{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T17:29:06Z","timestamp":1777397346090,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540383413","type":"print"},{"value":"9783540383437","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11836810_13","type":"book-chapter","created":{"date-parts":[[2006,10,3]],"date-time":"2006-10-03T06:36:57Z","timestamp":1159857417000},"page":"171-186","source":"Crossref","is-referenced-by-count":178,"title":["Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles"],"prefix":"10.1007","author":[{"given":"Christophe","family":"De Canni\u00e8re","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","unstructured":"Daemen, J.: Cipher and hash function design. Strategies based on linear and differential cryptanalysis. PhD thesis, Katholieke Universiteit Leuven (1995)"},{"key":"13_CR2","unstructured":"Hawkes, P., Rose, G.G.: Primitive specification and supporting documentation for SOBER-tw NESSIE. In: Proceedings of the First NESSIE Workshop, NESSIE (submitted to) (2000)"},{"key":"13_CR3","unstructured":"Ekdahl, P., Johansson, T.: SNOW \u2013 A new stream cipher. In: Proceedings of the First NESSIE Workshop, NESSIE (2000)"},{"key":"13_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1007\/3-540-69710-1_5","volume-title":"Fast Software Encryption","author":"J. Daemen","year":"1998","unstructured":"Daemen, J., Clapp, C.S.K.: Fast hashing and stream encryption with PANAMA. In: Vaudenay, S. (ed.) FSE 1998. LNCS, vol.\u00a01372, pp. 60\u201374. Springer, Heidelberg (1998)"},{"key":"13_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"M. Matsui","year":"1994","unstructured":"Matsui, M.: Linear cryptanalysis method for DES cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 386\u2013397. Springer, Heidelberg (1994)"},{"key":"13_CR6","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The Design of Rijndael: AES \u2014 The Advanced Encryption Standard","author":"J. Daemen","year":"2002","unstructured":"Daemen, J., Rijmen, V.: The Design of Rijndael: AES \u2014 The Advanced Encryption Standard. Springer, Heidelberg (2002)"},{"key":"13_CR7","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/s002000050120","volume":"10","author":"J. Rosenthal","year":"1999","unstructured":"Rosenthal, J., Smarandache, R.: Maximum distance separable convolutional codes. Applicable Algebra in Engineering, Communication and Computing\u00a010, 15\u201332 (1999)","journal-title":"Applicable Algebra in Engineering, Communication and Computing"},{"key":"13_CR8","unstructured":"De Canni\u00e8re, C., Preneel, B.: TRIVIUM \u2014 Specifications. eSTREAM, ECRYPT Stream Cipher Project, Report 2005\/030 (2005), \n                    \n                      http:\/\/www.ecrypt.eu.org\/stream"},{"key":"13_CR9","unstructured":"Khazaei, S.: Re: A reformulation of TRIVIUM. Posted on the eSTREAM Forum (2006), \n                    \n                      http:\/\/www.ecrypt.eu.org\/stream\/phorum\/read.php?1,448"},{"key":"13_CR10","unstructured":"Raddum, H.: Cryptanalytic results on TRIVIUM. eSTREAM, ECRYPT Stream Cipher Project, Report 2006\/039 (2006), \n                    \n                      http:\/\/www.ecrypt.eu.org\/stream"},{"key":"13_CR11","unstructured":"G\u00fcrkaynak, F.K., Luethi, P., Bernold, N., Blattmann, R., Goode, V., Marghitola, M., Kaeslin, H., Felber, N., Fichtner, W.: Hardware evaluation of eSTREAM candidates: Achterbahn, Grain, MICKEY, MOSQUITO, SFINKS, TRIVIUM, VEST, ZK-Crypt. eSTREAM, ECRYPT Stream Cipher Project, Report 2006\/015 (2006), \n                    \n                      http:\/\/www.ecrypt.eu.org\/stream"},{"key":"13_CR12","unstructured":"Good, T., Chelton, W., Benaissa, M.: Review of stream cipher candidates from a low resource hardware perspective. eSTREAM, ECRYPT Stream Cipher Project, Report 2006\/016 (2006), \n                    \n                      http:\/\/www.ecrypt.eu.org\/stream"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11836810_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,10]],"date-time":"2019-03-10T22:19:28Z","timestamp":1552256368000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11836810_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540383413","9783540383437"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/11836810_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006]]}}}