{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T18:52:36Z","timestamp":1725475956680},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540340751"},{"type":"electronic","value":"9783540340768"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11751595_108","type":"book-chapter","created":{"date-parts":[[2006,5,11]],"date-time":"2006-05-11T14:27:59Z","timestamp":1147357679000},"page":"1035-1043","source":"Crossref","is-referenced-by-count":0,"title":["Practical Attack on the Shrinking Generator"],"prefix":"10.1007","author":[{"given":"Pino","family":"Caballero-Gil","sequence":"first","affiliation":[]},{"given":"Amparo","family":"F\u00faster-Sabater","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"108_CR1","doi-asserted-by":"crossref","unstructured":"Cattell, K., Muzio, J.C.: Synthesis of one-dimensional linear hybrid cellular automata. IEEE Transactions on Computer-Aided Design (1996)","DOI":"10.1109\/43.489103"},{"key":"108_CR2","unstructured":"Cattell, K., Muzio, J.C.: Tables of linear cellular automata for minimal weight primitive polynomials of degree up to 300. Technical report, University of Victoria, Department of Computer Science (1993)"},{"key":"108_CR3","unstructured":"Cattell, K., Zhang, S., Sun, X., Serra, M., Muzio, J.C., Miller, D.M.: One-Dimensional Linear Hybrid Cellular Automata: Their Synthesis, Properties, and Applications in VLSI Testing. Tutorial, http:\/\/www.cs.uvic.ca\/mserra\/CA.html"},{"key":"108_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1007\/3-540-48329-2_3","volume-title":"Advances in Cryptology - CRYPTO \u201993","author":"D. Coppersmith","year":"1994","unstructured":"Coppersmith, D., Krawczyk, H., Mansour, Y.: The Shrinking Generator. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol.\u00a0773, pp. 22\u201339. Springer, Heidelberg (1994)"},{"key":"108_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1007\/3-540-39200-9_21","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"P. Ekdahl","year":"2003","unstructured":"Ekdahl, P., Meier, W., Johansson, T.: Predicting the Shrinking Generator with Fixed Connections. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656, pp. 345\u2013359. Springer, Heidelberg (2003)"},{"key":"108_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1007\/978-3-540-30479-1_63","volume-title":"Cellular Automata","author":"A. F\u00faster-Sabater","year":"2004","unstructured":"F\u00faster-Sabater, A., de la Gu\u00eda, D.: Cellular Automata Application to the Linearization of Stream Cipher Generators. In: Sloot, P.M.A., Chopard, B., Hoekstra, A.G. (eds.) ACRI 2004. LNCS, vol.\u00a03305, pp. 612\u2013622. Springer, Heidelberg (2004)"},{"key":"108_CR7","doi-asserted-by":"crossref","unstructured":"Golic, J.D., O\u2019Connor, L.: A Cryptanalysis of Clock-Controlled Shift Registers with Multiple Steps. Cryptography: Policy and Algorithms, 174\u2013185 (1995)","DOI":"10.1007\/BFb0032357"},{"key":"108_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1007\/3-540-49649-1_27","volume-title":"Advances in Cryptology - ASIACRYPT\u201998","author":"T. Johansson","year":"1998","unstructured":"Johansson, T.: Reduced Complexity Correlation Attacks on Two Clock-Controlled Generators. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol.\u00a01514, pp. 342\u2013356. Springer, Heidelberg (1998)"},{"key":"108_CR9","doi-asserted-by":"publisher","first-page":"732","DOI":"10.1109\/TIT.1976.1055626","volume":"22","author":"E.L. Key","year":"1976","unstructured":"Key, E.L.: An Analysis of the Structure and Complexity of Nonlinear Binary Sequence Generators. IEEE Transactions on Information Theory\u00a022, 732\u2013736 (1976)","journal-title":"IEEE Transactions on Information Theory"},{"key":"108_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1007\/3-540-46416-6_17","volume-title":"Advances in Cryptology - EUROCRYPT \u201991","author":"W. Meier","year":"1991","unstructured":"Meier, W., Staffelbach, O.: Analysis of Pseudo Random Sequence Generated by Cellular Automata. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol.\u00a0547, pp. 186\u2013199. Springer, Heidelberg (1991)"},{"key":"108_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"250","DOI":"10.1007\/3-540-63163-1_20","volume-title":"Applied Algebra, Algebraic Algorithms and Error-Correcting Codes","author":"M. Mihaljevic","year":"1997","unstructured":"Mihaljevic, M.: Security Examination of a Cellular Automata Based Pseudorandom Bit Generator Using an Algebraic Replica Approach. In: Mattson, H.F., Mora, T. (eds.) AAECC 1997. LNCS, vol.\u00a01255, pp. 250\u2013262. Springer, Heidelberg (1997)"},{"issue":"12","key":"108_CR12","doi-asserted-by":"publisher","first-page":"1346","DOI":"10.1109\/12.338094","volume":"43","author":"S. Nandi","year":"1994","unstructured":"Nandi, S., Kar, B.K., Chaudhuri, P.P.: Theory and Applications of Cellular Automata in Cryptography. IEEE Transactions on Computers\u00a043(12), 1346\u20131357 (1994)","journal-title":"IEEE Transactions on Computers"},{"key":"108_CR13","doi-asserted-by":"crossref","unstructured":"Seredynski, F., Bouvry, P., Zomaya, A.Y.: Cellular Automata Computations and Secret Key Cryptography. Parallel Computing archive\u00a030(5-6) (2004)","DOI":"10.1016\/j.parco.2003.12.014"},{"key":"108_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/BFb0053729","volume-title":"Information Security and Privacy","author":"L. Simpson","year":"1998","unstructured":"Simpson, L., Golic, J.D., Dawson, E.: A Probabilistic Correlation Attack on the Shrinking Generator. In: Boyd, C., Dawson, E. (eds.) ACISP 1998. LNCS, vol.\u00a01438, pp. 147\u2013158. Springer, Heidelberg (1998)"},{"issue":"5","key":"108_CR15","doi-asserted-by":"publisher","first-page":"809","DOI":"10.1080\/00207219508926211","volume":"78","author":"X. Sun","year":"1995","unstructured":"Sun, X., Kontopidi, E., Serra, M., Muzio, J.C.: The concatenation and partitioning of linear finite state machines. International Journal of Electronics\u00a078(5), 809\u2013839 (1995)","journal-title":"International Journal of Electronics"},{"key":"108_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"429","DOI":"10.1007\/3-540-39799-X_32","volume-title":"Advances in Cryptology","author":"S. Wolfram","year":"1986","unstructured":"Wolfram, S.: Cryptography with Cellular Automata. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol.\u00a0218, pp. 429\u2013432. Springer, Heidelberg (1986)"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications - ICCSA 2006"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11751595_108.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:59:29Z","timestamp":1619506769000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11751595_108"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540340751","9783540340768"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/11751595_108","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}