{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T16:01:53Z","timestamp":1725552113205},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540306849"},{"type":"electronic","value":"9783540322672"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11593447_22","type":"book-chapter","created":{"date-parts":[[2005,11,15]],"date-time":"2005-11-15T06:37:16Z","timestamp":1132036636000},"page":"412-424","source":"Crossref","is-referenced-by-count":2,"title":["A Near-Practical Attack Against B Mode of HBB"],"prefix":"10.1007","author":[{"given":"Joydip","family":"Mitra","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/978-3-540-24582-7_3","volume-title":"Progress in Cryptology - INDOCRYPT 2003","author":"P. Sarkar","year":"2003","unstructured":"Sarkar, P.: Hiji-Bij-Bij: A New Stream Cipher with a Self-Synchronizing Mode of Operation. In: Johansson, T., Maitra, S. (eds.) INDOCRYPT 2003. LNCS, vol.\u00a02904, pp. 36\u201351. Springer, Heidelberg (2003)"},{"key":"22_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1007\/11502760_22","volume-title":"Fast Software Encryption","author":"A. Joux","year":"2005","unstructured":"Joux, A., Muller, F.: Two Attacks against the HBB Stream Cipher. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol.\u00a03557, pp. 341\u2013353. Springer, Heidelberg (2005)"},{"key":"22_CR3","unstructured":"Klima, V.: Cryptanalysis of Hiji-bij-bij (HBB). In: Cryptology ePrint Archive: Report 2005\/003"},{"key":"22_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-36492-7_5","volume-title":"Selected Areas in Cryptography","author":"P. Ekdahl","year":"2003","unstructured":"Ekdahl, P., Johansson, T.: A new version of the stream cipher SNOW. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol.\u00a02595, pp. 47\u201361. Springer, Heidelberg (2003)"},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Rose, G., Hawkes, P.: Turing: a fast software stream cipher. In: Rump session of Crypto (2002), http:\/\/people.qualcomm.com\/ggr\/QC\/Turing.tgz","DOI":"10.1007\/978-3-540-39887-5_22"},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"Billet, O., Gilbert, H.: Resistance of SNOW 2.0 Against Algebraic Attacks. In: CTRSA 2005, pp. 19\u201328 (2005)","DOI":"10.1007\/978-3-540-30574-3_3"},{"key":"22_CR7","doi-asserted-by":"publisher","first-page":"1081","DOI":"10.1109\/18.841189","volume":"46","author":"J. Golic","year":"2000","unstructured":"Golic, J.: Cryptanalysis of three mutually clock-controlled stop\/go shift registers. IEEE Trans. Information Theory\u00a046, 1081\u20131090 (2000)","journal-title":"IEEE Trans. Information Theory"},{"key":"22_CR8","doi-asserted-by":"publisher","first-page":"1100","DOI":"10.1109\/12.888045","volume":"49","author":"J. Golic","year":"2000","unstructured":"Golic, J., Clark, A., Dawson, E.: Generalized inversion attack on nonlinear filter generators. IEEE Trans. Computers\u00a049, 1100\u20131109 (2000)","journal-title":"IEEE Trans. Computers"},{"issue":"18","key":"22_CR9","doi-asserted-by":"publisher","first-page":"1536","DOI":"10.1049\/el:20001107","volume":"36","author":"J. Golic","year":"2000","unstructured":"Golic, J.: Multibit cascades may be vulnerable to inversion attack. Electronics Letters\u00a036(18), 1536\u20131538 (2000)","journal-title":"Electronics Letters"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology - ASIACRYPT 2005"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11593447_22.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:51:46Z","timestamp":1619506306000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11593447_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540306849","9783540322672"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/11593447_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}