{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T15:39:52Z","timestamp":1766504392522},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540611868"},{"type":"electronic","value":"9783540683391"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1996]]},"DOI":"10.1007\/3-540-68339-9_24","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T01:31:14Z","timestamp":1186363874000},"page":"268-282","source":"Crossref","is-referenced-by-count":21,"title":["Fast Low Order Approximation of Cryptographic Functions"],"prefix":"10.1007","author":[{"given":"Jovan Dj.","family":"Goli\u0107","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,13]]},"reference":[{"key":"24_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1007\/3-540-46416-6_16","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u2019 91","author":"V. Chepyzhov","year":"1991","unstructured":"V. Chepyzhov and B. Smeets, \u201cOn a fast correlation attack on stream ciphers,\u201d Advances in Cryptology \u2014 EUROCRYPT\u2019 91, Lecture Notes in Computer Science, vol. 547, D. W. Davies ed., Springer-Verlag, pp. 176\u2013185, 1991."},{"key":"24_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-54973-0","volume-title":"The Stability Theory of Stream Ciphers","author":"C. Ding","year":"1991","unstructured":"C. Ding, G. Xiao, and W. Shan, The Stability Theory of Stream Ciphers. Lecture Notes in Computer Science, vol. 561, Springer-Verlag, 1991."},{"key":"24_CR3","volume-title":"Error-Correcting Coding for Digital Communications","author":"G. C. Clark Jr.","year":"1982","unstructured":"G. C. Clark, Jr. and J. B. Cain, Error-Correcting Coding for Digital Communications. New York: Plenum Press, 1982."},{"key":"24_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"586","DOI":"10.1007\/3-540-46885-4_56","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u2019 89","author":"R. Forr\u00e9","year":"1990","unstructured":"R. Forr\u00e9, \u201cA fast correlation attack on nonlinearly feedforward filtered shift-register sequences,\u201d Advances in Cryptology \u2014 EUROCRYPT\u2019 89, Lecture Notes in Computer Science, vol. 434, J.-J. Quisquater and J. Vandewalle eds., Springer-Verlag, pp. 586\u2013595, 1990."},{"key":"24_CR5","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/TIT.1962.1057683","volume":"IT-8","author":"R. G. Gallager","year":"1962","unstructured":"R. G. Gallager, \u201cLow-density parity-check codes,\u201d IRE Trans. Inform. Theory, vol. IT-8, pp. 21\u201328, Jan. 1962.","journal-title":"IRE Trans. Inform. Theory"},{"key":"24_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/3-540-47555-9_10","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u2019 92","author":"J. Dj. Goli\u0107","year":"1993","unstructured":"J. Dj. Goli\u0107, \u201cCorrelation via linear sequential circuit approximation of combiners with memory,\u201d Advances in Cryptology \u2014 EUROCRYPT\u2019 92, Lecture Notes in Computer Science, vol. 658, R. A. Rueppel ed., Springer-Verlag, pp. 113\u2013123, 1993."},{"key":"24_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1007\/3-540-60590-8_13","volume-title":"Fast Software Encryption \u2014 Leuven\u2019 94","author":"J. Dj. Goli\u0107","year":"1995","unstructured":"J. Dj. Goli\u0107, \u201cLinear cryptanalysis of stream ciphers,\u201d Fast Software Encryption \u2014 Leuven\u2019 94, Lecture Notes in Computer Science, vol. 1008, B. Preneel ed., Springer-Verlag, pp. 154\u2013169, 1995."},{"key":"24_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/BFb0032358","volume-title":"Cryptographic Policy and Algorithms \u2014 Brisbane\u2019 95","author":"J. Dj. Goli\u0107","year":"1996","unstructured":"J. Dj. Goli\u0107, M. Salmasizadeh, A. Clark, A. Khodkar, and E. Dawson, \u201cDiscrete optimisation and fast correlation attacks,\u201d Cryptographic Policy and Algorithms \u2014 Brisbane\u2019 95, Lecture Notes in Computer Science, vol. 1029, E. Dawson and J. Goli\u0107 eds., Springer-Verlag, pp. 186\u2013200, 1996."},{"key":"24_CR9","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1109\/TIT.1968.1054127","volume":"IT-14","author":"T. Kasami","year":"1968","unstructured":"T. Kasami, S. Lin, and W. W. Peterson, \u201cNew generalizations of the Reed-Muller codes, part I: primitive codes,\u201d IEEE Trans. Inform. Theory, vol. IT-14, pp. 189\u2013199, Mar. 1968.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"24_CR10","doi-asserted-by":"publisher","first-page":"732","DOI":"10.1109\/TIT.1976.1055626","volume":"IT-22","author":"E. L. Key","year":"1976","unstructured":"E. L. Key, \u201cAn analysis of the structure and complexity of nonlinear binary sequence generators,\u201d IEEE Trans. Inform. Theory, vol. IT-22, pp. 732\u2013736, Nov. 1976.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"24_CR11","doi-asserted-by":"crossref","DOI":"10.21236\/AD0407946","volume-title":"Threshold Decoding","author":"J. L. Massey","year":"1963","unstructured":"J. L. Massey, Threshold Decoding. Cambridge, MA: MIT Press, 1963."},{"key":"24_CR12","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/TIT.1969.1054260","volume":"IT-15","author":"J. L. Massey","year":"1969","unstructured":"J. L. Massey, \u201cShift-register synthesis and BCH decoding,\u201d IEEE Trans. Inform. Theory, vol. IT-15, pp. 122\u2013127, Jan. 1969.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"24_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u2019 93","author":"M. Matsui","year":"1994","unstructured":"M. Matsui, \u201cLinear cryptanalysis method for DES cipher,\u201d Advances in Cryptology \u2014 EUROCRYPT\u2019 93, Lecture Notes in Computer Science, vol. 765, T. Helleseth ed., Springer-Verlag, pp. 386\u2013397, 1994."},{"key":"24_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"458","DOI":"10.1007\/3-540-46416-6_39","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u2019 91","author":"U. M. Maurer","year":"1991","unstructured":"U. M. Maurer, \u201cNew approaches to the design of self-synchronizing stream ciphers,\u201d Advances in Cryptology \u2014 EUROCRYPT\u2019 91, Lecture Notes in Computer Science, vol. 547, D. W. Davies ed., Springer-Verlag, pp. 458\u2013471, 1991."},{"issue":"3","key":"24_CR15","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/BF02252874","volume":"1","author":"W. Meier","year":"1989","unstructured":"W. Meier and O. Staffelbach, \u201cFast correlation attacks on certain stream ciphers,\u201d Journal of Cryptology, vol. 1(3), pp. 159\u2013176, 1989.","journal-title":"Journal of Cryptology"},{"key":"24_CR16","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"549","DOI":"10.1007\/3-540-46885-4_53","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u2019 89","author":"W. Meier","year":"1990","unstructured":"W. Meier and O. Staffelbach, \u201cNonlinearity criteria for cryptographic functions,\u201d Advances in Cryptology \u2014 EUROCRYPT\u2019 89, Lecture Notes in Computer Science, vol. 434, J.-J. Quisquater and J. Vandewalle eds., Springer-Verlag, pp. 549\u2013562, 1990."},{"issue":"1","key":"24_CR17","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/BF00191322","volume":"5","author":"W. Meier","year":"1992","unstructured":"W. Meier and O. Staffelbach, \u201cCorrelation properties of combiners with memory in stream ciphers,\u201d Journal of Cryptology, vol. 5(1), pp. 67\u201386, 1992.","journal-title":"Journal of Cryptology"},{"key":"24_CR18","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"527","DOI":"10.1007\/3-540-46416-6_48","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u2019 91","author":"M. J. Mihaljevi\u0107","year":"1991","unstructured":"M. J. Mihaljevi\u0107 and J. Dj. Goli\u0107, \u201cA comparison of cryptanalytic principles based on iterative error-correction,\u201d Advances in Cryptology \u2014 EUROCRYPT\u2019 91, Lecture Notes in Computer Science, vol. 547, D. W. Davies ed., Springer-Verlag, pp. 527\u2013531, 1991."},{"key":"24_CR19","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1007\/3-540-47555-9_11","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u2019 92","author":"M. J. Mihaljevi\u0107","year":"1993","unstructured":"M. J. Mihaljevi\u0107 and J. Dj. Goli\u0107, \u201cConvergence of a Bayesian iterative error-correction procedure on a noisy shift register sequence,\u201d Advances in Cryptology \u2014 EUROCRYPT\u2019 92, Lecture Notes in Computer Science, vol. 658, R. A. Rueppel ed., Springer-Verlag, pp. 124\u2013137, 1993."},{"key":"24_CR20","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/BFb0032354","volume-title":"Cryptographic Policy and Algorithms \u2014 Brisbane\u2019 95","author":"W. Millan","year":"1996","unstructured":"W. Millan, \u201cLow order approximation of cipher functions,\u201d Cryptographic Policy and Algorithms \u2014 Brisbane\u2019 95, Lecture Notes in Computer Science, vol. 1029, E. Dawson and J. Goli\u0107 eds., Springer-Verlag, pp. 144\u2013155, 1996."},{"key":"24_CR21","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-82865-2","volume-title":"Analysis and Design of Stream Ciphers","author":"R. A. Rueppel","year":"1986","unstructured":"R. A. Rueppel, Analysis and Design of Stream Ciphers. Berlin: Springer-Verlag, 1986."},{"key":"24_CR22","doi-asserted-by":"publisher","first-page":"776","DOI":"10.1109\/TIT.1984.1056949","volume":"IT-30","author":"T. Siegenthaler","year":"1984","unstructured":"T. Siegenthaler, \u201cCorrelation immunity of nonlinear combining functions for cryptographic applications,\u201d IEEE Trans. Inform. Theory, vol. IT-30, pp. 776\u2013780, Sept. 1984.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"24_CR23","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1109\/TC.1985.1676518","volume":"C-34","author":"T. Siegenthaler","year":"1985","unstructured":"T. Siegenthaler, \u201cDecrypting a class of stream ciphers using ciphertext only,\u201d IEEE Trans. Comput., vol. C-34, pp. 81\u201385, Jan. 1985.","journal-title":"IEEE Trans. Comput."},{"key":"24_CR24","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/3-540-39805-8_12","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u2019 85","author":"T. Siegenthaler","year":"1986","unstructured":"T. Siegenthaler, \u201cCryptanalyst\u2019s representation of nonlinearly filtered ML-sequences,\u201d Advances in Cryptology \u2014 EUROCRYPT\u2019 85, Lecture Notes in Computer Science, vol. 219, F. Pichler ed., Springer-Verlag, pp. 103\u2013110, 1986."},{"key":"24_CR25","volume-title":"The Theory of Error-Correcting Codes","author":"F. J. Williams","year":"1988","unstructured":"F. J. Williams and N. J. Sloane, The Theory of Error-Correcting Codes. Amsterdam: North-Holland, 1988."},{"key":"24_CR26","doi-asserted-by":"publisher","first-page":"569","DOI":"10.1109\/18.6037","volume":"IT-34","author":"G. Z. Xiao","year":"1988","unstructured":"G. Z. Xiao and J. L. Massey, \u201cA spectral characterization of correlation-immune combining functions,\u201d IEEE Trans. Inform. Theory, vol. IT-34, pp. 569\u2013571, May 1988.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"24_CR27","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1007\/0-387-34799-2_32","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 88","author":"K. Zeng","year":"1990","unstructured":"K. Zeng and M. Huang, \u201cOn the linear syndrome method in cryptanalysis,\u201d Advances in Cryptology \u2014 CRYPTO\u2019 88, Lecture Notes in Computer Science, vol. 403, S. Goldwasser ed., Springer-Verlag, pp. 469\u2013478, 1990."},{"key":"24_CR28","doi-asserted-by":"crossref","first-page":"1707","DOI":"10.1109\/18.104339","volume":"IT-37","author":"M. V. \u017divkovi\u0107","year":"1991","unstructured":"M. V. \u017divkovi\u0107, \u201cOn two probabilistic decoding algorithms for binary linear codes,\u201d IEEE Trans. Inform. Theory, vol. IT-37, pp. 1707\u20131716, Nov. 1991.","journal-title":"IEEE Trans. Inform. Theory"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201996"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-68339-9_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,10,6]],"date-time":"2018-10-06T08:41:27Z","timestamp":1538815287000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-68339-9_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1996]]},"ISBN":["9783540611868","9783540683391"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/3-540-68339-9_24","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1996]]}}}