{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T21:40:15Z","timestamp":1737495615304,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540006220"},{"type":"electronic","value":"9783540364924"}],"license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36492-7_14","type":"book-chapter","created":{"date-parts":[[2007,10,23]],"date-time":"2007-10-23T23:36:10Z","timestamp":1193182570000},"page":"196-213","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Two Alerts for Design of Certain Stream Ciphers: Trapped LFSR and Weak Resilient Function over GF(q)"],"prefix":"10.1007","author":[{"given":"Paul","family":"Camion","sequence":"first","affiliation":[]},{"given":"Miodrag J.","family":"Mihaljevi\u0107","sequence":"additional","affiliation":[]},{"given":"Hideki","family":"Imai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,2,17]]},"reference":[{"issue":"15","key":"14_CR1","doi-asserted-by":"publisher","first-page":"1322","DOI":"10.1049\/el:19930886","volume":"29","author":"R.J. Anderson","year":"1993","unstructured":"R. J. Anderson, \u201cA faster attack on certain stream ciphers\u201d, Electronics Letters, vol. 29, pp. 1322\u20131323, 22nd July 1993.","journal-title":"Electronics Letters"},{"key":"14_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"372","DOI":"10.1007\/3-540-68697-5_28","volume-title":"Advance in Cryptology-CRYPTO\u201996","author":"P. Camion","year":"1996","unstructured":"P. Camion and A. Canteaut, \u201cGeneralization of Siegenthaler inequality and Schnorr-Vaudenay multipermutations\u201d, Advance in Cryptology-CRYPTO\u201996, Lecture Notes in Computer Science, vol. 1109, pp. 372\u2013386, 1996."},{"key":"14_CR3","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1023\/A:1008337029047","volume":"16","author":"P. Camion","year":"1999","unstructured":"P. Camion and A. Canteaut, \u201cCorrelation-immune and resilient functions over a.nite alphabet and their applications in cryptography\u201d, Design, Codes and Cryptography, vol 16, pp.103\u2013116, 1999.","journal-title":"Design, Codes and Cryptography"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"P. Camion, M. J. Mihaljevi\u0107 and H. Imai, \u201cOn employment of LFSRs over GF(q) in certain stream ciphers\u201d, IEEE Int. Symp. Inform. Theory-ISIT2002, Lausanne, Switzerland, July 2002, Proceedings, p. 210.","DOI":"10.1109\/ISIT.2002.1023482"},{"key":"14_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1007\/3-540-45539-6_40","volume-title":"Advances in Cryptology-EUROCRYPT 2000","author":"A. Canteaut","year":"2000","unstructured":"A. Canteaut and M. Trabbia, \u201cImproved fast correlation attacks using paritycheck equations of weight 4 and 5\u201d, Advances in Cryptology-EUROCRYPT 2000, Lecture Notes in Computer Science, vol. 1807, pp. 573\u2013588, 2000."},{"key":"14_CR6","series-title":"Lect Notes Comput Sci","first-page":"180","volume-title":"Fast Software Encryption 2000","author":"V.V. Chepyzhov","year":"2001","unstructured":"V.V. Chepyzhov, T. Johansson and B. Smeets, \u201cA simple algorithm for fast correlation attacks on stream ciphers\u201d, Fast Software Encryption 2000, Lecture Notes in Computer Science, vol. 1978, pp. 180\u2013195, 2001."},{"key":"14_CR7","unstructured":"P. Chose, A. Joux and M. Mitton, \u201cFast correlation attacks: An algorithmic point of view\u201d, Advances in Cryptology-EUROCRYPT 2002, Lecture Notes in Computer cience, vol. 2332, pp. 209\u2013221, 2002."},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"J.Dj. Goli\u0107, \u201cOn linear complexity of functions of periodic GF(q) sequences\u201d, IEEE Trans. Inform. Theory, vol. 35, pp. 69\u201375, Jan. 1989.","DOI":"10.1109\/18.42178"},{"key":"14_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1007\/3-540-44598-6_19","volume-title":"Advances in Cryptology-CRYPTO 2000","author":"T. Johansson","year":"2000","unstructured":"T. Johansson and F. Jonsson, \u201cFast correlation attacks through reconstruction of linear polynomials\u201d, Advances in Cryptology-CRYPTO 2000, Lecture Notes in Computer Science, vol. 1880, pp. 300\u2013315, 2000."},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"F. Jonsson and T. Johansson, \u201cCorrelation attacks on stream ciphers over GF(2n)\u201d, 2001 IEEE Int. Symp. Inform. Theory-ISIT2001, Washington DC, June 2001, Proceedings, p. 140.","DOI":"10.1109\/ISIT.2001.936003"},{"key":"14_CR11","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/TIT.1969.1054260","volume":"IT-15","author":"J. L. Massey","year":"1969","unstructured":"J. L. Massey, \u201cShift-register synthesis and BCH decoding\u201d, IEEE Trans. Inform. Theory, vol. IT-15, pp. 122\u2013127, 1969.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"14_CR12","unstructured":"A. Menezes, P.C. van Oorschot and S.A. Vanstone, Handbook of Applied Cryptography. Boca Raton: CRC Press, 1997."},{"key":"14_CR13","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/BF02252874","volume":"1","author":"W. Meier","year":"1989","unstructured":"W. Meier and O. Staffelbach, \u201cFast correlation attacks on certain stream ciphers,\u201d Journal of Cryptology, vol. 1, pp. 159\u2013176, 1989.","journal-title":"Journal of Cryptology"},{"key":"14_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1007\/3-540-44706-7_14","volume-title":"Fast Software Encryption-FSE 2000","author":"M. J. Mihaljevi\u0107","year":"2001","unstructured":"M. J. Mihaljevi\u0107, M. P. C. Fossorier and H. Imai, \u201cA low-complexity and highperformance algorithm for the fast correlation attack\u201d, Fast Software Encryption-FSE 2000, Lecture Notes in Computer Science, vol. 1978, pp. 196\u2013212, 2001."},{"key":"14_CR15","doi-asserted-by":"publisher","first-page":"2206","DOI":"10.1109\/18.868493","volume":"46","author":"M. J. Mihaljevi\u0107","year":"2000","unstructured":"M. J. Mihaljevi\u0107 and J. Goli\u0107, \u201cA method for convergence analysis of iterative probabilistic decoding\u201d, IEEE Trans. Inform. Theory, vol. 46, pp. 2206\u20132211, m. 2000.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"14_CR16","unstructured":"M. J. Mihaljevi\u0107, M. P. C. Fossorier and H. Imai, \u201cOn decoding techniques for cryptanalysis of certain encryption algorithms\u201d, IEICE Trans. Fundamentals, vol. E84-A, pp. 919\u2013930, April 2001."},{"key":"14_CR17","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1007\/3-540-45473-X_17","volume-title":"Fast Software Encryption-FSE 2001","author":"M. J. Mihaljevi\u0107","year":"2002","unstructured":"M. J. Mihaljevi\u0107, M.P.C. Fossorier and H. Imai, \u201cFast correlation attack algorithm with the list decoding and an application\u201d, Fast Software Encryption-FSE 2001, Lecture Notes in Computer Science, vol 2355, pp. 196\u2013210, 2002."},{"key":"14_CR18","doi-asserted-by":"crossref","unstructured":"R. A. Rueppel,Analysis and Design of Stream Ciphers. Berlin: Springer-Verlag, 1986.","DOI":"10.1007\/978-3-642-82865-2"},{"key":"14_CR19","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1109\/TC.1985.1676518","volume":"C-34","author":"T. Siegenthaler","year":"1985","unstructured":"T. Siegenthaler, \u201cDecrypting a class of stream ciphers using ciphertext only\u201d, IEEE Trans. Comput., vol. C-34, pp. 81\u201385, 1985.","journal-title":"IEEE Trans. Comput"},{"key":"14_CR20","doi-asserted-by":"publisher","first-page":"776","DOI":"10.1109\/TIT.1984.1056949","volume":"IT-30","author":"T. Siegenthaler","year":"1984","unstructured":"T. Siegenthaler, \u201cCorrelation-immunity of nonlinear combining functions for cryptographic applications\u201d, IEEE Trans. Inform. Theory, vol. IT-30, pp. 776\u2013780, 1984.","journal-title":"IEEE Trans. Inform. Theory"}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36492-7_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T21:09:45Z","timestamp":1737493785000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36492-7_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540006220","9783540364924"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/3-540-36492-7_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]},"assertion":[{"value":"17 February 2003","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}