{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T14:38:38Z","timestamp":1753886318101},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540424567"},{"type":"electronic","value":"9783540446477"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-44647-8_26","type":"book-chapter","created":{"date-parts":[[2007,11,13]],"date-time":"2007-11-13T19:28:14Z","timestamp":1194982094000},"page":"440-457","source":"Crossref","is-referenced-by-count":17,"title":["Correlation Analysis of the Shrinking Generator"],"prefix":"10.1007","author":[{"given":"Jovan D.","family":"Goli\u0107","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,8,2]]},"reference":[{"key":"26_CR1","series-title":"Lect Notes Comput Sci","first-page":"22","volume-title":"Advances in Cryptology-CRYPTO\u2019 93","author":"D. Coppersmith","year":"1993","unstructured":"D. Coppersmith, H. Krawczyk, and Y. Mansour, \u201dThe shrinking generator,\u201d Advances in Cryptology-CRYPTO\u2019 93, Lecture Notes in Computer Science, vol. 773, pp. 22\u201339, 1993."},{"key":"26_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1007\/3-540-48285-7_14","volume-title":"Advances in Cryptology-EUROCRYPT\u2019 93","author":"J. Daemen","year":"1994","unstructured":"J. Daemen, R. Govaerts, and J. Vandewalle, \u201dResynchronization weakness in synchronous stream ciphers,\u201d Advances in Cryptology-EUROCRYPT\u2019 93, Lecture Notes in Computer Science, vol. 765, pp. 159\u2013167, 1994."},{"key":"26_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/BFb0000427","volume-title":"Advances in Cryptology-ASIACRYPT\u2019 94","author":"J. Dj. Goli\u0107","year":"1995","unstructured":"J. Dj. Goli\u0107, \u201dIntrinsic statistical weakness of keystream generators,\u201d Advances in Cryptology-ASIACRYPT\u2019 94, Lecture Notes in Computer Science, vol. 917, pp. 91\u2013103, 1995."},{"key":"26_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1007\/BFb0053439","volume-title":"Advances in Cryptology-EUROCRYPT\u2019 94","author":"J. Dj. Goli\u0107","year":"1995","unstructured":"J. Dj. Goli\u0107 and L. O\u2019Connor, \u201dEmbedding and probabilistic correlation attacks on clock-controlled shift registers,\u201d Advances in Cryptology-EUROCRYPT\u2019 94, Lecture Notes in Computer Science, vol. 950, pp. 230\u2013243, 1995."},{"key":"26_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"248","DOI":"10.1007\/3-540-49264-X_20","volume-title":"Advances in Cryptology-EUROCRYPT\u2019 95","author":"J. Dj. Goli\u0107","year":"1995","unstructured":"J. Dj. Goli\u0107, \u201dTowards fast correlation attacks on irregularly clocked shift registers,\u201d Advances in Cryptology-EUROCRYPT\u2019 95, Lecture Notes in Computer Science, vol. 921, pp. 248\u2013262, 1995."},{"key":"26_CR6","doi-asserted-by":"crossref","unstructured":"J. Dj. Goli\u0107 and R. Menicocci, \u201dEdit probability correlation attack on the alternating step generator,\u201d Sequences and their Applications-SETA\u2019 98, Discrete Mathematics and Theoretical Computer Science, C. Ding, T. Helleseth, and H. Niederreiter eds., Springer-Verlag, pp. 213\u2013227, 1999.","DOI":"10.1007\/978-1-4471-0551-0_15"},{"key":"26_CR7","doi-asserted-by":"crossref","unstructured":"J. Dj. Goli\u0107, \u201dIterative probabilistic decoding and parity checks with memory,\u201d Electronics Letters, vol. 35(20), pp. 1721\u20131723, Sept. 1999.","DOI":"10.1049\/el:19991146"},{"key":"26_CR8","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/s001459910009","volume":"13","author":"J. Dj. Goli\u0107","year":"2000","unstructured":"J. Dj. Goli\u0107, M. Salmasizadeh, and E. Dawson, \u201dFast correlation attacks on the summation generator,\u201d Journal of Cryptology, vol. 13, pp. 245\u2013262, 2000.","journal-title":"Journal of Cryptology"},{"key":"26_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1007\/3-540-49649-1_27","volume-title":"Advances in Cryptology-ASIACRYPT\u2019 98","author":"T. Johansson","year":"1998","unstructured":"T. Johansson, \u201dReduced complexity correlation attacks on two clock-controlled generators,\u201d Advances in Cryptology-ASIACRYPT\u2019 98, Lecture Notes in Computer Science, vol. 1514, pp. 342\u2013357, 1998."},{"key":"26_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1007\/3-540-48910-X_24","volume-title":"Advances in Cryptology-EUROCRYPT\u2019 99","author":"T. Johansson","year":"1999","unstructured":"T. Johansson and F. Jonnson, \u201dImproved fast correlation attacks on stream ciphers via convolutional codes,\u201d Advances in Cryptology-EUROCRYPT\u2019 99, Lecture Notes in Computer Science, vol. 1592, pp. 347\u2013362, 1999."},{"key":"26_CR11","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/BF02252874","volume":"1","author":"W. Meier","year":"1989","unstructured":"W. Meier and O. Staffelbach, \u201dFast correlation attacks on certain stream ciphers,\u201d Journal of Cryptology, vol. 1, pp. 159\u2013176, 1989.","journal-title":"Journal of Cryptology"},{"key":"26_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"527","DOI":"10.1007\/3-540-46416-6_48","volume-title":"Advances in Cryptology-EUROCRYPT\u2019 91","author":"M. J. Mihaljevi\u0107","year":"1991","unstructured":"M. J. Mihaljevi\u0107 and J. Dj. Goli\u0107, \u201dA comparison of cryptanalytic principles based on iterative error-correction,\u201d Advances in Cryptology-EUROCRYPT\u2019 91, Lecture Notes in Computer Science, vol. 547, pp. 527\u2013531, 1991."},{"key":"26_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1007\/3-540-47555-9_11","volume-title":"Advances in Cryptology-EUROCRYPT\u2019 92","author":"M. J. Mihaljevi\u0107","year":"1993","unstructured":"M. J. Mihaljevi\u0107 and J. Dj. Goli\u0107, \u201dConvergence of a Bayesian iterative error-correction procedure on a noisy shift register sequence,\u201d Advances in Cryptology-EUROCRYPT\u2019 92, Lecture Notes in Computer Science, vol. 658, pp. 124\u2013137, 1993."},{"key":"26_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1007\/3-540-44706-7_14","volume-title":"Fast Software Encryption-New York 2000","author":"M. J. Mihaljevi\u0107","year":"2001","unstructured":"M. J. Mihaljevi\u0107, M. P. C. Fossorier, and H. Imai, \u201dA low-complexity and high-performance algorithm for the fast correlation attack,\u201d Fast Software Encryption-New York 2000, Lecture Notes in Computer Science, vol. 1978, pp. 196\u2013212, 2001."},{"key":"26_CR15","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/BFb0053729","volume-title":"Information Security and Privacy-Brisbane\u2019 98","author":"L. Simpson","year":"1998","unstructured":"L. Simpson, J. Dj. Goli\u0107, and E. Dawson, \u201dA probabilistic correlation attack on the shrinking generator,\u201d Information Security and Privacy-Brisbane\u2019 98, Lecture Notes in Computer Science, vol. 1438, pp. 147\u2013158, 1998."},{"key":"26_CR16","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/S0020-0190(99)00045-9","volume":"70","author":"L. Simpson","year":"1999","unstructured":"L. Simpson, J. Dj. Goli\u0107, M. Salmasizadeh, and E. Dawson, \u201dA fast correlation attack on multiplexer generators,\u201d Information Processing Letters, vol. 70, pp. 89\u201393, 1999.","journal-title":"Information Processing Letters"},{"key":"26_CR17","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1007\/0-387-34805-0_16","volume-title":"Advances in Cryptology-CRYPTO\u2019 89","author":"K. Zeng","year":"1990","unstructured":"K. Zeng, C. H. Yang, and T. R. N. Rao, \u201dOn the linear consistency test (LCT) in cryptanalysis with applications,\u201d Advances in Cryptology-CRYPTO\u2019 89, Lecture Notes in Computer Science, vol. 435, pp. 164\u2013174, 1990."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO 2001"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44647-8_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,4]],"date-time":"2019-05-04T10:21:58Z","timestamp":1556965318000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44647-8_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540424567","9783540446477"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/3-540-44647-8_26","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]}}}