{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T18:52:42Z","timestamp":1725475962023},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540340751"},{"type":"electronic","value":"9783540340768"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11751595_30","type":"book-chapter","created":{"date-parts":[[2006,5,11]],"date-time":"2006-05-11T14:27:59Z","timestamp":1147357679000},"page":"269-278","source":"Crossref","is-referenced-by-count":1,"title":["Highly Reliable Synchronous Stream Cipher System for Link Encryption"],"prefix":"10.1007","author":[{"given":"HoonJae","family":"Lee","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"30_CR1","volume-title":"Applied Cryptography : Protocols, Algorithms, and Source Code in C","author":"B. Schneier","year":"1996","unstructured":"Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edn. John Wiley and Sons, Inc., New York (1996)","edition":"2"},{"key":"30_CR2","volume-title":"Handbook of Applied Cryptography","author":"A. Menezes","year":"1997","unstructured":"Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)"},{"issue":"6","key":"30_CR3","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New Directions in Cryptography. IEEE Trans. on Infor. Theory\u00a0IT-22(6), 644\u2013654 (1976)","journal-title":"IEEE Trans. on Infor. Theory"},{"key":"30_CR4","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-82865-2","volume-title":"Analysis and Design of Stream Ciphers","author":"R.A. Rueppel","year":"1986","unstructured":"Rueppel, R.A.: Analysis and Design of Stream Ciphers. Springer, Heidelberg (1986)"},{"issue":"1","key":"30_CR5","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/S0165-1684(99)00123-1","volume":"80","author":"H. Lee","year":"2000","unstructured":"Lee, H., Moon, S.: On An Improved Summation Generator with 2-Bit Memory. Signal Processing\u00a080(1), 211\u2013217 (2000)","journal-title":"Signal Processing"},{"key":"30_CR6","unstructured":"Tatebayashi, M., Matsuzaki, N., Newman, D.B.: A Cryptosystem using Digital Signal Processors for Mobile Communication. In: ICASSP 1990, pp. 37.1.1 - 37.1.4 (1990)"},{"issue":"4","key":"30_CR7","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1007\/s005290050024","volume":"5","author":"H. Lee","year":"1998","unstructured":"Lee, H., Moon, S.: A Zero-Suppression Algorithm for the synchronous stream cipher. Applied Signal Processing\u00a05(4), 240\u2013243 (1998)","journal-title":"Applied Signal Processing"},{"key":"30_CR8","unstructured":"Moon, S., Lee, P.: A Propose of a Key Distribution Protocol. In: The Proceeding of The Korean Workshop on Information Security and Cryptography, WISC 1990, pp. 117\u2013124 (1990)"},{"key":"30_CR9","volume-title":"Digital Communications","author":"J. Proakis","year":"1995","unstructured":"Proakis, J.: Digital Communications, 3rd edn. McGraw-Hill, Inc., New York (1995)","edition":"3"},{"key":"30_CR10","volume-title":"Fundamentals of Cryptology","author":"H.C.A. Tilborg van","year":"2000","unstructured":"van Tilborg, H.C.A.: Fundamentals of Cryptology. Kluwer Academic Publishers, Dordrecht (2000)"},{"issue":"4","key":"30_CR11","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1049\/el:19930262","volume":"29","author":"B. Park","year":"1993","unstructured":"Park, B., Choi, H., Chang, T., Kang, K.: Period of Sequences of Primitive Polynomials. Electronics Letters\u00a029(4), 390\u2013391 (1993)","journal-title":"Electronics Letters"},{"key":"30_CR12","volume-title":"Secure Speech Communications","author":"H.J. Beker","year":"1985","unstructured":"Beker, H.J., Piper, F.C.: Secure Speech Communications. Academic Press, London (1985)"},{"key":"30_CR13","unstructured":"NIST, Announcing the Advanced Encryption Standard (AES), FIPS-197 (November 2001)"},{"key":"30_CR14","unstructured":"KISA, Development of SEED, the 128-bit block cipher standard, (October 1998), \n                    \n                      http:\/\/www.kisa.or.kr"},{"key":"30_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/3-540-45450-0_3","volume-title":"Information Security and Privacy","author":"A. Clark","year":"2002","unstructured":"Clark, A., Dawson, E., Fuller, J., Goli\u0107, J.D., Lee, H.-J., Millan, W.L., Moon, S.-J., Simpson, L.R.: The LILI-II keystream generator. In: Batten, L.M., Seberry, J. (eds.) ACISP 2002. LNCS, vol.\u00a02384, pp. 25\u201339. Springer, Heidelberg (2002)"},{"issue":"2","key":"30_CR16","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1016\/S0165-1684(01)00180-3","volume":"82","author":"H. Lee","year":"2002","unstructured":"Lee, H., Moon, S.: Parallel Stream Cipher for Secure High-Speed Communications. Signal Processing\u00a082(2), 259\u2013265 (2002)","journal-title":"Signal Processing"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications - ICCSA 2006"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11751595_30.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:59:51Z","timestamp":1619506791000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11751595_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540340751","9783540340768"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/11751595_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}