{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:41:20Z","timestamp":1725493280654},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540006220"},{"type":"electronic","value":"9783540364924"}],"license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36492-7_16","type":"book-chapter","created":{"date-parts":[[2007,10,23]],"date-time":"2007-10-23T23:36:10Z","timestamp":1193182570000},"page":"232-249","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["A New Cryptanalytic Attack for PN-generators Filtered by a Boolean Function"],"prefix":"10.1007","author":[{"given":"Sabine","family":"Leveiller","sequence":"first","affiliation":[]},{"given":"Gilles","family":"Z\u00e9mor","sequence":"additional","affiliation":[]},{"given":"Philippe","family":"Guillot","sequence":"additional","affiliation":[]},{"given":"Joseph","family":"Boutros","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,2,17]]},"reference":[{"key":"16_CR1","unstructured":"R.J. Anderson, \u201cSearching for the optimum correlation attack,\u201d Fast Software Encryption-Leuven 94, Lectures Notes in Computer Science, vol. 1008, pp. 137\u2013143, Springer-Verlag, 1995."},{"key":"16_CR2","unstructured":"C. Berrou, A. Glavieux and P. Thitimajshima: \u201cNear Shannon limit error-correcting coding and decoding: turbo-codes,\u201d Proceedings of ICC\u201993, Geneva, pp. 1064\u20131070, May 1993."},{"key":"16_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1007\/3-540-45539-6_40","volume-title":"Advances in Cryptology-EUROCRYPT 2000","author":"A. Canteaut","year":"2000","unstructured":"A. Canteaut and M. Trabbia: \u201cImproved fast correlation attacks using parity-check equations of weight 4 and 5,\u201d Advances in Cryptology-EUROCRYPT 2000, Lecture Notes in Computer Science, vol. 1807, pp. 573\u2013588, Springer Verlag, 2000."},{"key":"16_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/3-540-44706-7_13","volume-title":"Fast Software Encryption 2000","author":"V. V. Chepyzhov","year":"2001","unstructured":"V. V. Chepyzhov, T. Johansson and B. Smeets,\u201c A simple algorithm for fast correlation attacks on stream ciphers,\u201dFast Software Encryption 2000, Lecture Notes in Computer Science, vol. 1978, pp. 181\u2013195, Springer Verlag, 2001."},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"T.M. Cover and J.A. Thomas: Elements of information theory. Wiley series in Telecommunications, 1991.","DOI":"10.1002\/0471200611"},{"key":"16_CR6","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/4347.001.0001","volume-title":"Low Density Parity check codes","author":"R.G. Gallager","year":"1963","unstructured":"R.G. Gallager: Low Density Parity check codes. MIT Press, Cambridge, MA, 1963."},{"key":"16_CR7","doi-asserted-by":"publisher","first-page":"1981","DOI":"10.1049\/el:19961338","volume":"32","author":"J.Dj. Golic","year":"1996","unstructured":"J.Dj. Golic, \u201cComputation of low-weight parity-check polynomials,\u201d Electronics Letters, vol. 32, pp. 1981\u20131982, 1996.","journal-title":"Electronics Letters"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"J.Dj. Golic, A. Clark and E. Dawson, \u201cGeneralized Inversion Attack on Nonlinear Filter Generators,\u201d IEEE Transactions on computers, vol.49, No. 10, October 2000.","DOI":"10.1109\/12.888045"},{"key":"16_CR9","unstructured":"S.W. Golomb: Shift register sequences. Holden-Day, San Francisco, 1967."},{"key":"16_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1007\/3-540-48910-X_24","volume-title":"Advances in Cryptology-EUROCRYPT\u201999","author":"T. Johansson","year":"1999","unstructured":"T. Johansson and F. J\u00f6nsson: \u201cImproved fast correlation attack on stream ciphers via convolutional codes,\u201d Advances in Cryptology-EUROCRYPT\u201999, Lecture Notes in Computer Science, vol. 1592, pp. 347\u2013362, Springer Verlag, 1999."},{"key":"16_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/3-540-48405-1_12","volume-title":"Advances in Cryptology-CRYPTO\u201999","author":"T. Johansson","year":"1999","unstructured":"T. Johansson and F. J\u00f6nsson: \u201cFast correlation attacks based on turbo code techniques,\u201d Advances in Cryptology-CRYPTO\u201999, in Lecture Notes in Computer Science, vol. 1666, pp. 181\u2013197, Springer Verlag, 1999."},{"key":"16_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1007\/3-540-44598-6_19","volume-title":"Advances in Cryptology-CRYPTO\u20192000","author":"T. Johansson","year":"2000","unstructured":"T. Johansson and F. J\u00f6nsson, \u201cFast correlation attacks through reconstruction of linear polynomials,\u201d Advances in Cryptology-CRYPTO\u20192000, Lecture Notes in Computer Science, vol. 1880, pp. 300\u2013315, Springer Verlag, 2000."},{"key":"16_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"402","DOI":"10.1007\/3-540-45325-3_38","volume-title":"Cryptanalysis of nonlinear filter generators with 0, 1-metric Viterbi decoding","author":"S. Leveiller","year":"2001","unstructured":"S. Leveiller, J.J. Boutros, P. Guillot, G. Z\u00e9mor, \u201cCryptanalysis of nonlinear filter generators with 0, 1-metric Viterbi decoding,\u201d IMA International Conference 2001, Lecture Notes in Computer Science, vol. 2260, pp. 402\u2013414, Springer Verlag, 2001."},{"key":"16_CR14","doi-asserted-by":"crossref","unstructured":"D.J.C MacKay: \u201cGood Error-Correcting Codes based on Very Sparse Matrices,\u201d IEEE Transactions on Information Theory, vol. 45, March 1999.","DOI":"10.1109\/18.748992"},{"key":"16_CR15","doi-asserted-by":"crossref","unstructured":"J.L. Massey: Threshold Decoding. MIT Press, Cambridge, MA, 1963.","DOI":"10.21236\/AD0407946"},{"issue":"3","key":"16_CR16","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/BF02252874","volume":"1","author":"Willi Meier","year":"1989","unstructured":"W. Meier and O. Staffelbach: \u201c Fast correlation attack on certain stream ciphers,\u201d Journal of Cryptology, pp. 159\u2013176, 1989.","journal-title":"Journal of Cryptology"},{"key":"16_CR17","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"549","DOI":"10.1007\/3-540-46885-4_53","volume-title":"Advances in Cryptology-EUROCRYPT\u201989","author":"W. Meier","year":"1990","unstructured":"W. Meier and O. Staffelbach: \u201cNonlinearity Criteria for Cryptographic Functions,\u201d Advances in Cryptology-EUROCRYPT\u201989, Lecture Notes in Computer Science, vol. 434, pp. 549\u2013562, Springer Verlag, 1990."},{"key":"16_CR18","unstructured":"M.J. Mihaljevi\u0107, M.P.C. Fossorier and H. Imai, \u201cOn decoding techniques for cryptanalysis of certain encryption algorithms\u201d, IEICE Transactions on Fundamentals, vol. E84-A, pp. 919\u2013930, Apr. 2001."},{"key":"16_CR19","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1007\/3-540-44706-7_14","volume-title":"Fast Software Encryption 2000","author":"M.J. Mihaljevi\u0107","year":"2001","unstructured":"M.J. Mihaljevi\u0107, M.P.C. Fossorier and H. Imai, \u201cA low-complexity and highperformance algorithm for the fast correlation attack\u201d, Fast Software Encryption 2000, Lecture Notes in Computer Science, vol. 1978, pp. 196\u2013212, Springer Verlag, 2001."},{"key":"16_CR20","unstructured":"M.J. Mihaljevi\u0107, M.P.C. Fossorier and H. Imai, \u201cFast correlation attack algorithm with the list decoding and an application\u201d, Fast Software Encryption 2001, LectureNotes in Computer Science, vol. 2355, pp. 196\u2013210, Springer Verlag, 2002."},{"key":"16_CR21","doi-asserted-by":"crossref","unstructured":"R.A. Rueppel: Analysis and Design of Stream Ciphers. Berlin: Springer-Verlag, 1986.","DOI":"10.1007\/978-3-642-82865-2"},{"key":"16_CR22","doi-asserted-by":"publisher","first-page":"776","DOI":"10.1109\/TIT.1984.1056949","volume":"IT-30","author":"T. Siegenthaler","year":"1984","unstructured":"T. Siegenthaler: \u201cCorrelation-Immunity of Nonlinear Combining Functions for Cryptographic Applications,\u201d IEEE Transactions on Information Theory, vol. IT-30, pp. 776\u2013780, 1984.","journal-title":"IEEE Transactions on Information Theory"},{"key":"16_CR23","doi-asserted-by":"crossref","unstructured":"R.M. Tanner: \u201cA recursive approach to low complexity codes,\u201d IEEE Transactions on Information Theory, vol. IT-27, Sept 1981.","DOI":"10.1109\/TIT.1981.1056404"},{"key":"16_CR24","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"284","DOI":"10.1007\/978-3-540-47942-0_24","volume-title":"ICISC\u201999","author":"Y. Zheng","year":"1999","unstructured":"Y. Zheng and X.-M. Zhang: \u201clateaued Functions,\u201d 2nd International Conference on Information and Communications Security, ICISC\u201999, Lecture Notes in Computer Science, vol. 1758, pp. 284\u2013300, Springer-Verlag, 1999."}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36492-7_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,27]],"date-time":"2020-04-27T10:14:44Z","timestamp":1587982484000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36492-7_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540006220","9783540364924"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/3-540-36492-7_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]},"assertion":[{"value":"17 February 2003","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}