{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:39:04Z","timestamp":1725489544666},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540602217"},{"type":"electronic","value":"9783540447504"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1995]]},"DOI":"10.1007\/3-540-44750-4_12","type":"book-chapter","created":{"date-parts":[[2007,8,16]],"date-time":"2007-08-16T08:39:53Z","timestamp":1187253593000},"page":"148-156","source":"Crossref","is-referenced-by-count":10,"title":["On the Security of the Gollmann Cascades"],"prefix":"10.1007","author":[{"given":"Sang-Joon","family":"Park","sequence":"first","affiliation":[]},{"given":"Sang-Jin","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Seung-Cheol","family":"Goh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,13]]},"reference":[{"key":"12_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1007\/3-540-39757-4_10","volume-title":"Advances in Cryptology-Eurocrypt\u201984","author":"D. Gollmann","year":"1985","unstructured":"Gollmann, D.: Pseudorandom Properties of Cascaded Connections of Clock Controlled Shift Registers, Advances in Cryptology-Eurocrypt\u201984, Lecture notes in Computer Science 209, (1985) 93\u201398"},{"key":"12_CR2","series-title":"Lect Notes Comput Sci","first-page":"331","volume-title":"Advances in Cryptology-Eurocrypt\u201988","author":"W. G. Chambers","year":"1989","unstructured":"Chambers, W. G., Gollmann, D.: Lock in Effect in Cascades of Clock Controlled Shift Register, Advances in Cryptology-Eurocrypt\u201988, Lecture notes in Computer Science 330, (1989) 331\u2013343"},{"issue":"1","key":"12_CR3","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/BF00191322","volume":"5","author":"W. Meier","year":"1992","unstructured":"Meier, W., Staffelbach, O.: Correlation Properties of Combiners with Memory in Stream Ciphers, Journal of Cryptology, 5, No. 1, (1992) 67\u201386","journal-title":"Journal of Cryptology"},{"key":"12_CR4","unstructured":"Menicocci, R.: Cryptanalysis of a Two-Stage Gollmann Cascade Generator, Proc. the 3rd Symposium of State and Progress of Research in Cryptography, Rome, (1993) 62\u201369"},{"key":"12_CR5","unstructured":"Menicocci, R.: Short Gollmann Cascade Generator May Be Insecure, presented at Fourth IMA Conf. on Cryptography and Coding, (1993)"},{"key":"12_CR6","unstructured":"Beker, H., Piper, F,: Cipher Systems: The Protection of Communications, Wiley-interscience, (1982)"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPT0\u2019 95"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44750-4_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,21]],"date-time":"2019-02-21T22:46:17Z","timestamp":1550789177000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44750-4_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995]]},"ISBN":["9783540602217","9783540447504"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/3-540-44750-4_12","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1995]]}}}