{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T16:01:50Z","timestamp":1725552110335},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540306849"},{"type":"electronic","value":"9783540322672"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11593447_20","type":"book-chapter","created":{"date-parts":[[2005,11,15]],"date-time":"2005-11-15T06:37:16Z","timestamp":1132036636000},"page":"373-394","source":"Crossref","is-referenced-by-count":7,"title":["Linear Cryptanalysis of the TSC Family of Stream Ciphers"],"prefix":"10.1007","author":[{"given":"Fr\u00e9d\u00e9ric","family":"Muller","sequence":"first","affiliation":[]},{"given":"Thomas","family":"Peyrin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1007\/978-3-540-45146-4_10","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"F. Armknecht","year":"2003","unstructured":"Armknecht, F., Krause, M.: Algebraic Attacks on Combiners with Memory. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 162\u2013175. Springer, Heidelberg (2003)"},{"key":"20_CR2","unstructured":"Babbage, S.: Stream Ciphers: What Does the Industry Want? In: State of the Art of Stream Ciphers workshop, SASC 2004 (2004)"},{"key":"20_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44448-3_1","volume-title":"Advances in Cryptology - ASIACRYPT 2000","author":"A. Biryukov","year":"2000","unstructured":"Biryukov, A., Shamir, A.: Cryptanalytic time\/memory\/data tradeoffs for stream ciphers. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol.\u00a01976, pp. 1\u201313. Springer, Heidelberg (2000)"},{"key":"20_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1007\/3-540-39200-9_21","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"N. Courtois","year":"2003","unstructured":"Courtois, N., Meier, W.: Algebraic Attacks on Stream Ciphers with Linear Feedback. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656, pp. 345\u2013359. Springer, Heidelberg (2003)"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Ding, C., Xiao, G., Shan, W.: The Stability Theory of Stream Ciphers. LNCS, vol.\u00a0561. Springer, Heidelberg (1991); see Section 3.3","DOI":"10.1007\/3-540-54973-0"},{"key":"20_CR6","unstructured":"ECRYPT Network of Excellence in Cryptology, http:\/\/www.ecrypt.eu.org\/index.html"},{"key":"20_CR7","unstructured":"ECRYPT Stream Cipher Project. See, http:\/\/www.ecrypt.eu.org\/stream\/"},{"key":"20_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1007\/3-540-60590-8_13","volume-title":"Fast Software Encryption","author":"J. Goli\u0107","year":"1995","unstructured":"Goli\u0107, J.: Linear Cryptanalysis of Stream Ciphers. In: Preneel, B. (ed.) FSE 1994. LNCS, vol.\u00a01008, pp. 154\u2013169. Springer, Heidelberg (1995)"},{"key":"20_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1007\/3-540-69053-0_16","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"J. Goli\u0107","year":"1997","unstructured":"Goli\u0107, J.: Linear Statistical Weakness of Alleged RC4 Keystream Generator. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.\u00a01233, pp. 226\u2013238. Springer, Heidelberg (1997)"},{"key":"20_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1007\/11502760_5","volume-title":"Fast Software Encryption","author":"J. Hong","year":"2005","unstructured":"Hong, J., Lee, D., Yeom, Y., Han, D.: A New Class of Single Cycle T-functions. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol.\u00a03557, pp. 68\u201382. Springer, Heidelberg (2005)"},{"key":"20_CR11","unstructured":"Hong, J., Lee, D., Yeom, Y., Han, D., Chee, S.: T-function Based Stream Cipher TSC-3. ECRYPT Stream Cipher Project Report 2005\/031 (2005), http:\/\/www.ecrypt.eu.org\/stream"},{"key":"20_CR12","unstructured":"Klimov, A.: Applications of T-functions in Cryptography. PhD thesis, Weizmann Institute of Science (2004), http:\/\/www.wisdom.weizmann.ac.il\/~ask\/"},{"key":"20_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"470","DOI":"10.1007\/3-540-36400-5_34","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"A. Klimov","year":"2003","unstructured":"Klimov, A., Shamir, A.: A New Class of Invertible Mappings. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 470\u2013483. Springer, Heidelberg (2003)"},{"key":"20_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1007\/978-3-540-24654-1_18","volume-title":"Selected Areas in Cryptography","author":"A. Klimov","year":"2004","unstructured":"Klimov, A., Shamir, A.: Cryptographic Applications of T-functions. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol.\u00a03006, pp. 248\u2013261. Springer, Heidelberg (2004)"},{"key":"20_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-25937-4_1","volume-title":"Fast Software Encryption","author":"A. Klimov","year":"2004","unstructured":"Klimov, A., Shamir, A.: New Cryptographic Primitives Based on Multiword T-Functions. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol.\u00a03017, pp. 1\u201315. Springer, Heidelberg (2004)"},{"key":"20_CR16","unstructured":"Klimov, A., Shamir, A.: The TFi Family of Stream Ciphers. In: Handout given at the SASC 2004 workshop (2004)"},{"key":"20_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/11502760_2","volume-title":"Fast Software Encryption","author":"A. Klimov","year":"2005","unstructured":"Klimov, A., Shamir, A.: New Applications of T-functions in Block Ciphers and Hash Functions. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol.\u00a03557, pp. 18\u201331. Springer, Heidelberg (2005)"},{"key":"20_CR18","unstructured":"K\u00fcnzli, S., Junod, P., Meier, W.: Attacks Against TSC. In: Rump Session at Fast Software Encryption, FSE 2005 (2005)"},{"key":"20_CR19","doi-asserted-by":"crossref","unstructured":"K\u00fcnzli, S., Junod, P., Meier, W.: Distinguishing Attacks on T-Functions. In: Dawson, E., Vaudenay, S. (eds.) Mycrypt 2005. LNCS, vol.\u00a03715, pp. 2\u201315. Springer, Heidelberg (2005) (to appear)","DOI":"10.1007\/11554868_2"},{"key":"20_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"M. Matsui","year":"1994","unstructured":"Matsui, M.: Linear Cryptanalysis Method for DES Cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 386\u2013397. Springer, Heidelberg (1994)"},{"key":"20_CR21","doi-asserted-by":"crossref","unstructured":"Meier, W., Staffelbach, O.: Fast Correlations Attacks on Certain Stream Ciphers. Journal of Cryptology, 159\u2013176 (1989)","DOI":"10.1007\/BF02252874"},{"key":"20_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"468","DOI":"10.1007\/978-3-540-30539-2_33","volume-title":"Advances in Cryptology - ASIACRYPT 2004","author":"J. Mitra","year":"2004","unstructured":"Mitra, J., Sarkar, P.: Time-Memory Trade-Off Attacks on Multiplications and T-functions. In: Lee, P. (ed.) ASIACRYPT 2004. LNCS, vol.\u00a03329, pp. 468\u2013482. Springer, Heidelberg (2004)"},{"key":"20_CR23","doi-asserted-by":"crossref","unstructured":"Muller, F., Peyrin, T.: Linear Cryptanalysis of TSC Stream Ciphers - Applications to the ECRYPT proposal TSC-3. ECRYPT Stream Cipher Project Report 2005\/042 (2005), http:\/\/www.ecrypt.eu.org\/stream","DOI":"10.1007\/11593447_20"},{"key":"20_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1007\/978-3-540-30539-2_6","volume-title":"Advances in Cryptology - ASIACRYPT 2004","author":"A. Shamir","year":"2004","unstructured":"Shamir, A.: Stream Ciphers: Dead or Alive? In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol.\u00a03329, pp. 78\u201378. Springer, Heidelberg (2004)"},{"key":"20_CR25","doi-asserted-by":"publisher","first-page":"776","DOI":"10.1109\/TIT.1984.1056949","volume":"30","author":"T. Siegenthaler","year":"1984","unstructured":"Siegenthaler, T.: Correlation-immunity of Nonlinear Combining Functions for Cryptographic Applications. IEEE Transactions on Information Theory\u00a030, 776\u2013780 (1984)","journal-title":"IEEE Transactions on Information Theory"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology - ASIACRYPT 2005"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11593447_20.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:02:41Z","timestamp":1605643361000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11593447_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540306849","9783540322672"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/11593447_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}