{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T14:24:59Z","timestamp":1775053499481,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540006220","type":"print"},{"value":"9783540364924","type":"electronic"}],"license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36492-7_5","type":"book-chapter","created":{"date-parts":[[2007,10,23]],"date-time":"2007-10-23T19:36:10Z","timestamp":1193168170000},"page":"47-61","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":124,"title":["A New Version of the Stream Cipher SNOW"],"prefix":"10.1007","author":[{"given":"Patrik","family":"Ekdahl","sequence":"first","affiliation":[]},{"given":"Thomas","family":"Johansson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,2,17]]},"reference":[{"key":"5_CR1","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology-CRYPTO 2002","author":"D. Coppersmith","year":"2002","unstructured":"D. Coppersmith, S. Halevi, C. Jutla, \u201cCryptanalysis of stream ciphers with linear masking\u201d, To appear in Advances in Cryptology-CRYPTO 2002, Lecture Notes in Computer Science, Springer, 2002."},{"key":"5_CR2","series-title":"Lect Notes Comput Sci","first-page":"195","volume-title":"Fast Software Encryption (FSE) 2002","author":"D. Coppersmith","year":"2002","unstructured":"D. Coppersmith, S. Halevi, C. Jutla, \u201cScream: a software-efficient stream cipher\u201d, In Fast Software Encryption (FSE) 2002, Lecture Notes in Computer Science, vol. 2365, Springer 2002, 195\u2013209."},{"key":"5_CR3","unstructured":"D. Coppersmith, P. Rogaway, \u201cSoftware-efficient pseudorandom function and the use thereof for encryption\u201d, US Patent 5,454,039, 1995."},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"J. Daemen, V. Rijmen, \u201cThe design of Rijndael\u201d, Springer Verlag Series on Information Security and Cryptography, Springer Verlag, 2002, ISBN 3-540-42580-2.","DOI":"10.1007\/978-3-662-04722-4"},{"key":"5_CR5","unstructured":"P. Ekdahl, T. Johansson, \u201cSNOW-a new stream cipher\u201d, Proceedings of first NESSIE Workshop, Heverlee, Belgium, 2000."},{"key":"5_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1007\/3-540-45661-9_16","volume-title":"Fast Software Encryption (FSE) 2002","author":"P. Ekdahl","year":"2002","unstructured":"P. Ekdahl, T. Johansson, \u201cDistinguishing attacks on SOBER\u201d, In Fast Software Encryption (FSE) 2002, Lecture Notes in Computer Science, vol. 2365, Springer 2002, 210\u2013224."},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"P. Hawkes, \u201cGuess-and-determine attacks on SNOW\u201d, private correspondence, 2002.","DOI":"10.1007\/3-540-36492-7_4"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"P. Hawkes, G. Rose, \u201cGuess-and-determine attacks on SNOW\u201d, Preproceedings of Selected Areas in Cryptography (SAC), August 2002, St John\u2019s, Newfoundland, Canada.","DOI":"10.1007\/3-540-36492-7_4"},{"key":"5_CR9","unstructured":"P. Hawkes, G. Rose \u201cPrimitive Specification and supportion documentation for SOBER-t16 submission to NESSIE\u201d, Proceedings of first NESSIE Workshop, Heverlee, Belgium, 2000."},{"key":"5_CR10","unstructured":"P. Hawkes, G. Rose \u201cPrimitive Specification and supportion documentation for SOBER-t32 submission to NESSIE\u201d, Proceedings of first NESSIE Workshop, Heverlee, Belgium, 2000."},{"key":"5_CR11","series-title":"Lect Notes Comput Sci","first-page":"327","volume-title":"Analysis methods for (alleged) RC4","author":"L. Knudsen","year":"1988","unstructured":"L. Knudsen, W. Meier, B. Preneel, V. Rijmen, S. Verdoolaege, \u201cAnalysis methods for (alleged) RC4\u201d, Lecture Notes in Computer Science, vol. 1514, pp. 327\u2013341., (Asiacrypt\u201998)."},{"key":"5_CR12","series-title":"Lect Notes Comput Sci","volume-title":"Fast Software Encryption (FSE) 2001","author":"I. Mantin","year":"2002","unstructured":"I. Mantin, A. Shamir, \u201cA practical attack on RC4\u201d, In Fast Software Encryption (FSE) 2001, Lecture Notes in Computer SCience, vol. 2355, Springer 2002."},{"key":"5_CR13","unstructured":"A. Menezes, P. van Oorschot, S. Vanstone, Handbook of Applied Cryptography, CRC Press, 1997."},{"key":"5_CR14","unstructured":"R. Rivest, \u201cThe RC4 encryption algorithm\u201d, RSA Data Security, Inc. Mar. 1992."},{"issue":"4","key":"5_CR15","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/s001459900048","volume":"11","author":"P. Rogaway","year":"1998","unstructured":"P. Rogaway, D. Coppersmith, \u201cA software optimized encryption algorithm\u201d. Journal of Cryptology, 11(4):273\u2013287, 1998.","journal-title":"Journal of Cryptology"},{"key":"5_CR16","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/3-540-45661-9_14","volume-title":"Fast Software Encryption (FSE) 2002","author":"D. Watanabe","year":"2002","unstructured":"D. Watanabe, S. Furuya, H. Yoshida, B. Preneel, \u201cA new keystream generator MUGI\u201d, In Fast Software Encryption (FSE) 2002, Lecture Notes in Computer Science, vol. 2365, Springer 2002, 179\u2013194."},{"key":"5_CR17","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/3-540-44706-7_3","volume-title":"Fast Software Encryption (FSE) 2000","author":"M. Zhang","year":"2001","unstructured":"M. Zhang, C. Caroll, A. Chan, \u201cThe software-oriented stream cipher SSC2\u201d, In Fast Software Encryption (FSE) 2000, Lecture Notes in Computer Science, vol. 1978, Springer 2001, 31\u201348."}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36492-7_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,16]],"date-time":"2020-01-16T03:03:12Z","timestamp":1579143792000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36492-7_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540006220","9783540364924"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/3-540-36492-7_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2003]]},"assertion":[{"value":"17 February 2003","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}