{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:38:11Z","timestamp":1725485891935},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540007166"},{"type":"electronic","value":"9783540365525"}],"license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36552-4_14","type":"book-chapter","created":{"date-parts":[[2007,6,6]],"date-time":"2007-06-06T19:22:37Z","timestamp":1181157757000},"page":"200-212","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["On the Efficiency of the Clock Control Guessing Attack"],"prefix":"10.1007","author":[{"given":"Erik","family":"Zenner","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,3,14]]},"reference":[{"key":"14_CR1","unstructured":"S. Babbage. Cryptanalysis of LILI-128. Technical report, Nessie project, 2001. \n                    http:\/\/www.cosic.esat.kuleuven.ac.be\/nessie\/reports\/\n                    \n                  . 211"},{"key":"14_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1007\/3-540-39757-4_9","volume-title":"Advances in Cryptology-Eurocrypt\u2019 84","author":"T. Beth","year":"1985","unstructured":"T. Beth and F. Piper. The stop-and-go generator. In T. Beth, N. Cot, and I. Ingemarsson, editors, Advances in Cryptology-Eurocrypt\u2019 84, volume 209 of LNCS, pages 88\u201392. Springer, 1985. 209"},{"key":"14_CR3","unstructured":"M. Briceno, I. Goldberg, and D. Wagner. A pedagogical implementation of A5\/1. \n                    http:\/\/www.scard.org\/gsm\/a51.html\n                    \n                  . 207"},{"key":"14_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1007\/3-540-48329-2_3","volume-title":"Advances in Cryptology-Eurocrypt\u2019 93","author":"D. Coppersmith","year":"1993","unstructured":"D. Coppersmith, H. Krawczyk, and Y. Mansour. The shrinking generator. In D.R. Stinson, editor, Advances in Cryptology-Eurocrypt\u2019 93, volume 773 of LNCS, pages 22\u201339, Berlin, 1993. Springer. 202, 210"},{"issue":"4","key":"14_CR5","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1080\/0161-119491882757","volume":"18","author":"E. Dawson","year":"1994","unstructured":"E. Dawson and A. Clark. Divide and conquer attacks on certain classes of stream ciphers. Cryptologia, 18(4):25\u201340, 1994. 202","journal-title":"Cryptologia"},{"key":"14_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/3-540-69053-0_17","volume-title":"Advances in Cryptology-Eurocrypt\u2019 97","author":"J.D. Goli\u0107","year":"1997","unstructured":"J.D. Goli\u0107. Cryptanalysis of alleged A5 stream cipher. In W. Fumy, editor, Advances in Cryptology-Eurocrypt\u2019 97, volume 1233 of LNCS, pages 239\u2013255, Berlin, 1997. Springer. 203, 207"},{"issue":"3","key":"14_CR7","doi-asserted-by":"publisher","first-page":"1081","DOI":"10.1109\/18.841189","volume":"46","author":"J.D. Goli\u0107","year":"2000","unstructured":"J.D. Goli\u0107. Cryptanalysis of three mutually clock-controlled stop\/go shift registers. IEEE Trans. Inf. Theory, 46(3):1081\u20131090, May 2000. 201, 207, 208","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"4","key":"14_CR8","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1109\/49.17716","volume":"7","author":"D. Gollmann","year":"1989","unstructured":"D. Gollmann and W. Chambers. Clock-controlled shift registers: A review. IEEE J. Selected Areas Comm., 7(4):525\u2013533, May 1989. 210","journal-title":"IEEE J. Selected Areas Comm."},{"key":"14_CR9","unstructured":"S. Golomb. Shift Register Sequences. Aegean Park Press, Laguna Hills (CA), revised edition, 1982. 200"},{"key":"14_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1007\/BFb0046097","volume-title":"Advances in Cryptology-Eurocrypt\u2019 87","author":"C. G\u00fcnther","year":"1988","unstructured":"C. G\u00fcnther. Alternating step generators controlled by de Bruijn sequences. In D. Chaum and W. Price, editors, Advances in Cryptology-Eurocrypt\u2019 87, volume 304 of LNCS, pages 88\u201392. Springer, 1988. 202"},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"F. J\u00f6nsson and T. Johansson. A fast correlation attack on LILI-128. Technical report, Lund University, Sweden, 2001. 211","DOI":"10.1016\/S0020-0190(01)00208-3"},{"key":"14_CR12","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology-Eurocrypt\u2019 02","author":"M. Krause","year":"2002","unstructured":"M. Krause. BDD-based cryptanalysis of keystream generators. In L.T Knudsen, editor, Advances in Cryptology-Eurocrypt\u2019 02, LNCS. Springer, 2002. 205"},{"key":"14_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/BFb0053436","volume-title":"Advances in Cryptology-Eurocrypt\u2019 94","author":"W. Meier","year":"1995","unstructured":"W. Meier and O. Staffelbach. The self-shrinking generator. In A. De Santis, editor, Advances in Cryptology-Eurocrypt\u2019 94, volume 950 of LNCS, pages 205\u2013214, Berlin, 1995. Springer. 211"},{"key":"14_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"318","DOI":"10.1007\/3-540-44499-8_25","volume-title":"Software-hardware trade-offs: Application to A5\/1 cryptanalysis","author":"T. Pornin","year":"2000","unstructured":"T. Pornin and J. Stern. Software-hardware trade-offs: Application to A5\/1 cryptanalysis. In \u00c7. Ko\u00c7 and C. Paar, editors, Proc. CHES 2000, volume 1965 of LNCS, pages 318\u2013327. Springer, 2000. 201, 207"},{"key":"14_CR15","unstructured":"R. Rueppel. Stream ciphers. In G. Simmons, editor, Contemporary Cryptology-The Science of Information Integrity, pages 65\u2013134. IEEE Press, 1992. 201"},{"key":"14_CR16","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1007\/3-540-45661-9_18","volume-title":"A time-memory tradeoff attack against LILI-128","author":"M.-J. Saarinen","year":"2002","unstructured":"M.-J. Saarinen. A time-memory tradeoff attack against LILI-128. In J. Daemen and V. Rijmen, editors, Proc. FSE 2002, volume 2365 of LNCS, pages 231\u2013236. Springer, 2002. 211"},{"key":"14_CR17","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"248","DOI":"10.1007\/3-540-44983-3_18","volume-title":"LILI keystream generator","author":"L. Simpson","year":"2001","unstructured":"L. Simpson, E. Dawson, J. Goli\u0107, and W. Millan. LILI keystream generator. In D. Stinson and S. Tavares, editors, Proc. SAC 2000, volume 2012 of LNCS, pages 248\u2013261. Springer, 2001. 211"},{"key":"14_CR18","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1007\/0-387-34805-0_16","volume-title":"Advances in Cryptology-Crypto\u2019 89","author":"K. Zeng","year":"1990","unstructured":"K. Zeng, C. Yang, and Y. Rao. On the linear consistency test (LCT) in cryptanalysis with applications. In G. Brassard, editor, Advances in Cryptology-Crypto\u2019 89, volume 435 of LNCS, pages 164\u2013174. Springer, 1990. 201, 202, 203"},{"key":"14_CR19","unstructured":"E. Zenner. Kryptographische Protokolle im GSM-Standard-Beschreibung und Kryptanalyse. Master\u2019s thesis, University of Mannheim, 1999. 201, 207"},{"key":"14_CR20","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1007\/3-540-47719-5_4","volume-title":"Improved cryptanalysis of the self-shrinking generator","author":"E. Zenner","year":"2001","unstructured":"E. Zenner, M. Krause, and S. Lucks. Improved cryptanalysis of the self-shrinking generator. In V. Varadharajan and Y. Mu, editors, Proc. ACISP\u2019 01, volume 2119 of LNCS, pages 21\u201335. Springer, 2001. 203, 211"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology \u2014 ICISC 2002"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36552-4_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T09:45:01Z","timestamp":1558259101000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36552-4_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540007166","9783540365525"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/3-540-36552-4_14","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]},"assertion":[{"value":"14 March 2003","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}