{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T02:43:07Z","timestamp":1747104187627},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540290025"},{"type":"electronic","value":"9783540318293"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11556985_46","type":"book-chapter","created":{"date-parts":[[2005,10,18]],"date-time":"2005-10-18T16:03:41Z","timestamp":1129651421000},"page":"355-364","source":"Crossref","is-referenced-by-count":4,"title":["Improvement of the Edit Distance Attack to Clock-Controlled LFSR-Based Stream Ciphers"],"prefix":"10.1007","author":[{"given":"Pino","family":"Caballero-Gil","sequence":"first","affiliation":[]},{"given":"Amparo","family":"F\u00faster-Sabater","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"15","key":"46_CR1","doi-asserted-by":"publisher","first-page":"1322","DOI":"10.1049\/el:19930886","volume":"29","author":"R.J. Anderson","year":"1993","unstructured":"Anderson, R.J.: A Faster Attack on Certain Ciphers. Electronics Letters\u00a029(15), 1322\u20131323 (1993)","journal-title":"Electronics Letters"},{"key":"46_CR2","unstructured":"Bluetooth, Specifications of the Bluetooth system, Version 1.1 (February 2001), available at \n                    \n                      http:\/\/www.bluetooth.com\/"},{"key":"46_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/3-540-45450-0_3","volume-title":"Information Security and Privacy","author":"A. Clark","year":"2002","unstructured":"Clark, A., et al.: The LILI-II Keystream Generator. In: Batten, L.M., Seberry, J. (eds.) ACISP 2002. LNCS, vol.\u00a02384, pp. 25\u201339. Springer, Heidelberg (2002)"},{"key":"46_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1007\/3-540-48329-2_3","volume-title":"Advances in Cryptology - CRYPTO \u201993","author":"D. Coppersmith","year":"1994","unstructured":"Coppersmith, D., Krawczyk, H., Mansour, H.: The Shrinking Generator. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol.\u00a0773, pp. 22\u201339. Springer, Heidelberg (1994)"},{"key":"46_CR5","unstructured":"CRYPTREC project- cryptographic evaluation for Japanese Electronic Government, \n                    \n                      http:\/\/www.ipa.go.jp\/security\/enc\/CRYPTREC\/index-e.html"},{"issue":"78","key":"46_CR6","first-page":"183","volume":"64","author":"J.D. Golic","year":"1998","unstructured":"Golic, J.D.: Recent Advances in Stream Cipher Cryptanalysis. Publication de l\u2019Institut Mathematique Tome\u00a064(78), 183\u2013204 (1998)","journal-title":"Publication de l\u2019Institut Mathematique Tome"},{"issue":"1","key":"46_CR7","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1023\/A:1027386519887","volume":"31","author":"J.D. Golic","year":"2004","unstructured":"Golic, J.D., Menicocci, R.: Correlation Analysis of the Alternating Step Generator. Design Codes and Cryptography\u00a031(1), 51\u201374 (2004)","journal-title":"Design Codes and Cryptography"},{"issue":"3","key":"46_CR8","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/BF00196912","volume":"3","author":"J.D. Golic","year":"1991","unstructured":"Golic, J.D., Mihaljevic, M.: A Generalized Correlation Attack on a Class of Stream Ciphers Based on the Levenshtein Distance. Journal of Cryptology\u00a03(3), 201\u2013212 (1991)","journal-title":"Journal of Cryptology"},{"key":"46_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1007\/3-540-47555-9_42","volume-title":"Advances in Cryptology - EUROCRYPT \u201992","author":"J.D. Golic","year":"1993","unstructured":"Golic, J.D., Petrovic, S.: A Generalized Correlation Attack with a Probabilistic Constrained Edit Distance. In: Rueppel, R.A. (ed.) EUROCRYPT 1992. LNCS, vol.\u00a0658, pp. 472\u2013476. Springer, Heidelberg (1993)"},{"key":"46_CR10","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1109\/49.17716","volume":"7","author":"D. Gollmann","year":"1989","unstructured":"Gollmann, D., Chambers, W.C.: Clock-Controlled Shift Registers: A Review. IEEE Transactions on Selected Areas in Communications\u00a0SAC-7, 525\u2013533 (1989)","journal-title":"IEEE Transactions on Selected Areas in Communications"},{"key":"46_CR11","volume-title":"Shift Register-Sequences","author":"S.W. Golomb","year":"1982","unstructured":"Golomb, S.W.: Shift Register-Sequences. Aegean Park Press, Laguna Hill (1982)"},{"key":"46_CR12","unstructured":"GSM, Global Systems for Mobile Communications, available at \n                    \n                      http:\/\/cryptome.org\/gsm-a512.htm"},{"key":"46_CR13","unstructured":"Jiang, S., Gong, G.: On Edit Distance Attack to Alternating Step Generator, Technical Report Corr2002-28, University of Waterloo (2002)"},{"key":"46_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1007\/3-540-49649-1_27","volume-title":"Advances in Cryptology - ASIACRYPT\u201998","author":"T. Johansson","year":"1998","unstructured":"Johansson, T.: Reduced Complexity Correlation Attacks on Two Clock-Controlled Generators. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol.\u00a01514, pp. 342\u2013356. Springer, Heidelberg (1998)"},{"key":"46_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1007\/978-3-540-30191-2_33","volume-title":"Information and Communications Security","author":"S. Petrovic","year":"2004","unstructured":"Petrovic, S., F\u00faster, A.: Clock Control Sequence Reconstruction in the Ciphertext Only Attack Scenario. In: L\u00f3pez, J., Qing, S., Okamoto, E. (eds.) ICICS 2004. LNCS, vol.\u00a03269, pp. 427\u2013439. Springer, Heidelberg (2004)"}],"container-title":["Lecture Notes in Computer Science","Computer Aided Systems Theory \u2013 EUROCAST 2005"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11556985_46.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:08:41Z","timestamp":1619507321000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11556985_46"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540290025","9783540318293"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/11556985_46","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}