{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T04:26:43Z","timestamp":1743395203611},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540564133"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-47555-9_11","type":"book-chapter","created":{"date-parts":[[2007,8,8]],"date-time":"2007-08-08T19:23:49Z","timestamp":1186601029000},"page":"124-137","source":"Crossref","is-referenced-by-count":28,"title":["Convergence of a Bayesian Iterative Error-Correction Procedure on a Noisy Shift Register Sequence"],"prefix":"10.1007","author":[{"given":"Miodrag J.","family":"Mihaljevi\u0107","sequence":"first","affiliation":[]},{"given":"Jovan Dj.","family":"Goli\u0107","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1109\/TC.1985.1676518","volume":"C-34","author":"T. Siegenthaler","year":"1985","unstructured":"T. Siegenthaler. \u201cDecrypting a Class of Stream Ciphers Using Ciphertext Only\u201d, IEEE Trans. Comput., vol. C-34, pp. 81\u201385, Jan. 1985.","journal-title":"IEEE Trans. Comput."},{"key":"11_CR2","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/BF02252874","volume":"1","author":"W. Meier","year":"1989","unstructured":"W. Meier, O. Staffelbach, \u201cFast Correlation Attacks on Certain Stream Ciphers\u201d, Journal of Cryptology. vol. 1, pp. 159\u2013176. 1989.","journal-title":"Journal of Cryptology"},{"key":"11_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1007\/0-387-34799-2_32","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 88","author":"K. Zeng","year":"1990","unstructured":"K. Zeng, M. Huang, \u201cOn the Linear Syndrome Method in Cryptanalysis\u201d, Advances in Cryptology \u2014 CRYPTO\u2019 88, Lecture Notes in Computer Science, vol. 405, pp. 469\u2013478. Springer-Verlag, 1990."},{"key":"11_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/BFb0030359","volume-title":"Advances in Cryptology-AUSCRYPT\u2019 90","author":"M. Mihaljevi\u0107","year":"1990","unstructured":"M. Mihaljevi\u0107, J. Goli\u0107, \u201cA Fast Iterative Algorthm for a Shift Register Initial State Reconstruction Given the Noisy Output Sequence\u201d, Advances in Cryptology-AUSCRYPT\u2019 90, Lecture Notes in Computer Science, vol. 453, pp. 165\u2013175. Springer-Verlag, 1990."},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"K. Zeng, C.H. Yang, T.R.N. Rao, \u201cAn Improved Linear Syndrome Algorithm in Cryptanalysis with Applications\u201d, Proc. CRYPTO\u2019 90.","DOI":"10.1007\/3-540-38424-3_3"},{"key":"11_CR6","unstructured":"M. \u017divkovi\u0107. \u201cAn Analysis of Linear Recurrent Sequences over the Field GF(2)\u201d, Ph.D. thesis, Belgrade University, 1990."},{"key":"11_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1007\/3-540-46416-6_16","volume-title":"Advances in Cryptology-EUROCRYPT\u2019 91","author":"V. Chepyzhov","year":"1991","unstructured":"V. Chepyzhov, B. Smeets. \u201cOn a Fast Correlation Attack on Stream Ciphers\u201d, Advances in Cryptology-EUROCRYPT\u2019 91, Lecture Notes in Computer Science, vol. 547, pp. 176\u2013185, Springer-Verlag, 1991."},{"key":"11_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"527","DOI":"10.1007\/3-540-46416-6_48","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u2019 91","author":"M. Mihaljevi\u0107","year":"1991","unstructured":"M. Mihaljevi\u0107, J. Goli\u0107. \u201cA Comparison of Cryptanalytic Principles Based on Iterative Error-Correction\u201d, Advances in Cryptology \u2014 EUROCRYPT\u2019 91, Lecture Notes in Computer Science. vol. 547, pp. 527\u2013531, Springer-Verlag. 1991."},{"key":"11_CR9","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/TIT.1962.1057683","volume":"IT-8","author":"R.G. Gallager","year":"1962","unstructured":"R.G. Gallager, \u201cLow-Density Parity-Check Codes\u201d, IRE Trans. Inform. Theory, vol. IT-8, pp. 21\u201328, Jan. 1962.","journal-title":"IRE Trans. Inform. Theory"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT\u2019 92"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-47555-9_11.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T16:13:52Z","timestamp":1605629632000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-47555-9_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540564133"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/3-540-47555-9_11","relation":{},"subject":[]}}