{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,23]],"date-time":"2025-05-23T04:46:07Z","timestamp":1747975567472},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540306849"},{"type":"electronic","value":"9783540322672"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11593447_17","type":"book-chapter","created":{"date-parts":[[2005,11,15]],"date-time":"2005-11-15T06:37:16Z","timestamp":1132036636000},"page":"313-332","source":"Crossref","is-referenced-by-count":19,"title":["Fast Computation of Large Distributions and Its Cryptographic Applications"],"prefix":"10.1007","author":[{"given":"Alexander","family":"Maximov","sequence":"first","affiliation":[]},{"given":"Thomas","family":"Johansson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/3-540-45661-9_15","volume-title":"Fast Software Encryption","author":"S. Halevi","year":"2002","unstructured":"Halevi, S., Coppersmith, D., Jutla, C.S.: Scream: A software-efficient stream cipher. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol.\u00a02365, pp. 195\u2013209. Springer, Heidelberg (2002)"},{"key":"17_CR2","unstructured":"Ekdahl, P., Johansson, T.: SNOW - a new stream cipher. In: Proceedings of First Open NESSIE Workshop (2000)"},{"key":"17_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-36492-7_5","volume-title":"Selected Areas in Cryptography","author":"P. Ekdahl","year":"2003","unstructured":"Ekdahl, P., Johansson, T.: A new version of the stream cipher SNOW. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol.\u00a02595, pp. 47\u201361. Springer, Heidelberg (2003)"},{"key":"17_CR4","unstructured":"Hawkes, P., Rose, G.G.: Primitive specification and supporting documentation for SOBER-t16 submission to NESSIE. In: Proceedings of First Open NESSIE Workshop (2000); (Accessed August 18, 2005), Available at http:\/\/www.cryptonessie.org"},{"key":"17_CR5","unstructured":"Hawkes, P., Rose, G.G.: Primitive specification and supporting documentation for SOBER-t32 submission to NESSIE. In: Proceedings of First Open NESSIE Workshop (2000);(Accessed August 18, 2005), Available at http:\/\/www.cryptonessie.org"},{"key":"17_CR6","unstructured":"Smart, N.: Cryptography: An Introduction (2003)"},{"key":"17_CR7","unstructured":"Briceno, M., Goldberg, I., Wagner, D.: A pedagogical implementation of A5\/1 (1999); (Accessed August 18, 2005), Available at http:\/\/jya.com\/a51-pi.htm"},{"key":"17_CR8","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1109\/ISIT.2003.1228178","volume-title":"Information Symposium in Information Theory\u2014ISIT 2003","author":"T. Johansson","year":"2003","unstructured":"Johansson, T., Maximov, A.: A Linear Distinguishing Attack on Scream. In: Information Symposium in Information Theory\u2014ISIT 2003, p. 164. IEEE, Los Alamitos (2003)"},{"key":"17_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1007\/3-540-45661-9_16","volume-title":"Fast Software Encryption","author":"P. Ekdahl","year":"2002","unstructured":"Ekdahl, P., Johansson, T.: Distinguishing attacks on SOBER-t16 and SOBER-t32. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol.\u00a02365, pp. 210\u2013224. Springer, Heidelberg (2002)"},{"issue":"1","key":"17_CR10","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/s10623-003-6148-x","volume":"35","author":"J.D.. Goli\u0107","year":"2005","unstructured":"Goli\u0107, J.D., Hawkes, P.: Vectorial approach to fast correlation attacks. Designs, Codes, and Cryptography\u00a035(1), 5\u201319 (2005)","journal-title":"Designs, Codes, and Cryptography"},{"key":"17_CR11","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1007\/3-540-45473-X_28","volume-title":"Fast Software Encryption 2001","author":"H. Lipmaa","year":"2002","unstructured":"Lipmaa, H., Moriai, S.: Efficient algorithms for computing differential properties of addition. In: Fast Software Encryption 2001, pp. 336\u2013350. Springer, Heidelberg (2002)"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Lipmaa, H., Wall\u00e9n, J., Dumas, P.: On the additive differential probability of exclusive-or. In: Fast Software Encryption 2004, pp. 317\u2013331 (2004)","DOI":"10.1007\/978-3-540-25937-4_20"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Maximov, A.: On linear approximation of modulo sum. In: Fast Software Encryption 2004, pp. 483\u2013484 (2004)","DOI":"10.1007\/978-3-540-25937-4_31"},{"key":"17_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/3-540-36231-2_5","volume-title":"Progress in Cryptology - INDOCRYPT 2002","author":"H. Lipmaa","year":"2002","unstructured":"Lipmaa, H.: On differential properties of pseudo-hadamard transform and related mappings. In: Menezes, A., Sarkar, P. (eds.) INDOCRYPT 2002. LNCS, vol.\u00a02551, pp. 48\u201361. Springer, Heidelberg (2002)"},{"key":"17_CR15","unstructured":"Golic, J.D., Morgari, G.: Vectorial fast correlation attacks. Cryptology ePrint Archive, Report 2004\/247 (2004)"},{"key":"17_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"470","DOI":"10.1007\/3-540-36400-5_34","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"A. Klimov","year":"2003","unstructured":"Klimov, A., Shamir, A.: A new class of invertible mappings. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 470\u2013483. Springer, Heidelberg (2003)"},{"key":"17_CR17","volume-title":"Introduction to Algorithms","author":"T. Cormen","year":"2001","unstructured":"Cormen, T., Leiserson, C., Rivest, R., Stein, C.: Introduction to Algorithms. MIT Press, Cambridge (2001)"},{"key":"17_CR18","first-page":"222","volume-title":"Selected Areas in Cryptography\u2014SAC 2003","author":"D. Watanabe","year":"2003","unstructured":"Watanabe, D., Biryukov, A., De Canniere, C.: A distinguishing attack of SNOW 2.0 with linear masking method. In: Selected Areas in Cryptography\u2014SAC 2003, pp. 222\u2013233. Springer, Heidelberg (2003)"},{"key":"17_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1007\/3-540-45708-9_33","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"D. Coppersmith","year":"2002","unstructured":"Coppersmith, D., Halevi, S., Jutla, C.S.: Cryptanalysis of stream ciphers with linear masking. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.\u00a02442, pp. 515\u2013532. Springer, Heidelberg (2002)"},{"issue":"1","key":"17_CR20","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/12.481485","volume":"45","author":"J.D. Goli\u0107","year":"1996","unstructured":"Goli\u0107, J.D.: Linear models for keystream generators. IEEE Transactions on Computers\u00a045(1), 41\u201349 (1996)","journal-title":"IEEE Transactions on Computers"},{"key":"17_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/3-540-39200-9_2","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"P. Junod","year":"2003","unstructured":"Junod, P.: On the optimality of linear, differential and sequential distinguishers. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656, pp. 17\u201332. Springer, Heidelberg (2003)"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology - ASIACRYPT 2005"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11593447_17.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:51:44Z","timestamp":1619506304000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11593447_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540306849","9783540322672"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/11593447_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}