{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T23:10:20Z","timestamp":1725664220803},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540606932"},{"type":"electronic","value":"9783540492801"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1995]]},"DOI":"10.1007\/3-540-60693-9_10","type":"book-chapter","created":{"date-parts":[[2012,2,26]],"date-time":"2012-02-26T15:53:48Z","timestamp":1330271628000},"page":"74-83","source":"Crossref","is-referenced-by-count":17,"title":["Computation of low-weight parity checks for correlation attacks on stream ciphers"],"prefix":"10.1007","author":[{"given":"W. T.","family":"Penzhorn","sequence":"first","affiliation":[]},{"given":"G. J.","family":"K\u00fchn","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,7]]},"reference":[{"issue":"no.3","key":"10_CR1","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1007\/BF02252874","volume":"1","author":"W. Meier","year":"1989","unstructured":"W. Meier and O. Staffelbach, \u201cFast correlation attacks on certain stream ciphers\u201d, Journal of Cryptology, vol. 1, no. 3, pp. 159\u2013176, 1989.","journal-title":"Journal of Cryptology"},{"issue":"no.4","key":"10_CR2","doi-asserted-by":"publisher","first-page":"587","DOI":"10.1109\/TIT.1984.1056941","volume":"IT-30","author":"D. Coppersmith","year":"1984","unstructured":"D. Coppersmith, \u201cFast evaluation of logarithms in fields of characteristic two\u201d, IEEE Trans. on Information Theory, vol. IT-30, no. 4, pp. 587\u2013594, July 1984.","journal-title":"IEEE Trans. on Information Theory"},{"key":"10_CR3","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/TIT.1969.1054260","volume":"IT-15","author":"J. L. Massey","year":"1969","unstructured":"J. L. Massey, \u201cShift-register synthesis and BCH decoding\u201d, IEEE Trans. Information Theory, vol. IT-15, pp. 122\u2013127, 1969.","journal-title":"IEEE Trans. Information Theory"},{"key":"10_CR4","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1109\/TC.1985.1676518","volume":"C-34","author":"T. Siegenthaler","year":"1985","unstructured":"T. Siegenthaler, \u201cDecrypting a class of stream ciphers using ciphertext only\u201d, IEEE Trans. Computers, vol. C-34, pp. 81\u201385, 1985.","journal-title":"IEEE Trans. Computers"},{"key":"10_CR5","unstructured":"J. O. Br\u00fcer, \u201cOn nonlinear combinations of linear shift register sequences\u201d, in Proc. IEEE ISIT, les Arcs, France, June 21\u201325 1982."},{"key":"10_CR6","unstructured":"P. R. Geffe, \u201cHow to protect data with ciphers that are really hard to break\u201d, Electronics, pp. 99\u2013101, January 1973."},{"key":"10_CR7","doi-asserted-by":"crossref","first-page":"1133","DOI":"10.1109\/TC.1977.1674759","volume":"C-26","author":"V. S. Pless","year":"1977","unstructured":"V. S. Pless, \u201cEncryption schemes for computer confidentiality\u201d, IEEE Trans. Computers, vol. C-26, pp. 1133\u20131136, November 1977.","journal-title":"IEEE Trans. Computers"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"C. Chepyzhov and B. Smeets, \u201cOn a fast correlation attack on stream ciphers\u201d, in Advances in Cryptology \u2014 EUROCRYPT '91. 1991, pp. 176\u2013185, Springer-Verlag.","DOI":"10.1007\/3-540-46416-6_16"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"M. J. Mihaljevic and J. Golic, \u201cA comparison of cryptanalytic principles based on iterative error-correction\u201d, in Advances in Cryptology \u2014 EUROCRYPT '91. 1991, pp. 527\u2013531, Springer-Verlag.","DOI":"10.1007\/3-540-46416-6_48"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"K. Zeng and M. Huang, \u201cOn the linear syndrome method in cryptanalysis\u201d, in Advances in Cryptology \u2014 CRYPTO '88. 1990, pp. 469\u2013478, Springer-Verlag.","DOI":"10.1007\/0-387-34799-2_32"},{"issue":"no.1","key":"10_CR11","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1007\/BF02252867","volume":"2","author":"K. Nishimura","year":"1990","unstructured":"K. Nishimura and M. Sibuya, \u201cProbability to meet in the middle\u201d, J. of Cryptology, vol. 2, no. 1, pp. 13\u201322, 1990.","journal-title":"J. of Cryptology"},{"issue":"no.4","key":"10_CR12","doi-asserted-by":"publisher","first-page":"946","DOI":"10.1109\/18.53764","volume":"IT-36","author":"K. Huber","year":"1990","unstructured":"K. Huber, \u201cSome comments on Zech's logarithm\u201d, IEEE Trans. Information Theory, vol. IT-36, no. 4, pp. 946\u2013950, July 1990.","journal-title":"IEEE Trans. Information Theory"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"A. M. Odlyzko, \u201cDiscrete logarithms and their cryptographic significance\u201d, in Advances in Cryptology \u2014 EUROCRYPT '84. 1985, pp. 224\u2013314, Springer-Verlag.","DOI":"10.1007\/3-540-39757-4_20"},{"key":"10_CR14","doi-asserted-by":"crossref","first-page":"276","DOI":"10.1137\/0605029","volume":"5","author":"I. F. Blake","year":"1985","unstructured":"I. F. Blake, R. Fuji-Hara, R. C. Mullin, and S. A. Vanstone, \u201cComputing logarithms in finite fields of characteristic two\u201d, SIAM Journal on Algebraic Discrete Methods, vol. 5, pp. 276\u2013285, 1985.","journal-title":"SIAM Journal on Algebraic Discrete Methods"}],"container-title":["Lecture Notes in Computer Science","Cryptography and Coding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-60693-9_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T16:01:27Z","timestamp":1605628887000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-60693-9_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995]]},"ISBN":["9783540606932","9783540492801"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/3-540-60693-9_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1995]]}}}