{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:55:54Z","timestamp":1725558954409},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540191025"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-39118-5_4","type":"book-chapter","created":{"date-parts":[[2010,7,13]],"date-time":"2010-07-13T11:51:38Z","timestamp":1279021898000},"page":"25-35","source":"Crossref","is-referenced-by-count":2,"title":["Some Remarks on The Cross Correlation Analysis of Pseudo Random Generators"],"prefix":"10.1007","author":[{"given":"Sibylle","family":"Mund","sequence":"first","affiliation":[]},{"given":"Dieter","family":"Gollmann","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Beth","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","unstructured":"K.G. Beauchamp, \u201cApplications of Walsh and Related Functions\u201d, Academic Press, 1984"},{"key":"4_CR2","volume-title":"Kryptographie","author":"T. Beth","year":"1983","unstructured":"T. Beth, P. He\u00df, K. Wirl. \u201cKryptographie\u201d, Teubner, Stuttgart. 1983"},{"key":"4_CR3","volume-title":"Verfahren der Schnellen Fourier-Transformation","author":"T. Beth","year":"1984","unstructured":"T. Beth, \u201cVerfahren der Schnellen Fourier-Transformation\u201d, Teubner, Stuttgart. 1984"},{"key":"4_CR4","series-title":"Lect Notes Comput Sci","first-page":"3","volume-title":"Structures in the S-Boxes of the DES (extended abstract)","author":"E.F. Brickell","year":"1987","unstructured":"E.F. Brickell, J.H. Moore, M.R. Purtill, \u201cStructures in the S-Boxes of the DES (extended abstract)\u201d, Springer, LNCS 263, pp.3\u20138, 1987"},{"key":"4_CR5","volume-title":"Cryptography, a Primer","author":"A.G. Konheim","year":"1981","unstructured":"A.G. Konheim, \u201cCryptography, a Primer\u201d, Wiley, New York, 1981"},{"key":"4_CR6","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-82865-2","volume-title":"Analysis and Design of Stream Ciphers","author":"R.A. Rueppel","year":"1986","unstructured":"R.A. Rueppel, \u201cAnalysis and Design of Stream Ciphers\u201d, Springer, Heidelberg. 1986"},{"issue":"1","key":"4_CR7","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1109\/TC.1985.1676518","volume":"C-34","author":"T. Siegenthaler","year":"1985","unstructured":"T. Siegenthaler, \u201cDecrypting a Class of Stream Ciphers Using Ciphertext Only\u201d, IEEE Trans.Comp.,Vol. C-34. No.1, pp.81\u201385, 1985","journal-title":"IEEE Trans.Comp."},{"key":"4_CR8","unstructured":"Guo-Zhen Xiao. J.L. Massey, \u201cA Spectral Approach to Correlation-Immune Combining Functions\u201d, to appear"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201987"],"original-title":[],"language":"en","deposited":{"date-parts":[[2019,2,16]],"date-time":"2019-02-16T08:32:37Z","timestamp":1550305957000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-39118-5_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540191025"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/3-540-39118-5_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}