{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,7]],"date-time":"2025-12-07T13:04:25Z","timestamp":1765112665096},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540164630"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-39799-x_20","type":"book-chapter","created":{"date-parts":[[2007,2,28]],"date-time":"2007-02-28T07:25:31Z","timestamp":1172647531000},"page":"260-272","source":"Crossref","is-referenced-by-count":39,"title":["Correlation Immunity and the Summation Generator"],"prefix":"10.1007","author":[{"given":"Rainer A.","family":"Rueppel","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"20_CR1","doi-asserted-by":"crossref","unstructured":"T. Siegenthaler, \u201cDecrypting a Class of Stream Ciphers Using Ciphertext Only\u201d, IEEE Trans. on Computers, Vol. C-33, 1984.","DOI":"10.1109\/TC.1985.1676518"},{"key":"20_CR2","unstructured":"T. Siegenthaler, \u201cCorrelation-Immunity of Nonlinear Combining Functions for Cryptographic Applications\u201d, IEEE Trans. on Info. Th., Vol. IT-31, 1985."},{"key":"20_CR3","unstructured":"Xiao Guo-zhen, J.L. Massey, \u201cA Spectral Characterization of Correlation-Immune Combining Functions\u201d, submitted to IEEE Trans. on Info. Th."},{"key":"20_CR4","doi-asserted-by":"crossref","unstructured":"V.S. Pless, \u201cEncryption Schemes for Computer Confidentiality\u201d, IEEE Trans. on Computers, Vol. C-26, Nov. 1977.","DOI":"10.1109\/TC.1977.1674759"},{"key":"20_CR5","unstructured":"T. Siegenthaler, \u201cDesign of Combiners to Prevent Divide and Conquer Attacks\u201d, Proceedings of Crypto 85, Santa Barbara, August 18\u201322, 1985."},{"key":"20_CR6","unstructured":"U. Maurer, R. Viscardi, \u201cRunning-Key Generators with Memory in the Nonlinear Combining Function\u201d, Diploma Project, Swiss Federal Institute of Technology Zurich, Dec. 1984."},{"key":"20_CR7","unstructured":"R.A. Rueppel, J.L. Massey, \u201cThe Knapsack as a Nonlinear Function\u201d, IEEE Symposium on Info. Th., Brighton, UK, June 24\u201328, 1985."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO \u201985 Proceedings"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-39799-X_20.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T21:22:37Z","timestamp":1619558557000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-39799-X_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540164630"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/3-540-39799-x_20","relation":{},"subject":[]}}