{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T06:56:30Z","timestamp":1761807390223},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540629757"},{"type":"electronic","value":"9783540690535"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1997]]},"DOI":"10.1007\/3-540-69053-0_16","type":"book-chapter","created":{"date-parts":[[2007,8,5]],"date-time":"2007-08-05T21:24:05Z","timestamp":1186349045000},"page":"226-238","source":"Crossref","is-referenced-by-count":63,"title":["Linear Statistical Weakness of Alleged RC4 Keystream Generator"],"prefix":"10.1007","author":[{"given":"Jovan Dj.","family":"Goli\u0107","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,13]]},"reference":[{"key":"16_CR1","unstructured":"Ameritech Mobile Communications et al., \u201cCellular digital packet data system specifications, part 406: airlink security,\u201d CDPD Industry Input Coordinator, Costa Mesa, Calif., July 1993."},{"key":"16_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1007\/3-540-48285-7_14","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u2019 92","author":"J. Daemen","year":"1994","unstructured":"J. Daemen, R. Govaerts, and J. Vandewalle, \u201cResynchronization weakness in synchronous stream ciphers,\u201d Advances in Cryptology \u2014 EUROCRYPT\u2019 92, Lecture Notes in Computer Science, vol. 765, T. Helleseth ed., Springer-Verlag, pp. 159\u2013167, 1994."},{"key":"16_CR3","volume-title":"An Introduction to Probability Theory and its Applications","author":"W. Feller","year":"1968","unstructured":"W. Feller, An Introduction to Probability Theory and its Applications. New York: Wiley, 3. edition, vol. 1, 1968.","edition":"3. edition"},{"key":"16_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1007\/3-540-46885-4_34","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u2019 89","author":"P. Flajolet","year":"1990","unstructured":"P. Flajolet and A. M. Odlyzko, \u201cRandom mapping statistics,\u201d Advances in Cryptology \u2014 EUROCRYPT\u2019 89, Lecture Notes in Computer Science, vol. 434, J.-J. Quisquater and J. Vandewalle eds., Springer-Verlag, pp. 329\u2013354, 1990."},{"key":"16_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/3-540-47555-9_10","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u2019 92","author":"J. Dj. Goli\u0107","year":"1993","unstructured":"J. Dj. Goli\u0107, \u201cCorrelation via linear sequential circuit approximation of combiners with memory,\u201d Advances in Cryptology \u2014 EUROCRYPT\u2019 92, Lecture Notes in Computer Science, vol. 658, R. A. Rueppel ed., Springer-Verlag, pp. 113\u2013123, 1993."},{"key":"16_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1007\/3-540-58108-1_12","volume-title":"Fast Software Encryption \u2014 Cambridge\u2019 93","author":"J. Dj. Goli\u0107","year":"1994","unstructured":"J. Dj. Goli\u0107, \u201cOn the security of shift register based keystream generators,\u201d Fast Software Encryption \u2014 Cambridge\u2019 93, Lecture Notes in Computer Science, vol. 809, R. J. Anderson ed., Springer-Verlag, pp. 90\u2013100, 1994."},{"key":"16_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/BFb0000427","volume-title":"Advances in Cryptology \u2014 ASIACRYPT\u2019 94","author":"J. Dj. Goli\u0107","year":"1995","unstructured":"J. Dj. Goli\u0107, \u201cIntrinsic statistical weakness of keystream generators,\u201d Advances in Cryptology \u2014 ASIACRYPT\u2019 94, Lecture Notes in Computer Science, vol. 917, J. Pieprzyk and R. Safavi-Naini eds., Springer-Verlag, pp. 91\u2013103, 1995."},{"key":"16_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"248","DOI":"10.1007\/3-540-49264-X_20","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u2019 95","author":"J. Dj. Goli\u0107","year":"1995","unstructured":"J. Dj. Goli\u0107, \u201cTowards fast correlation attacks on irregularly clocked shift registers,\u201d Advances in Cryptology \u2014 EUROCRYPT\u2019 95, Lecture Notes in Computer Science, vol. 921, L. C. Guillou and J.-J. Quisquater eds., Springer-Verlag, pp. 248\u2013262, 1995."},{"key":"16_CR9","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/12.481485","volume":"C-45","author":"J. Dj. Goli\u0107","year":"1996","unstructured":"J. Dj. Goli\u0107, \u201cLinear models for keystream generators,\u201d IEEE Trans. Computers, vol. C-45, pp. 41\u201349, Jan. 1996.","journal-title":"IEEE Trans. Computers"},{"key":"16_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1007\/3-540-60865-6_52","volume-title":"Fast Software Encryption \u2014 Cambridge\u2019 96","author":"J. Dj. Goli\u0107","year":"1996","unstructured":"J. Dj. Goli\u0107, \u201cOn the security of nonlinear filter generators,\u201d Fast Software Encryption \u2014 Cambridge\u2019 96, Lecture Notes in Computer Science, vol. 1039, D. Gollmann ed., Springer-Verlag, pp. 173\u2013188, 1996."},{"key":"16_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1007\/3-540-60865-6_41","volume-title":"Fast Software Encryption \u2014 Cambridge\u2019 96","author":"R. J. Jenkins Jr.","year":"1996","unstructured":"R. J. Jenkins Jr., \u201cISAAC,\u201d Fast Software Encryption \u2014 Cambridge\u2019 96, Lecture Notes in Computer Science, vol. 1039, D. Gollmann ed., Springer-Verlag, pp. 41\u201349, 1996."},{"key":"16_CR12","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1145\/321250.321257","volume":"15","author":"M. D. MacLaren","year":"1965","unstructured":"M. D. MacLaren and G. Marsaglia, \u201cUniform random number generation,\u201d J. ACM, vol. 15, pp. 83\u201389, 1965.","journal-title":"J. ACM"},{"issue":"3","key":"16_CR13","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/BF02252874","volume":"1","author":"W. Meier","year":"1989","unstructured":"W. Meier and O. Staffelbach, \u201cFast correlation attacks on certain stream ciphers,\u201d Journal of Cryptology, vol. 1(3), pp. 159\u2013176, 1989.","journal-title":"Journal of Cryptology"},{"issue":"1","key":"16_CR14","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/BF00191322","volume":"5","author":"W. Meier","year":"1992","unstructured":"W. Meier and O. Staffelbach, \u201cCorrelation properties of combiners with memory in stream ciphers,\u201d Journal of Cryptology, vol. 5(1), pp. 67\u201386, 1992.","journal-title":"Journal of Cryptology"},{"key":"16_CR15","unstructured":"R. L. Rivest, \u201cThe RC4 encryption algorithm,\u201d RSA Data Security, Inc., Mar. 1992."},{"key":"16_CR16","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-82865-2","volume-title":"Analysis and Design of Stream Ciphers","author":"R. A. Rueppel","year":"1986","unstructured":"R. A. Rueppel, Analysis and Design of Stream Ciphers. Berlin: Springer-Verlag, 1986."},{"key":"16_CR17","first-page":"65","volume-title":"Contemporary Cryptology: The Science of Information Integrity","author":"R. A. Rueppel","year":"1991","unstructured":"R. A. Rueppel, \u201cStream ciphers,\u201d Contemporary Cryptology: The Science of Information Integrity, G. Simmons ed., pp. 65\u2013134. New York: IEEE Press, 1991."},{"key":"16_CR18","volume-title":"Applied Cryptography","author":"B. Schneier","year":"1996","unstructured":"B. Schneier, Applied Cryptography. New-York: Wiley, 1996."},{"key":"16_CR19","doi-asserted-by":"publisher","first-page":"776","DOI":"10.1109\/TIT.1984.1056949","volume":"IT-30","author":"T. Siegenthaler","year":"1984","unstructured":"T. Siegenthaler, \u201cCorrelation immunity of nonlinear combining functions for cryptographic applications,\u201d IEEE Trans. Inform. Theory, vol. IT-30, pp. 776\u2013780, Sept. 1984.","journal-title":"IEEE Trans. Inform. Theory"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201997"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-69053-0_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,20]],"date-time":"2019-02-20T21:19:52Z","timestamp":1550697592000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-69053-0_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997]]},"ISBN":["9783540629757","9783540690535"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/3-540-69053-0_16","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1997]]}}}