{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T13:12:51Z","timestamp":1762521171779},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540546207"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-46416-6_39","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T14:02:07Z","timestamp":1186408927000},"page":"458-471","source":"Crossref","is-referenced-by-count":51,"title":["New Approaches to the Design of Self-Synchronizing Stream Ciphers"],"prefix":"10.1007","author":[{"given":"Ueli M.","family":"Maurer","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"39_CR1","volume-title":"Cipher systems: the protection of communications","author":"H. Beker","year":"1982","unstructured":"H. Beker and F. Piper, Cipher systems: the protection of communications, New York, NY: Van Nostrand, 1982."},{"key":"39_CR2","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1109\/TIT.1978.1055873","volume":"24","author":"E.R. Berlekamp","year":"1978","unstructured":"E.R. Berlekamp, R.J. McEliece and H.C.A. van Tilborg, On the inherent intractability of certain coding problems, IEEE Transactions on Information Theory, vol. 24, pp. 384\u2013386, 1978.","journal-title":"IEEE Transactions on Information Theory"},{"key":"39_CR3","volume-title":"Theory and practice of error control codes","author":"R.E. Blahut","year":"1984","unstructured":"R.E. Blahut, Theory and practice of error control codes, Reading, MA: Addison-Wesley, 1984."},{"key":"39_CR4","unstructured":"E. Biham and A. Shamir, Differential analysis of DES-like cryptosystems, presented at CRYPTO\u201990 (to appear in the proceedings)."},{"key":"39_CR5","volume-title":"Cryptography and data security","author":"D.E.R. Denning","year":"1982","unstructured":"D.E.R. Denning, Cryptography and data security, Reading, MA: Addison-Wesley, 1982."},{"issue":"4","key":"39_CR6","doi-asserted-by":"publisher","first-page":"792","DOI":"10.1145\/6490.6503","volume":"33","author":"O. Goldreich","year":"1986","unstructured":"O. Goldreich, S. Goldwasser and S. Micali, How to construct random functions, Journal of the ACM, vol. 33, no. 4, pp. 792\u2013807, Oct. 1986.","journal-title":"Journal of the ACM"},{"key":"39_CR7","unstructured":"H.-J. Klemenz and W.R. Widmer, Swiss Patent Nr. CH 658 759 A5."},{"key":"39_CR8","unstructured":"V.I. Korzhik and A.I. Turkin, Cryptanalysis of McEliece\u2019s public-key cryptosystem, these proceedings."},{"issue":"2","key":"39_CR9","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1137\/0217022","volume":"17","author":"M. Luby","year":"1988","unstructured":"M. Luby and C. Rackoff, How to construct pseudorandom permutations from pseudorandom functions, SIAM Journal on Computing, vol. 17, no. 2, pp. 373\u2013386, 1988.","journal-title":"SIAM Journal on Computing"},{"issue":"1","key":"39_CR10","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/TIT.1969.1054260","volume":"IT-15","author":"J.L. Massey","year":"1969","unstructured":"J.L. Massey, Shift-register synthesis and BCH decoding, IEEE Transactions on Information Theory, vol IT-15, no. 1, pp. 122\u2013127, Jan. 1969.","journal-title":"IEEE Transactions on Information Theory"},{"key":"39_CR11","unstructured":"U.M. Maurer and J.L. Massey, Cascade ciphers: the importance of being first, presented at the 1990 IEEE Int. Symp. on Information Theory, San Diego, CA, Jan. 14\u201319, 1990 (also submitted to J. of Cryptology)."},{"key":"39_CR12","volume-title":"The theory of error-correcting codes","author":"F.J. MacWilliams","year":"1988","unstructured":"F.J. MacWilliams and N.J. Sloane, The theory of error-correcting codes, Amsterdam: North-Holland, sixth printing, 1988."},{"key":"39_CR13","unstructured":"National Bureau of Standards, DES modes of operation, Fed. Inform. Proc. Standards Publication 81, Nat. Inform. Service, Springfield, VA, Dec. 1980."},{"key":"39_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"174","DOI":"10.1007\/3-540-39568-7_16","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 84","author":"N. Proctor","year":"1985","unstructured":"N. Proctor, A self-synchronizing cascaded cipher system with dynamic control of error propagation, Advances in Cryptology \u2014 CRYPTO\u2019 84, Lecture Notes in Computer Science, vol. 196, Berlin: Springer Verlag, pp. 174\u2013190, 1985."},{"key":"39_CR15","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-82865-2","volume-title":"Analysis and design of stream ciphers","author":"R.A. Rueppel","year":"1986","unstructured":"R.A. Rueppel, Analysis and design of stream ciphers, Berlin: Springer Verlag, 1986."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201991"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-46416-6_39.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T16:11:32Z","timestamp":1605629492000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-46416-6_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540546207"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/3-540-46416-6_39","relation":{},"subject":[]}}