{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:43:17Z","timestamp":1725486197118},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540430667"},{"type":"electronic","value":"9783540455370"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45537-x_2","type":"book-chapter","created":{"date-parts":[[2007,6,3]],"date-time":"2007-06-03T17:29:27Z","timestamp":1180891767000},"page":"25-37","source":"Crossref","is-referenced-by-count":4,"title":["A Practical Cryptanalysis of SSC2"],"prefix":"10.1007","author":[{"given":"Philip","family":"Hawkes","sequence":"first","affiliation":[]},{"given":"Frank","family":"Quick","sequence":"additional","affiliation":[]},{"given":"Gregory G.","family":"Rose","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,12,20]]},"reference":[{"key":"2_CR1","series-title":"Lect Notes Comput Sci","volume-title":"Fast Software Encryption Workshop, FSE 2001","author":"D. Bleichenbacher","year":"2001","unstructured":"D. Bleichenbacher and W. Meier. Analysis of SSC2. Fast Software Encryption Workshop, FSE 2001, to be published in the Lecture Notes in Computer Science, Program chair: M. Matsui, Springer-Verlag, 2001."},{"key":"2_CR2","unstructured":"C. Carroll, A. Chan, and M. Zhang. The software-oriented stream cipher SSC-II. In Proceedings of Fast Software Encryption Workshop 2000, pages 39\u201356, 2000."},{"key":"2_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1007\/3-540-46416-6_16","volume-title":"Advances in Cryptology, EUROCRYPT\u201991","author":"V. Chepyzhov","year":"1991","unstructured":"V. Chepyzhov and B. Smeets. On a fast correlation attack on certain stream ciphers. Advances in Cryptology, EUROCRYPT\u201991, Lecture Notes in Computer Science, vol. 547, D. W. Davies ed., Springer-Verlag, pages 176\u2013185, 1991."},{"key":"2_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/BFb0032358","volume-title":"Cryptography: Policy and Algorithms","author":"J. Dj. Goli\u0107","year":"1996","unstructured":"J. Dj. Goli\u0107, M. Salmasizadeh, A. Clark, A. Khodkar, and E. Dawson. Discrete optimisations and fast correlation attacks. Cryptography: Policy and Algorithms, Lecture Notes in Computer Science, vol. 1029, E. Dawson, J. Goli\u0107 eds., Springer, pages 186\u2013200, 1996."},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"P. Hawkes and G. Rose. Correlation cryptanalysis of SSC2, 2000. Presented at the Rump Session of CRYPTO 2000.","DOI":"10.1007\/3-540-45537-X_2"},{"key":"2_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1007\/3-540-44448-3_23","volume-title":"Advances in Cryptology, ASIACRYPT2000","author":"P. Hawkes","year":"2000","unstructured":"P. Hawkes and G. Rose. Exploiting multiples of the connection polynomial in word-oriented stream ciphers. Advances in Cryptology, ASIACRYPT2000, Lecture Notes in Computer Science, vol. 1976, T. Okamoto ed., Springer-Verlag, pages 302\u2013316, 2000."},{"key":"2_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1007\/3-540-48910-X_24","volume-title":"Advances in Cryptology, EUROCRYPT\u201999","author":"T. Johansson","year":"1999","unstructured":"T. Johansson and F J\u00f6nsson. Improved fast correlation attacks on stream ciphers via convolutional codes. Advances in Cryptology, EUROCRYPT\u201999, Lecture Notes in Computer Science, vol. 1592, J. Stern ed., Springer-Verlag, pages 347\u2013362, 1999."},{"key":"2_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1007\/3-540-45961-8_28","volume-title":"Advances in Cryptology, EUROCRYPT\u201988","author":"W. Meier","year":"1988","unstructured":"W. Meier and O. Staffelbach. Fast correlation attacks on certain stream ciphers. Advances in Cryptology, EUROCRYPT\u201988, Lecture Notes in Computer Science, vol. 330, C. G. G\u00fcnther ed., Springer-Verlag, pages 301\u2013314, 1988."},{"issue":"3","key":"2_CR9","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/BF02252874","volume":"1","author":"W. Meier","year":"1989","unstructured":"W. Meier and O. Staffelbach. Fast correlation attacks on certain stream ciphers. Journal of Cryptology, 1(3):159\u2013176, 1989.","journal-title":"Journal of Cryptology"},{"key":"2_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"527","DOI":"10.1007\/3-540-46416-6_48","volume-title":"Advances in Cryptology, EUROCRYPT\u201991","author":"M. Mihaljevi\u0107","year":"1991","unstructured":"M. Mihaljevi\u0107 and J Goli\u0107. A comparison of cryptanalytic principles based on iterative error-correction. Advances in Cryptology, EUROCRYPT\u201991, Lecture Notes in Computer Science, vol. 547, D. W. Davies ed., Springer-Verlag, pages 527\u2013531, 1991."}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45537-X_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T12:58:14Z","timestamp":1556456294000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45537-X_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540430667","9783540455370"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/3-540-45537-x_2","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]}}}