{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:24:58Z","timestamp":1725488698765},"publisher-location":"Berlin, Heidelberg","reference-count":3,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540546207"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-46416-6_53","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T18:02:07Z","timestamp":1186423327000},"page":"552-553","source":"Crossref","is-referenced-by-count":0,"title":["The Information Leakage through a Randomly Generated Function"],"prefix":"10.1007","author":[{"given":"Lennart","family":"Brynielsson","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"53_CR1","unstructured":"Siegenthaler T, \u201cMethoden f\u00fcr den Entwurf von Stream Cipher Systemen\u201d, Ph.D. Dissertation, ETH Z\u00fcrich, 1987."},{"key":"53_CR2","unstructured":"Brynielsson L, \u201cRadger\u00e4te und ihre kritische L\u00e4nge\u201d, Kryptologie Aufbauseminar, J. Kepler Universit\u00e4t Linz, 1984."},{"key":"53_CR3","unstructured":"Cramer H, \u201cMathematical Methods of Statistics\u201d, Princeton University Press, 1951."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201991"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-46416-6_53.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:11:38Z","timestamp":1605647498000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-46416-6_53"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540546207"],"references-count":3,"URL":"https:\/\/doi.org\/10.1007\/3-540-46416-6_53","relation":{},"subject":[]}}