{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T05:45:22Z","timestamp":1757310322986},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540414049"},{"type":"electronic","value":"9783540444480"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/3-540-44448-3_23","type":"book-chapter","created":{"date-parts":[[2007,6,9]],"date-time":"2007-06-09T00:22:44Z","timestamp":1181348564000},"page":"303-316","source":"Crossref","is-referenced-by-count":23,"title":["Exploiting Multiples of the Connection Polynomial in Word-Oriented Stream Ciphers"],"prefix":"10.1007","author":[{"given":"Philip","family":"Hawkes","sequence":"first","affiliation":[]},{"given":"Gregory G.","family":"Rose","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2000,10,27]]},"reference":[{"key":"23_CR1","unstructured":"S. Blackburn, S. Murphy, F. Piper, and P. Wild. A SOBERing remark. Technical report, Information Security Group, Royal Holloway University of London, Egham, Surrey TW20 0EX, U.K., 1998."},{"key":"23_CR2","unstructured":"D. Bleichenbacher, W. Meier, and S Patel. Analysis of the SOBER stream cipher. Technical Report TR45.AHAG.08.30.12, TR45 Ad Hoc Authentication Group, 1999."},{"key":"23_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/3-540-48519-8_22","volume-title":"Fast Software Encryption","author":"D. Bleichenbacher","year":"1999","unstructured":"D. Bleichenbacher and S Patel. SOBER cryptanalysis. Fast Software Encryption, FSE\u201999 Lecture Notes in Computer Science, vol. 1636, L. Knudsen ed., Springer-Verlag, pages 305\u2013316, 1999."},{"key":"23_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1007\/3-540-46416-6_16","volume-title":"Advances in Cryptology, EUROCRYPT\u201991","author":"V. Chepyzhov","year":"1991","unstructured":"V. Chepyzhov and B. Smeets. On a fast correlation attack on certain stream ciphers. Advances in Cryptology, EUROCRYPT\u201991, Lecture Notes in Computer Science, vol. 547, D. W. Davies ed., Springer-Verlag, pages 176\u2013185, 1991."},{"key":"23_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1007\/3-540-48970-3_8","volume-title":"Information Security and Privacy, Fourth Australasian Conference, ACISP\u201999","author":"J. Goli\u0107","year":"1999","unstructured":"J. Goli\u0107, A. Clark, and E. Dawson. Inversion attack and branching. Information Security and Privacy, Fourth Australasian Conference, ACISP\u201999, Lecture Notes in Computer Science, vol. 1587, J. Pieprzyk, R Safavi-Naini, J. Seberry eds., Springer-Verlag, pages 88\u2013102, 1999."},{"key":"23_CR6","series-title":"Lect Notes Comput Sci","first-page":"173","volume-title":"Fast Software Encryption","author":"J. Dj. Goli\u0107","year":"1995","unstructured":"J. Dj. Goli\u0107. On the security of nonlinear filter generators. Fast Software Encryption, Lecture Notes in Computer Science, vol. 1039, D. Gollmann ed., Springer, pages 173\u2013188, 1995."},{"key":"23_CR7","unstructured":"P. Hawkes. An attack on SOBER-II. Technical report, QUALCOMM Australia, Suite 410, Birkenhead Point, Drummoyne NSW 2137, Australia, 1999."},{"key":"23_CR8","unstructured":"P. Hawkes and G. Rose. The t-class of SOBER stream ciphers. Technical report, QUALCOMM Australia, Suite 410, Birkenhead Point, Drummoyne NSW 2137, Australia, 1999. See http:\/\/www.home.aone.net.au\/qualcomm ."},{"key":"23_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39805-8_14","volume-title":"Advances in Cryptology, EUROCRYPT\u201985","author":"T. Herlestam","year":"1986","unstructured":"T. Herlestam. On functions of Linear Shift Register Sequences. Advances in Cryptology, EUROCRYPT\u201985, Lecture Notes in Computer Science, vol. 219, F. Pichler ed., Springer-Verlag, 1986."},{"key":"23_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1007\/3-540-48910-X_24","volume-title":"Advances in Cryptology, EUROCRYPT\u201999","author":"T. Johansson","year":"1999","unstructured":"T. Johansson and F J\u00f6nsson. Improved fast correlation attacks on stream ciphers via convolutional codes. Advances in Cryptology, EUROCRYPT\u201999, Lecture Notes in Computer Science, vol. 1592, J. Stern ed., Springer-Verlag, pages 347\u2013362, 1999."},{"key":"23_CR11","unstructured":"B. L\u00f6hlein. Analysis and modifications of the conditional correlation attack. 1999. Accepted at 3rd IEEE\/ITG Conference on Source and Channel Coding, 17\u201319 Jan. 2000, Munich."},{"key":"23_CR12","unstructured":"G. Rose. S32: A fast stream cipher based on linear feedback over GF(232). Technical report, QUALCOMM Australia, Suite 410, Birkenhead Point, Drummoyne NSW 2137, Australia, 1998."},{"key":"23_CR13","doi-asserted-by":"crossref","unstructured":"G. Rose. SOBER: A stream cipher based on linear feedback over GF(28). Technical report, QUALCOMM Australia, Suite 410, Birkenhead Point, Drummoyne NSW 2137, Australia, 1998. See http:\/\/www.home.aone.net.au\/qualcomm .","DOI":"10.1007\/BFb0053728"},{"key":"23_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1007\/BFb0053728","volume-title":"Information Security and Privacy, Third Australasian Conference, ACISP\u201998","author":"G. Rose","year":"1998","unstructured":"G. Rose. A stream cipher based on linear feedback over GF(28). Information Security and Privacy, Third Australasian Conference, ACISP\u201998, Lecture Notes in Computer Science, vol. 1438, C. Boyd, E. Dawson eds., Springer-Verlag, pages 135\u2013146, 1998."},{"key":"23_CR15","unstructured":"M. Zhang, C. Carroll, and A. Chan. SSC. Technical Report TR45.AHAG.99.02.09.15, TR45 Ad Hoc Authentication Group, 1999."},{"key":"23_CR16","unstructured":"M. Zhang, C. Carroll, and A. Chan. The software-oriented stream cipher SSC-II. In Proceedings of Fast Software Encryption Workshop 2000, pages 39\u201356, 2000."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 ASIACRYPT 2000"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44448-3_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T19:13:35Z","timestamp":1556478815000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44448-3_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540414049","9783540444480"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/3-540-44448-3_23","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2000]]}}}