_20","volume-title":"Advances in Cryptology","author":"R.A. Rueppel","year":"1986","unstructured":"Rueppel, R.A.: Correlation immunity and the summation generator. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol.\u00a0218, pp. 260\u2013272. Springer, Heidelberg (1986)"},{"key":"8_CR26","volume-title":"Applied Cryptography","author":"B. Schneier","year":"1996","unstructured":"Schneier, B.: Applied Cryptography. Wiley, New York (1996)"}],"container-title":["Lecture Notes in Computer Science","Fast Software Encryption"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11502760_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T02:42:43Z","timestamp":1619491363000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11502760_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540265412","9783540316695"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/11502760_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}