{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T13:03:04Z","timestamp":1772283784318,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540440093","type":"print"},{"value":"9783540456612","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45661-9_14","type":"book-chapter","created":{"date-parts":[[2007,5,21]],"date-time":"2007-05-21T07:02:03Z","timestamp":1179730923000},"page":"179-194","source":"Crossref","is-referenced-by-count":36,"title":["A New Keystream Generator MUGI"],"prefix":"10.1007","author":[{"given":"Dai","family":"Watanabe","sequence":"first","affiliation":[]},{"given":"Soichi","family":"Furuya","sequence":"additional","affiliation":[]},{"given":"Hirotaka","family":"Yoshida","sequence":"additional","affiliation":[]},{"given":"Kazuo","family":"Takaragi","sequence":"additional","affiliation":[]},{"given":"Bart","family":"Preneel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,7,12]]},"reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"E. Biham, A. Shamir, \u201cDifferential Cryptanalysis of the Data Encryption Standard,\u201d Springer-Verlag, 1993","DOI":"10.1007\/978-1-4613-9314-6"},{"key":"14_CR2","unstructured":"A. Clark, J. Golic, W. Millan, L. Penna, L. Simpson, \u201cThe LILI-128 Keystream Generator,\u201d NESSIE project submission, 2000, available at http:\/\/www.cryptonessie.org."},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"P. Crowley, S. Lucks, \u201cBias in the LEVIATHAN Stream Cipher,\u201d Fast Software Encryption, FSE 2001, Proceedings, pp. 223\u2013230, 2001.","DOI":"10.1007\/3-540-45473-X_18"},{"key":"14_CR4","unstructured":"J. Daemen, \u201cCipher and hash function design strategies based on linear and differential cryptanalysis,\u201d Doctoral Dissertation, March 1995, K. U. Leuven."},{"key":"14_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1007\/3-540-69710-1_5","volume-title":"Fast Software Encryption, FSE\u201998","author":"J. Daemen","year":"1998","unstructured":"J. Daemen, C. Clapp, \u201cFast Hashing and Stream Encryption with Panama,\u201d Fast Software Encryption, FSE\u201998, Springer-Verlag, LNCS 1372, pp. 60\u201374, 1998."},{"key":"14_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1007\/3-540-48285-7_14","volume-title":"Advances in Cryptology, Proceedings Eurocrypt\u201993","author":"J. Daemen","year":"1994","unstructured":"J. Daemen, R. Govaerts, J. Vandewalle, \u201cResynchronization weaknesses in synchronous stream ciphers,\u201d Advances in Cryptology, Proceedings Eurocrypt\u201993, Springer-Verlag, LNCS 765, pp. 159\u2013169, 1994."},{"key":"14_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/BFb0052343","volume-title":"Fast Software Encryption","author":"J. Daemen","year":"1997","unstructured":"J. Daemen, L. Knudsen, V. Rijmen, \u201cThe Block Cipher Square,\u201d Fast Software Encryption, Springer-Verlag, LNCS 1267, pp. 149\u2013165, 1997."},{"key":"14_CR8","unstructured":"J. Daemen, V. Rijmen, \u201cAES Proposal: Rijndael,\u201d AES algorithm submission, September 3, 1999, available at http:\/\/www.nist.gov\/aes\/ ."},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"S. Fluhrer, \u201cCryptanalysis of the SEAL 3.0 Pseudorandom Function Family,\u201d Fast Software Encryption, FSE 2001, Proceedings, pp. 142\u2013151, 2001.","DOI":"10.1007\/3-540-45473-X_11"},{"key":"14_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-45537-X_1","volume-title":"Selected in Areas in Cryptography, SAC 2001","author":"S. Fluhrer","year":"2001","unstructured":"S. Fluhrer, M. Shamir, \u201cWeaknesses in the Key Scheduling Algorithm of RC4,\u201d Selected in Areas in Cryptography, SAC 2001, Springer-Verlag, LNCS 2259, pp. 1\u201324, 2001."},{"key":"14_CR11","unstructured":"S. Furuya, D. Watanabe, K. Takaragi, \u201cSelf-Evaluation Report MULTI-S01,\u201d 2000, available at http:\/\/www.sdl.hitachi.co.jp\/crypto\/s01\/index.html"},{"key":"14_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1007\/BFb0052332","volume-title":"Fast Software Encryption, FSE\u201997","author":"T. Jacobsen","year":"1997","unstructured":"T. Jacobsen and L. R. Knudsen, \u201cThe Interpolation Attack on Block Ciphers,\u201d Fast Software Encryption, FSE\u201997, Springer-Verlag, LNCS 1267, pp. 28\u201340, 1997."},{"key":"14_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1007\/3-540-60590-8_16","volume-title":"Fast Software Encryption, FSE\u201994","author":"L. R. Knudsen","year":"1995","unstructured":"L. R. Knudsen, \u201cTruncated and Higher Order Differentials,\u201d Fast Software Encryption, FSE\u201994, Springer-Verlag, LNCS 1008, pp. 196\u2013211, 1995."},{"key":"14_CR14","series-title":"Lect Notes Comput Sci","first-page":"159","volume-title":"Advances in Cryptology, Eurocrypt\u201993","author":"M. Matsui","year":"1994","unstructured":"M. Matsui, \u201cLinear cryptanalysis method for DES cipher,\u201d Advances in Cryptology, Eurocrypt\u201993, Springer-Verlag, LNCS 765, pp. 159\u2013169, 1994."},{"key":"14_CR15","unstructured":"D. McGrew, S. Fluhrer, \u201cThe stream cipher LEVIATHAN,\u201d NESSIE project submission, 2000, available at http:\/\/www.cryptonessie.org\/ ."},{"key":"14_CR16","unstructured":"M. Mihaljevic, M. Fossorier, H. Imai, \u201cFast Correlation Attack Algorithm with List Decoding and an Application,\u201d Fast Software Encryption, FSE 2001, Proceedings, pp. 208\u2013222, 2001."},{"key":"14_CR17","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1007\/3-540-58108-1_8","volume-title":"Fast Software Encryption, FSE\u201994","author":"P. Rogaway","year":"1994","unstructured":"P. Rogaway, D. Coppersmith, \u201cA Software-Optimized Encryption Algorithm,\u201d Fast Software Encryption, FSE\u201994, Springer-Verlag, LNCS 809, pp. 56\u201363, 1994."},{"issue":"4","key":"14_CR18","first-page":"273","volume":"11","author":"P. Rogaway","year":"1998","unstructured":"P. Rogaway, D. Coppersmith, \u201cA Software-Optimized Encryption Algorithm,\u201d Journal fo Cryptography, Vol. 11, No. 4, pp. 273\u2013287, 1998.","journal-title":"Journal fo Cryptography"},{"key":"14_CR19","doi-asserted-by":"crossref","unstructured":"V. Rijmen, B. Van Rompay, B. Preneel, J. Vandewalle, \u201cProducing Collisions for PANAMA,\u201d Fast Software Encryption, FSE 2001, proceedings, pp. 39\u201353, 2001.","DOI":"10.1007\/3-540-45473-X_4"},{"key":"14_CR20","unstructured":"B. Schneier, Applied Cryptography, Second Edition, John Wiley & Sons, pp. 397\u2013398, 1996."},{"key":"14_CR21","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1007\/3-540-60865-6_49","volume-title":"Fast Software Encryption, FSE\u201996","author":"B. Schneier","year":"1996","unstructured":"B. Schneier, J. Kelsey, \u201cUnbalanced Feistel Networks and Block Cipher Design,\u201d Fast Software Encryption, FSE\u201996, Springer-Verlag, LNCS 1039, pp. 121\u2013144, 1996."},{"key":"14_CR22","unstructured":"D. Watanabe, S. Furuya, H. Yoshida, K. Takaragi, MUGI Pseudorandom number generator, Specification, 2001, available at http:\/\/www.sdl.hitachi.co.jp\/crypto\/mugi\/index-e.html ."},{"key":"14_CR23","unstructured":"D. Watanabe, S. Furuya, H. Yoshida, K. Takaragi, MUGI Pseudorandom number generator, Self Evaluation, 2001, available at http:\/\/www.sdl.hitachi.co.jp\/crypto\/mugi\/index-e.html ."}],"container-title":["Lecture Notes in Computer Science","Fast Software Encryption"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45661-9_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,11]],"date-time":"2023-05-11T19:03:41Z","timestamp":1683831821000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45661-9_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540440093","9783540456612"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/3-540-45661-9_14","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2002]]}}}