{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:34:56Z","timestamp":1725543296068},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540354376"},{"type":"electronic","value":"9783540354383"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11767480_13","type":"book-chapter","created":{"date-parts":[[2006,7,4]],"date-time":"2006-07-04T05:21:27Z","timestamp":1151990487000},"page":"194-209","source":"Crossref","is-referenced-by-count":6,"title":["The Rainbow Attack on Stream Ciphers Based on Maiorana-McFarland Functions"],"prefix":"10.1007","author":[{"given":"Khoongming","family":"Khoo","sequence":"first","affiliation":[]},{"given":"Guang","family":"Gong","sequence":"additional","affiliation":[]},{"given":"Hian-Kiat","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","unstructured":"Adams, C.: The CAST-128 Encryption Algorithm. RFC 2144"},{"key":"13_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44448-3_1","volume-title":"Advances in Cryptology - ASIACRYPT 2000","author":"A. Biryukov","year":"2000","unstructured":"Biryukov, A., Shamir, A.: Cryptanalytic Time\/Memory\/Data Tradeoffs for Stream Ciphers. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol.\u00a01976, pp. 1\u201313. Springer, Heidelberg (2000)"},{"key":"13_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1007\/3-540-45539-6_40","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"A. Canteaut","year":"2000","unstructured":"Canteaut, A., Trabbia, M.: Improved Fast Correlation Attacks Using Parity-Check Equations of Weight 4 and 5. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 573\u2013588. Springer, Heidelberg (2000)"},{"key":"13_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1007\/3-540-45708-9_35","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"C. Carlet","year":"2002","unstructured":"Carlet, C.: A Larger Class of Cryptographic Boolean Functions via a Study of the Maiorana-McFarland Construction. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.\u00a02442, pp. 549\u2013564. Springer, Heidelberg (2002)"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Fiat, A., Naor, M.: Rigorous Time\/Space Tradeoffs for Inverting Functions. In: STOC 1991, pp. 534\u2013541 (1991)","DOI":"10.1145\/103418.103473"},{"key":"13_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/978-3-540-24654-1_20","volume-title":"Selected Areas in Cryptography","author":"G. Gong","year":"2004","unstructured":"Gong, G., Khoo, K.: Additive Autocorrelation of Resilient Boolean Functions. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol.\u00a03006, pp. 275\u2013290. Springer, Heidelberg (2004)"},{"key":"13_CR7","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1109\/TIT.1980.1056220","volume":"26","author":"M. Hellman","year":"1980","unstructured":"Hellman, M.: A Cryptanalytic Time-Memory Trade-Off. IEEE Trans. on Information Theory\u00a026, 401\u2013406 (1980)","journal-title":"IEEE Trans. on Information Theory"},{"key":"13_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"M. Matsui","year":"1994","unstructured":"Matsui, M.: Linear Cryptanalysis Method for DES Cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 386\u2013397. Springer, Heidelberg (1994)"},{"issue":"1","key":"13_CR9","first-page":"66","volume":"E85-A","author":"M.J. Mihaljevic","year":"2002","unstructured":"Mihaljevic, M.J., Imai, H.: Cryptanalysis of Toyocrypt-HS1 Stream Cipher. IEICE Trans. Fundamentals,\u00a0E85-A(1), 66\u201373 (2002)","journal-title":"IEICE Trans. Fundamentals,"},{"key":"13_CR10","unstructured":"Mukhopadyay, S., Sarkar, P.: Application of LFSRs in Time\/Memory Trade-Off Cryptanalysis, Indian Statistical Institute Technical Report No. ASD\/04\/9 (Revised Version) (2005)"},{"key":"13_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"617","DOI":"10.1007\/978-3-540-45146-4_36","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"P. Oechslin","year":"2003","unstructured":"Oechslin, P.: Making a Faster Cryptanalytic Time-Memory Trade-Off. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 617\u2013630. Springer, Heidelberg (2003)"},{"key":"13_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1007\/3-540-45537-X_5","volume-title":"Selected Areas in Cryptography","author":"E. Pasalic","year":"2001","unstructured":"Pasalic, E., Maitra, S.: Linear Codes in Constructing Resilient Functions with High Nonlinearity. In: Vaudenay, S., Youssef, A.M. (eds.) SAC 2001. LNCS, vol.\u00a02259, pp. 60\u201374. Springer, Heidelberg (2001)"},{"key":"13_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1007\/3-540-45708-9_34","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"P. Sarkar","year":"2002","unstructured":"Sarkar, P.: The Filter-Combiner Model for Memoryless Synchronous Stream Ciphers. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.\u00a02442, pp. 533\u2013548. Springer, Heidelberg (2002)"},{"key":"13_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1007\/3-540-44598-6_32","volume-title":"Advances in Cryptology - CRYPTO 2000","author":"P. Sarkar","year":"2000","unstructured":"Sarkar, P., Maitra, S.: Nonlinearity Bounds and Constructions of Resilient Boolean Functions. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol.\u00a01880, pp. 515\u2013532. Springer, Heidelberg (2000)"},{"key":"13_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1007\/3-540-45539-6_35","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"P. Sarkar","year":"2000","unstructured":"Sarkar, P., Maitra, S.: Construction of Nonlinear Boolean Functions with Important Cryptographic Properties. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 485\u2013506. Springer, Heidelberg (2000)"},{"key":"13_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/3-540-48285-7_16","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"J. Seberry","year":"1994","unstructured":"Seberry, J., Zhang, X.-M., Zheng, Y.: On Constructions and Nonlinearity of Correlation Immune Functions. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 181\u2013199. Springer, Heidelberg (1994)"},{"issue":"1","key":"13_CR17","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1109\/TC.1985.1676518","volume":"C34","author":"T. Siegenthaler","year":"1985","unstructured":"Siegenthaler, T.: Decrypting a Class of Stream Ciphers using Ciphertexts only. IEEE Transactions on Computers\u00a0C34(1), 81\u201385 (1985)","journal-title":"IEEE Transactions on Computers"}],"container-title":["Lecture Notes in Computer Science","RoboCup 2005: Robot Soccer World Cup IX"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11767480_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,19]],"date-time":"2019-04-19T19:35:33Z","timestamp":1555702533000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11767480_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540354376","9783540354383"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/11767480_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}