{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T13:10:53Z","timestamp":1773148253771,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540440093","type":"print"},{"value":"9783540456612","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45661-9_18","type":"book-chapter","created":{"date-parts":[[2007,5,21]],"date-time":"2007-05-21T11:02:03Z","timestamp":1179745323000},"page":"231-236","source":"Crossref","is-referenced-by-count":24,"title":["A Time-Memory Tradeoff Attack Against LILI-128"],"prefix":"10.1007","author":[{"given":"Markku-Juhani Olavi","family":"Saarinen","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,7,12]]},"reference":[{"key":"18_CR1","unstructured":"S. Babbage. Cryptanalysis of LILI-128. NESSIE Public Report, https:\/\/www.cosic.esat.kuleuven.ac.be\/nessie\/reports , 2001."},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"S. Babbage. A Space\/Time Tradeoff in Exhaustive Search Attacks on Stream Ciphers, European Convention on Security and Detection, IEE Conference Publication No. 408, 1995.","DOI":"10.1049\/cp:19950490"},{"key":"18_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44448-3_1","volume-title":"Proceedings of ASIACRYPT 2000","author":"A. Biryukov","year":"2000","unstructured":"A. Biryukov and A. Shamir, Cryptanalytic Time\/Memory\/Data Tradeoffs for Stream Ciphers, Proceedings of ASIACRYPT 2000, LNCS 1976, pp. 1\u201313, Springer-Verlag, 2000."},{"key":"18_CR4","series-title":"Lect Notes Comput Sci","first-page":"1","volume-title":"Proceedings of FSE\u2019 2000","author":"A. Biryukov","year":"2001","unstructured":"A. Biryukov, A. Shamir, and D. Wagner, Real Time Cryptanalysis of A5\/1 on a PC, Proceedings of FSE\u2019 2000, LNCS 1978, pp. 1\u201318, Springer-Verlag, 2001."},{"key":"18_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","DOI":"10.1007\/10718964","volume-title":"Proceedings of the Seventh Annual Workshop on Selected Areas in Cryptology\u2014SAC 2000","author":"E. Dawson","year":"2000","unstructured":"E. Dawson, J. Goli\u0107, W. Millan and L. Simpson, The LILI-128 Keystream Generator, Proceedings of the Seventh Annual Workshop on Selected Areas in Cryptology\u2014SAC 2000, LNCS 2012, Springer-Verlag, 2000."},{"key":"18_CR6","unstructured":"E. Dawson, J. Goli\u0107, W. Millan and L. Simpson, Response to Initial Report on LILI-128, Submitted to Second NESSIE Workshop, 2001."},{"key":"18_CR7","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1109\/TIT.1980.1056220","volume":"IT-26","author":"M. E. Hellmab","year":"1980","unstructured":"M. E. Hellmab, A Cryptanalytic Time-Memory Trade-Off, IEEE Transactions on Information Theory, Vol. IT-26, N 4, pp. 401\u2013406, 1980.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"3","key":"18_CR8","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1016\/S0020-0190(01)00208-3","volume":"81","author":"F. J\u00f6nsson","year":"2001","unstructured":"F. J\u00f6nsson and T. Johansson, A Fast Correlation Attack on LILI-128., Information Processing Letters Vol 81, N. 3, Pages 127\u2013132, 2001.","journal-title":"Information Processing Letters"},{"key":"18_CR9","unstructured":"J. White, Initial Report on the LILI-128 Stream Cipher, NESSIE Public Report, https:\/\/www.cosic.esat.kuleuven.ac.be\/nessie\/reports , 2001."}],"container-title":["Lecture Notes in Computer Science","Fast Software Encryption"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45661-9_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T06:23:31Z","timestamp":1556432611000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45661-9_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540440093","9783540456612"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/3-540-45661-9_18","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2002]]}}}