{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:12:36Z","timestamp":1725484356864},"publisher-location":"Berlin, Heidelberg","reference-count":5,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540438618"},{"type":"electronic","value":"9783540454502"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45450-0_12","type":"book-chapter","created":{"date-parts":[[2007,5,19]],"date-time":"2007-05-19T16:53:10Z","timestamp":1179593590000},"page":"154-158","source":"Crossref","is-referenced-by-count":1,"title":["Cryptanalysis of Stream Cipher COS (2, 128) Mode I"],"prefix":"10.1007","author":[{"given":"Hongjun","family":"Wu","sequence":"first","affiliation":[]},{"given":"Feng","family":"Bao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,6,21]]},"reference":[{"key":"12_CR1","unstructured":"S.H. Babbage, \u201cThe COS Stream Ciphers are Extremely Weak\u201d, \n                    http:\/\/eprint.iacr.org\/2001\/078\/"},{"key":"12_CR2","unstructured":"S.H. Babbage, \u201cCryptanalysis of the COS (2, 128) Stream Ciphers\u201d, \n                    http:\/\/eprint.iacr.org\/2001\/106\/"},{"key":"12_CR3","unstructured":"E. Filiol and C. Fontaine, \u201cA New Ultrafast Stream Cipher Design: COS Ciphers\u201d, \n                    http:\/\/www-rocq.inria.fr\/codes\/Eric.Filiol\/English\/COS\/COS.html"},{"key":"12_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1007\/3-540-45325-3_9","volume-title":"Proceedings of the 8th IMA Conference on Cryptography and Coding","author":"E. Filiol","year":"2001","unstructured":"E. Filiol and C. Fontaine, \u201cA New Ultrafast Stream Cipher Design: COS Ciphers\u201d, in Proceedings of the 8th IMA Conference on Cryptography and Coding, LNCS 2260, pp. 85\u201398."},{"key":"12_CR5","unstructured":"E. Filiol, \u201cCOS Ciphers are not \u201cextremely weak\u201d ! \u2014 the Design Rationale of COS Ciphers\u201d, \n                    http:\/\/eprint.iacr.org\/2001\/080\/"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45450-0_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,16]],"date-time":"2019-02-16T15:26:23Z","timestamp":1550330783000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45450-0_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540438618","9783540454502"],"references-count":5,"URL":"https:\/\/doi.org\/10.1007\/3-540-45450-0_12","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}