{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T02:43:03Z","timestamp":1747104183229},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540380801"},{"type":"electronic","value":"9783540380818"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11832072_18","type":"book-chapter","created":{"date-parts":[[2006,8,30]],"date-time":"2006-08-30T04:43:49Z","timestamp":1156913029000},"page":"257-270","source":"Crossref","is-referenced-by-count":4,"title":["Distinguishing Stream Ciphers with Convolutional Filters"],"prefix":"10.1007","author":[{"given":"Joan","family":"Daemen","sequence":"first","affiliation":[]},{"given":"Gilles","family":"Van Assche","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1007\/3-540-45539-6_40","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"A. Canteaut","year":"2000","unstructured":"Canteaut, A., Trabbia, M.: Improved Fast Correlation Attacks Using Parity-Check Equations of Weight 4 and 5. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 573\u2013588. Springer, Heidelberg (2000)"},{"key":"18_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1007\/3-540-48329-2_3","volume-title":"Advances in Cryptology - CRYPTO \u201993","author":"D. Coppersmith","year":"1994","unstructured":"Coppersmith, D., Krawczyk, H., Mansour, Y.: The Shrinking Generator. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol.\u00a0773, pp. 22\u201339. Springer, Heidelberg (1994)"},{"key":"18_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1007\/3-540-39200-9_20","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"P. Ekdahl","year":"2003","unstructured":"Ekdahl, P., Meier, W., Johansson, T.: Predicting the Shrinking Generator with Fixed Connections. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656, pp. 330\u2013344. Springer, Heidelberg (2003)"},{"key":"18_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1007\/BFb0053439","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"J.D.. Goli\u0107","year":"1995","unstructured":"Goli\u0107, J.D., O\u2019Connor, L.: Embedding and probabilistic correlation attacks on clock-controlled shift registers. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 230\u2013243. Springer, Heidelberg (1995)"},{"key":"18_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"248","DOI":"10.1007\/3-540-49264-X_20","volume-title":"Advances in Cryptology - EUROCRYPT \u201995","author":"J.D.. Goli\u0107","year":"1995","unstructured":"Goli\u0107, J.D.: Towards Fast Correlation Attacks on Irregularly Clocked Shift Registers. In: Guillou, L.C., Quisquater, J.-J. (eds.) EUROCRYPT 1995. LNCS, vol.\u00a0921, pp. 248\u2013262. Springer, Heidelberg (1995)"},{"issue":"1","key":"18_CR6","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/12.481485","volume":"45","author":"J.D. Goli\u0107","year":"1996","unstructured":"Goli\u0107, J.D.: Linear Models for Keystream Generators. IEEE Trans. on Computers\u00a045(1), 41\u201349 (1996)","journal-title":"IEEE Trans. on Computers"},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"Goli\u0107, J.D.: Computation of low-weight parity-check polynomials. Electronic Letters\u00a032(21) (October 1996)","DOI":"10.1049\/el:19961338"},{"key":"18_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"440","DOI":"10.1007\/3-540-44647-8_26","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"J.D.. Goli\u0107","year":"2001","unstructured":"Goli\u0107, J.D.: Correlation Analysis of the Shrinking Generator. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 440\u2013457. Springer, Heidelberg (2001)"},{"key":"18_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1007\/978-3-540-24654-1_19","volume-title":"Selected Areas in Cryptography","author":"J.D. Goli\u0107","year":"2004","unstructured":"Goli\u0107, J.D.: On the Success of the Embedding Attack on the Alternating Step Generator. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol.\u00a03006, pp. 262\u2013274. Springer, Heidelberg (2004)"},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Goli\u0107, J.D., Menicocci, R.: A New Statistical Distinguisher for the Shrinking Generator. Cryptology ePrint Archive: Report 2003\/041, http:\/\/eprint.iacr.org\/2003\/041\/","DOI":"10.1088\/1126-6708\/2003\/04\/041"},{"issue":"1","key":"18_CR11","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1023\/A:1027386519887","volume":"31","author":"J.D. Goli\u0107","year":"2004","unstructured":"Goli\u0107, J.D., Menicocci, R.: Correlation Analysis of the Alternating Step Generator. Designs, Codes and Cryptography\u00a031(1), 51\u201374 (2004)","journal-title":"Designs, Codes and Cryptography"},{"key":"18_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1007\/BFb0046097","volume-title":"Advances in Cryptology - EUROCRYPT \u201987","author":"C.G. G\u00fcnther","year":"1988","unstructured":"G\u00fcnther, C.G.: Alternating Step Generators Controlled by de Bruijn Sequences. In: Price, W.L., Chaum, D. (eds.) EUROCRYPT 1987. LNCS, vol.\u00a0304, pp. 5\u201314. Springer, Heidelberg (1988)"},{"key":"18_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/3-540-39466-4_13","volume-title":"Cryptography","author":"S.M. Jennings","year":"1983","unstructured":"Jennings, S.M.: Multiplexed sequences: Some properties of the minimum polynomial. In: Beth, T. (ed.) EUROCRYPT 1982. LNCS, vol.\u00a0149, pp. 189\u2013206. Springer, Heidelberg (1983)"},{"key":"18_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1007\/3-540-49649-1_27","volume-title":"Advances in Cryptology - ASIACRYPT\u201998","author":"T. Johansson","year":"1998","unstructured":"Johansson, T.: Reduced complexity correlation attacks on two clock-controlled generators. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol.\u00a01514, pp. 342\u2013357. Springer, Heidelberg (1998)"},{"key":"18_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1007\/3-540-44598-6_19","volume-title":"Advances in Cryptology - CRYPTO 2000","author":"T. Johansson","year":"2000","unstructured":"Johansson, T., J\u00f6nsson, F.: Fast Correlation Attacks through Reconstruction of Linear Polynomials. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol.\u00a01880, pp. 300\u2013315. Springer, Heidelberg (2000)"},{"key":"18_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/BFb0053436","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"W. Meier","year":"1995","unstructured":"Meier, W., Staffelbach, O.: The Self-shrinking Generator. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 205\u2013214. Springer, Heidelberg (1995)"},{"key":"18_CR17","volume-title":"Handbook of Applied Cryptography","author":"A. Menezes","year":"1997","unstructured":"Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)"},{"key":"18_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/BFb0053729","volume-title":"Information Security and Privacy","author":"L.R. Simpson","year":"1998","unstructured":"Simpson, L.R., Goli\u0107, J.D., Dawson, E.: A probabilistic correlation attack on the shrinking generator. In: Boyd, C., Dawson, E. (eds.) ACISP 1998. LNCS, vol.\u00a01438, pp. 147\u2013158. Springer, Heidelberg (1998)"},{"key":"18_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1007\/3-540-44983-3_18","volume-title":"Selected Areas in Cryptography","author":"L.R. Simpson","year":"2001","unstructured":"Simpson, L.R., Dawson, E., Goli\u0107, J.D., Millan, W.L.: LILI Keystream Generator. In: Stinson, D.R., Tavares, S. (eds.) SAC 2000. LNCS, vol.\u00a02012, pp. 248\u2013261. Springer, Heidelberg (2001)"},{"key":"18_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1007\/3-540-45708-9_19","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"D. Wagner","year":"2002","unstructured":"Wagner, D.: A Generalized Birthday Problem. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.\u00a02442, pp. 288\u2013303. Springer, Heidelberg (2002)"}],"container-title":["Lecture Notes in Computer Science","Security and Cryptography for Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11832072_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,8]],"date-time":"2023-05-08T18:24:07Z","timestamp":1683570247000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11832072_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540380801","9783540380818"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/11832072_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}