{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T14:21:29Z","timestamp":1758810089122},"publisher-location":"Berlin, Heidelberg","reference-count":5,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540440093"},{"type":"electronic","value":"9783540456612"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45661-9_15","type":"book-chapter","created":{"date-parts":[[2007,5,21]],"date-time":"2007-05-21T11:02:03Z","timestamp":1179745323000},"page":"195-209","source":"Crossref","is-referenced-by-count":29,"title":["Scream: A Software-Efficient Stream Cipher"],"prefix":"10.1007","author":[{"given":"Shai","family":"Halevi","sequence":"first","affiliation":[]},{"given":"Don","family":"Coppersmith","sequence":"additional","affiliation":[]},{"given":"Charanjit","family":"Jutla","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,7,12]]},"reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"D. Coppersmith, S. Halevi, and C. Jutla. Cryptanalysis of stream ciphers with linear masking. manuscript, 2002.","DOI":"10.1007\/3-540-45708-9_33"},{"key":"15_CR2","unstructured":"J. Daemen and V. Rijmen. AES proposal: Rijndael. Available on-line from NIST at http:\/\/csrc.nist.gov\/encryption\/aes\/rijndael\/ , 1998."},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"S. Fluhrer. Cryptanalysis of the SEAL 3.0 pseudorandom function family. In Proceedings of the Fast Software Encryption Workshop (FSE\u201901), 2001.","DOI":"10.1007\/3-540-45473-X_11"},{"key":"15_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BFb0052330","volume-title":"Proceedings of the 4th Workshop on Fast Software Encryption","author":"H. Handschuh","year":"1997","unstructured":"H. Handschuh and H. Gilbert. \u03c72 cryptanalysis of the SEAL encryption algorithm. In Proceedings of the 4th Workshop on Fast Software Encryption, volume 1267 of Lecture Notes in Computer Science, pages 1\u201312. Springer-Verlag, 1997."},{"issue":"4","key":"15_CR5","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/s001459900048","volume":"11","author":"P. Rogaway","year":"1998","unstructured":"P. Rogaway and D. Coppersmith. A software optimized encryption algorithm. Journal of Cryptology, 11(4):273\u2013287, 1998.","journal-title":"Journal of Cryptology"}],"container-title":["Lecture Notes in Computer Science","Fast Software Encryption"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45661-9_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T06:23:26Z","timestamp":1556432606000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45661-9_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540440093","9783540456612"],"references-count":5,"URL":"https:\/\/doi.org\/10.1007\/3-540-45661-9_15","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}