{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T13:02:18Z","timestamp":1772283738594,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540497677","type":"print"},{"value":"9783540497691","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11941378_2","type":"book-chapter","created":{"date-parts":[[2006,11,27]],"date-time":"2006-11-27T08:20:35Z","timestamp":1164615635000},"page":"2-16","source":"Crossref","is-referenced-by-count":35,"title":["Non-randomness in eSTREAM Candidates Salsa20 and TSC-4"],"prefix":"10.1007","author":[{"given":"Simon","family":"Fischer","sequence":"first","affiliation":[]},{"given":"Willi","family":"Meier","sequence":"additional","affiliation":[]},{"given":"C\u00f4me","family":"Berbain","sequence":"additional","affiliation":[]},{"given":"Jean-Fran\u00e7ois","family":"Biasse","sequence":"additional","affiliation":[]},{"given":"M. J. B.","family":"Robshaw","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","unstructured":"Bernstein, D.J.: Salsa20. In: eSTREAM, ECRYPT Stream Cipher Project, Report 2005\/025"},{"key":"2_CR2","unstructured":"Bernstein, D.J.: Salsa20\/8 and Salsa20\/12. In: eSTREAM, ECRYPT Stream Cipher Project, Report 2006\/007"},{"key":"2_CR3","unstructured":"Bernstein, D.J.: Related-key attacks: who cares? In: eSTREAM discussion forum (June 22, 2005), \n                    \n                      http:\/\/www.ecrypt.eu.org\/stream\/phorum\/read.php?1,23"},{"key":"2_CR4","unstructured":"Biryukov, A.: A New 128 Bit Key Stream Cipher: LEX. In: eSTREAM, ECRYPT Stream Cipher Project, Report 2005\/013"},{"key":"2_CR5","unstructured":"Crowley, P.: Truncated Differential Cryptanalysis of Five Rounds of Salsa20. In: eSTREAM, ECRYPT Stream Cipher Project, Report 2005\/073"},{"key":"2_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1007\/3-540-48285-7_14","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"J. Daemen","year":"1994","unstructured":"Daemen, J., Goverts, R., Vandewalle, J.: Resynchronization Weaknesses in Synchronous Stream Ciphers. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 159\u2013167. Springer, Heidelberg (1994)"},{"key":"2_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/3-540-45661-9_17","volume-title":"Fast Software Encryption","author":"M. Dichtl","year":"2002","unstructured":"Dichtl, M., Schafheutle, M.: Linearity Properties of the SOBER-t32 Key Loading. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol.\u00a02365, pp. 159\u2013167. Springer, Heidelberg (2002)"},{"issue":"1","key":"2_CR8","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1109\/TIT.2002.806129","volume":"49","author":"P. Ekdahl","year":"2003","unstructured":"Ekdahl, P., Johansson, T.: Another Attack on A5\/1. IEEE Transactions on Information Theory\u00a049(1), 284\u2013289 (2003)","journal-title":"IEEE Transactions on Information Theory"},{"key":"2_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-45537-X_1","volume-title":"Selected Areas in Cryptography","author":"S.R. Fluhrer","year":"2001","unstructured":"Fluhrer, S.R., Mantin, I., Shamir, A.: Weaknesses in the Key Scheduling Algorithm of RC4. In: Vaudenay, S., Youssef, A.M. (eds.) SAC 2001. LNCS, vol.\u00a02259, pp. 1\u201324. Springer, Heidelberg (2001)"},{"key":"2_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/11554868_2","volume-title":"Progress in Cryptology \u2013 Mycrypt 2005","author":"S. K\u00fcnzli","year":"2005","unstructured":"K\u00fcnzli, S., Junod, P., Meier, W.: Distinguishing Attacks on T-functions. In: Dawson, E., Vaudenay, S. (eds.) Mycrypt 2005. LNCS, vol.\u00a03715, pp. 2\u201315. Springer, Heidelberg (2005)"},{"key":"2_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1007\/11593447_20","volume-title":"Advances in Cryptology - ASIACRYPT 2005","author":"F. Muller","year":"2005","unstructured":"Muller, F., Peyrin, T.: Linear Cryptanalysis of the TSC Family of Stream Ciphers. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol.\u00a03788, pp. 373\u2013394. Springer, Heidelberg (2005)"},{"key":"2_CR12","unstructured":"Moon, D., Kwon, D., Han, D., Lee, J., Ryu, G.H., Lee, D.W., Yeom, Y., Chee, S.: T-function Based Streamcipher TSC-4. In: eSTREAM, ECRYPT Stream Cipher Project, Report 2006\/024"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology - INDOCRYPT 2006"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11941378_2.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T03:50:23Z","timestamp":1619495423000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11941378_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540497677","9783540497691"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/11941378_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006]]}}}