{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T19:55:36Z","timestamp":1725479736466},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540693277"},{"type":"electronic","value":"9783540693284"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11967668_1","type":"book-chapter","created":{"date-parts":[[2007,2,6]],"date-time":"2007-02-06T12:03:43Z","timestamp":1170763423000},"page":"1-19","source":"Crossref","is-referenced-by-count":4,"title":["MV3: A New Word Based Stream Cipher Using Rapid Mixing and Revolving Buffers"],"prefix":"10.1007","author":[{"given":"Nathan","family":"Keller","sequence":"first","affiliation":[]},{"given":"Stephen D.","family":"Miller","sequence":"additional","affiliation":[]},{"given":"Ilya","family":"Mironov","sequence":"additional","affiliation":[]},{"given":"Ramarathnam","family":"Venkatesan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","unstructured":"Aiello, W., Rajagopalan, S., Venkatesan, R.: Design of Practical and Provably Good Random Number Generators. In: Proc. of SODA 1995, pp. 1\u20139 (1995)"},{"issue":"2","key":"1_CR2","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1002\/rsa.3240050203","volume":"5","author":"N. Alon","year":"1994","unstructured":"Alon, N., Roichman, Y.: Random Cayley Graphs and Expanders. Rand. Str. Alg.\u00a05(2), 271\u2013284 (1994)","journal-title":"Rand. Str. Alg."},{"key":"1_CR3","unstructured":"Berbain, C., Billet, O., Canteaut, A., Courtois, N., Gilbert, H., Goubin, L., Gouget, A., Granboulan, L., Lauradoux, C., Minier, M., Pornin, T., Sibert, H.: Sosemanuk, a Fast Software-Oriented Stream Cipher. In: Ecrypt 2005 (submitted, 2005)"},{"key":"1_CR4","unstructured":"Biham, E., Seberry, J.: Py (Roo): A fast and secure stream cipher using rolling arrays. In: Ecrypt 2005 (submitted, 2005)"},{"key":"1_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44448-3_1","volume-title":"Advances in Cryptology - ASIACRYPT 2000","author":"A. Biryukov","year":"2000","unstructured":"Biryukov, A., Shamir, A.: Cryptanalytic Time\/Memory\/Data Tradeoffs for Stream Ciphers. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol.\u00a01976, pp. 1\u201313. Springer, Heidelberg (2000)"},{"key":"1_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1007\/3-540-45708-9_33","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"D. Coppersmith","year":"2002","unstructured":"Coppersmith, D., Halevi, S., Jutla, C.S.: Cryptanalysis of stream ciphers with linear masking. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.\u00a02442, pp. 515\u2013532. Springer, Heidelberg (2002)"},{"key":"1_CR7","unstructured":"De Canniere, C.: eSTREAM testing framework (2006), Available on-line at: \n                    \n                      http:\/\/www.ecrypt.eu.org\/stream"},{"issue":"4","key":"1_CR8","doi-asserted-by":"publisher","first-page":"1203","DOI":"10.1137\/S0097539794268765","volume":"27","author":"D. Gillman","year":"1998","unstructured":"Gillman, D.: A Chernoff bound for random walks on expander graphs. SIAM J. Comput.\u00a027(4), 1203\u20131220 (1998)","journal-title":"SIAM J. Comput."},{"key":"1_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1007\/3-540-69053-0_16","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"J. Goli\u0107","year":"1997","unstructured":"Goli\u0107, J.: Linear statistical weakness of alleged RC4 keystream generator. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.\u00a01233, pp. 226\u2013238. Springer, Heidelberg (1997)"},{"key":"1_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/3-540-45661-9_15","volume-title":"Fast Software Encryption","author":"S. Halevi","year":"2002","unstructured":"Halevi, S., Coppersmith, D., Jutla, C.: Scream: a Software-Efficient Stream Cipher. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol.\u00a02365, pp. 195\u2013209. Springer, Heidelberg (2002)"},{"key":"1_CR11","unstructured":"Hong, J., Sarkar, P.: Rediscovery of Time Memory Tradeoffs (2005), Available online at: \n                    \n                      http:\/\/eprint.iacr.org\/2005\/090"},{"key":"1_CR12","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1090\/S0273-0979-06-01126-8","volume":"43","author":"S. Hoory","year":"2006","unstructured":"Hoory, S., Linial, N., Wigderson, A.: Expander graphs and their applications. Bull. Amer. Math. Soc.\u00a043, 439\u2013561 (2006)","journal-title":"Bull. Amer. Math. Soc."},{"key":"1_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/11593447_2","volume-title":"Advances in Cryptology - ASIACRYPT 2005","author":"D. Jao","year":"2005","unstructured":"Jao, D., Miller, S., Venkatesan, R.: Do All Elliptic Curves of the Same Order Have the Same Difficulty of Discrete Log? In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol.\u00a03788, pp. 21\u201340. Springer, Heidelberg (2005)"},{"key":"1_CR14","unstructured":"Kim, S., Umeno, K., Hasegawa, A.: Corrections of the NIST statistical test suite for randomness, Cryptology ePrint Archive, Report 2004\/018 (2004)"},{"key":"1_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"470","DOI":"10.1007\/3-540-36400-5_34","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"A. Klimov","year":"2003","unstructured":"Klimov, A., Shamir, A.: A New Class of Invertible Mappings. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 470\u2013483. Springer, Heidelberg (2003)"},{"key":"1_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-25937-4_1","volume-title":"Fast Software Encryption","author":"A. Klimov","year":"2004","unstructured":"Klimov, A., Shamir, A.: New Cryptographic Primitives Based on Multiword T-Functions. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol.\u00a03017, pp. 1\u201315. Springer, Heidelberg (2004)"},{"key":"1_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/3-540-49649-1_26","volume-title":"Advances in Cryptology - ASIACRYPT\u201998","author":"L. Knudsen","year":"1998","unstructured":"Knudsen, L., et al.: Analysis Methods for (Alleged) RC4. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol.\u00a01514, pp. 327\u2013341. Springer, Heidelberg (1998)"},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Lubotzky, A., Phillips, R., Sarnak, P.: Explicit expanders and the Ramanujan conjectures. In: Proc. of STOC 1986, pp. 240\u2013246 (1986)","DOI":"10.1145\/12130.12154"},{"key":"1_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1007\/3-540-45473-X_13","volume-title":"Fast Software Encryption","author":"I. Mantin","year":"2002","unstructured":"Mantin, I., Shamir, A.: A practical attack on broadcast RC4. In: Matsui, M. (ed.) FSE 2001. LNCS, vol.\u00a02355, pp. 152\u2013164. Springer, Heidelberg (2002)"},{"key":"1_CR20","unstructured":"Marsaglia, G.: DIEHARD battery of tests, Available from: \n                    \n                      http:\/\/stat.fsu.edu\/~geo\/"},{"key":"1_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1007\/3-540-45708-9_20","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"I. Mironov","year":"2002","unstructured":"Mironov, I. (Not so) random shuffles of RC4. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.\u00a02442, pp. 304\u2013319. Springer, Heidelberg (2002)"},{"key":"1_CR22","unstructured":"Preneel, B., et al.: NESSIE Security Report, version 2.0 (2003)"},{"issue":"4","key":"1_CR23","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/s001459900048","volume":"11","author":"P. Rogaway","year":"1998","unstructured":"Rogaway, P., Coppersmith, D.: A Software-Optimized Encryption Algorithm. J. of Cryptology\u00a011(4), 273\u2013287 (1998)","journal-title":"J. of Cryptology"},{"key":"1_CR24","doi-asserted-by":"crossref","unstructured":"Rukhin, A., Soto, J., Nechvatal, J., Smid, M., Barker, E., Leigh, S., Levenson, M., Vangel, M., Banks, D., Heckert, A., Dray, J., Vo, S.: A statistical test suite for random and pseudorandom number generators for cryptographic applications, NIST Special Publication 800-22 (2001), \n                    \n                      http:\/\/www.nist.gov","DOI":"10.6028\/NIST.SP.800-22"},{"key":"1_CR25","volume-title":"Applied Cryptography: Protocols, Algorithms, and Source Code in C","author":"B. Schneier","year":"1995","unstructured":"Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edn. John Wiley & Sons, Chichester (1995)","edition":"2"}],"container-title":["Lecture Notes in Computer Science","Topics in Cryptology \u2013 CT-RSA 2007"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11967668_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T16:48:41Z","timestamp":1558284521000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11967668_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540693277","9783540693284"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/11967668_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}