{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,12]],"date-time":"2025-04-12T05:26:34Z","timestamp":1744435594074},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540438618"},{"type":"electronic","value":"9783540454502"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45450-0_3","type":"book-chapter","created":{"date-parts":[[2007,5,19]],"date-time":"2007-05-19T20:53:10Z","timestamp":1179607990000},"page":"25-39","source":"Crossref","is-referenced-by-count":20,"title":["The LILI-II Keystream Generator"],"prefix":"10.1007","author":[{"given":"A.","family":"Clark","sequence":"first","affiliation":[]},{"given":"Ed","family":"Dawson","sequence":"additional","affiliation":[]},{"given":"J.","family":"Fuller","sequence":"additional","affiliation":[]},{"given":"J.","family":"Goli\u0107","sequence":"additional","affiliation":[]},{"given":"H -J.","family":"Lee","sequence":"additional","affiliation":[]},{"given":"William","family":"Millan","sequence":"additional","affiliation":[]},{"given":"S -J.","family":"Moon","sequence":"additional","affiliation":[]},{"given":"L.","family":"Simpson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,6,21]]},"reference":[{"key":"3_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1007\/3-540-60590-8_11","volume-title":"Fast Software Encryption-Leuven\u201994","author":"R. Anderson","year":"1995","unstructured":"R. Anderson. Searching for the Optimum Correlation Attack. In Fast Software Encryption-Leuven\u201994, volume 1008 of Lecture Notes in Computer Science, pages 137\u2013143. Springer-Verlag, 1995."},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"S. Babbage. A space\/time tradeoff in exhaustive search attacks on stream ciphers. European Convention on Security and Detection, IEE Conference Publication No. 408, May 1995.","DOI":"10.1049\/cp:19950490"},{"key":"3_CR3","unstructured":"S. Babbage. Cryptanalysis of LILI-128. Available at https:\/\/cosic.esat.kuleuven.ac.be\/nessie\/reports\/extwp3-001-2.pdf"},{"key":"3_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44448-3_1","volume-title":"Advances in Cryptology-ASIACRYPT 2000","author":"A. Biryukov","year":"2000","unstructured":"A. Biryukov and A. Shamir. Cryptanalytic time\/memory\/data tradeoffs for stream ciphers. In Advances in Cryptology-ASIACRYPT 2000, volume 1976 of Lecture Notes in Computer Science, pages 1\u201313. Springer-Verlag, 2000."},{"key":"3_CR5","doi-asserted-by":"publisher","first-page":"1771","DOI":"10.1049\/el:20001246","volume":"36","author":"W.G. Chambers","year":"2000","unstructured":"W.G. Chambers and D. Gollmann. Embedding attacks on step[1..D] clock-controlled generators. Electronics Letters, vol. 36 pp. 1771\u20131773, 2000.","journal-title":"Electronics Letters"},{"key":"3_CR6","unstructured":"E. Dawson, A. Clark, J. Goli\u0107, W. Millan, L. Penna and L. Simpson. The LILI-128 Keystream Generator. Available at https:\/\/www.cosic.esat.kuleuven.ac.be\/nessie\/workshop\/submissions.html ."},{"key":"3_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-54973-0","volume-title":"The Stability Theory of Stream Ciphers","author":"C. Ding","year":"1991","unstructured":"C. Ding, G. Xiao and W. Shan. The Stability Theory of Stream Ciphers. Volume 561 of Lecture Notes in Computer Science. Springer-Verlag, 1991."},{"issue":"3","key":"3_CR8","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/BF00196912","volume":"3","author":"J. Dj. Goli\u0107","year":"1991","unstructured":"J. Dj. Goli\u0107 and M. J. Mihaljevi\u0107. A Generalised Correlation Attack on a Class of Stream Ciphers Based on the Levenshtein Distance. Journal of Cryptology, vol. 3(3), pp. 201\u2013212, 1991.","journal-title":"Journal of Cryptology"},{"key":"3_CR9","series-title":"Lect Notes Comput Sci","first-page":"472","volume-title":"Advances in Cryptology-EUROCRYPT\u201992","author":"J. Dj. Goli\u0107","year":"1992","unstructured":"J. Dj. Goli\u0107 and S. Petrovi\u0107. A Generalised Correlation Attack with a Probabilistic Constrained Edit Distance. In Advances in Cryptology-EUROCRYPT\u201992, volume 658 of Lecture Notes in Computer Science, pages 472\u2013476. Springer-Verlag, 1992."},{"key":"3_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1007\/BFb0053439","volume-title":"Advances in Cryptology-EUROCRYPT\u201994","author":"J. Dj. Goli\u0107","year":"1994","unstructured":"J. Dj. Goli\u0107 and L. O\u2019Connor. Embedding and Probabilistic Correlation Attacks on Clock-Controlled Shift Registers. In Advances in Cryptology-EUROCRYPT\u201994, volume 950 of Lecture Notes in Computer Science, pages 230\u2013243. Springer-Verlag, 1994."},{"key":"3_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1007\/3-540-60865-6_52","volume-title":"Fast Software Encryption-Cambridge\u201996","author":"J. Dj. Goli\u0107","year":"1996","unstructured":"J. Dj. Goli\u0107. On the Security of Nonlinear Filter Generators. In Fast Software Encryption-Cambridge\u201996, volume 1039 of Lecture Notes in Computer Science, pages 173\u2013188. Springer-Verlag, 1996."},{"key":"3_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/3-540-69053-0_17","volume-title":"Advances in Cryptology-EUROCRYPT\u201997","author":"J. Dj. Goli\u0107","year":"1997","unstructured":"J. Dj. Goli\u0107. Cryptanalysis of Alleged A5 stream cipher. In Advances in Cryptology-EUROCRYPT\u201997, volume 1233 of Lecture Notes in Computer Science, pages 239\u2013255. Springer-Verlag, 1997."},{"key":"3_CR13","unstructured":"F. J\u00f6nsson and T. Johansson A Fast Correlation Attack on LILI-128. http:\/\/www.it.lth.se\/thomas\/papers\/paper140.ps"},{"issue":"2","key":"3_CR14","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1016\/S0165-1684(01)00180-3","volume":"82","author":"H.-J. Lee","year":"2002","unstructured":"H-J. Lee and S-J. Moon Parallel Stream Cipher for Secure High-Speed Communications. Signal Processing, vol. 82, no. 2, pp. 137\u2013143, 2002.","journal-title":"Signal Processing"},{"key":"3_CR15","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1109\/TIT.1969.1054260","volume":"IT-15","author":"J. Massey","year":"1969","unstructured":"J. Massey. Shift-Register Synthesis and BCH Decoding. IEEE Trans. Inform. Theory, IT-15:122\u2013127, January 1969.","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"3","key":"3_CR16","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/BF02252874","volume":"1","author":"W. Meier","year":"1989","unstructured":"W. Meier and O. Staffelbach. Fast Correlation Attacks on Certain Stream Ciphers. Journal of Cryptology, vol. 1(3), pp. 159\u2013167, 1989.","journal-title":"Journal of Cryptology"},{"key":"3_CR17","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-82865-2","volume-title":"Analysis and design of stream ciphers","author":"R. Rueppel","year":"1986","unstructured":"R. Rueppel. Analysis and design of stream ciphers. Springer-Verlag, Berlin, 1986."},{"key":"3_CR18","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1007\/BFb0027930","volume-title":"Information Security and Privacy-Nepean\u2019 97","author":"M. Salmasizadeh","year":"1997","unstructured":"M. Salmasizadeh, L. Simpson, J. Dj. Goli\u0107 and E. Dawson. Fast Correlation Attacks and Multiple Linear Approximations. In Information Security and Privacy-Nepean\u2019 97, volume 1270 of Lecture Notes in Computer Science, pages 228\u2013239. Springer-Verlag, 1997."},{"issue":"1","key":"3_CR19","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1109\/TC.1985.1676518","volume":"C-34","author":"T. Siegenthaler","year":"1985","unstructured":"T. Siegenthaler. Decrypting a Class of Stream Ciphers Using Ciphertext Only. IEEE Trans. Computers, vol. C-34(1), pp. 81\u201385, 1985.","journal-title":"IEEE Trans. Computers"},{"key":"3_CR20","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/BFb0053729","volume-title":"Information Security and Privacy-Brisbane\u2019 98","author":"L. Simpson","year":"1998","unstructured":"L. Simpson, J. Dj. Goli\u0107 and E. Dawson. A Probabilistic Correlation Attack on the Shrinking Generator. In Information Security and Privacy-Brisbane\u2019 98, volume 1438 of Lecture Notes in Computer Science, pages 147\u2013158. Springer-Verlag, 1998."},{"key":"3_CR21","series-title":"Lect Notes Comput Sci","first-page":"248","volume-title":"Proceedings of the Seventh Annual Workshop on Selected Areas in Cryptology-SAC\u20192000","author":"L. Simpson","year":"2000","unstructured":"L. Simpson, E. Dawson, J. Dj. Goli\u0107 and W. Millan. LILI Keystream Generator. Proceedings of the Seventh Annual Workshop on Selected Areas in Cryptology-SAC\u20192000, volume 2012 of Lecture Notes in Computer Science, pages 248\u2013261, Springer-Verlag, 2000."},{"key":"3_CR22","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1007\/0-387-34805-0_16","volume-title":"Advances in Cryptology-CRYPTO\u201989","author":"K. C. Zeng","year":"1990","unstructured":"K. C. Zeng, C. H. Yang and T. R. N. Rao. On the Linear Consistency Test (LCT) in Cryptanalysis with Applications. In Advances in Cryptology-CRYPTO\u201989, volume 434 of Lecture Notes in Computer Science, pages 164\u2013174. Springer-Verlag, 1990."},{"key":"3_CR23","doi-asserted-by":"crossref","unstructured":"M. \u017divkovi\u0107. An Algorithm for the Initial State Reconstruction of the Clock-Controlled Shift Register. IEEE Trans. Inform. Theory, vol. IT-37, pp. 1488\u20131490, Sept. 1991.","DOI":"10.1109\/18.133275"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45450-0_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T05:39:30Z","timestamp":1556429970000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45450-0_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540438618","9783540454502"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/3-540-45450-0_3","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}