{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T11:38:01Z","timestamp":1777030681257,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540629757","type":"print"},{"value":"9783540690535","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1997]]},"DOI":"10.1007\/3-540-69053-0_17","type":"book-chapter","created":{"date-parts":[[2007,8,5]],"date-time":"2007-08-05T21:24:05Z","timestamp":1186349045000},"page":"239-255","source":"Crossref","is-referenced-by-count":166,"title":["Cryptanalysis of Alleged A5 Stream Cipher"],"prefix":"10.1007","author":[{"given":"Jovan Dj.","family":"Goli\u0107","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,13]]},"reference":[{"key":"17_CR1","unstructured":"R. J. Anderson, Internet communication."},{"key":"17_CR2","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-65371-1","volume-title":"Branching Processes","author":"K. B. Athreya","year":"1972","unstructured":"K. B. Athreya and P. E. Ney, Branching Processes. Berlin: Springer-Verlag, 1972."},{"key":"17_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1007\/3-540-48285-7_14","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u2019 92","author":"J. Daemen","year":"1994","unstructured":"J. Daemen, R. Govaerts, and J. Vandewalle, \u201cResynchronization weakness in synchronous stream ciphers,\u201d Advances in Cryptology \u2014 EUROCRYPT\u2019 92, Lecture Notes in Computer Science, vol. 765, T. Helleseth ed., Springer-Verlag, pp. 159\u2013167, 1994."},{"issue":"3","key":"17_CR4","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/BF00196912","volume":"3","author":"J. Dj. Goli\u0107","year":"1991","unstructured":"J. Dj. Goli\u0107 and M. J. Mihaljevi\u0107, \u201cA generalized correlation attack on a class of stream ciphers based on the Levenshtein distance,\u201d Journal of Cryptology, vol. 3(3), pp. 201\u2013212, 1991.","journal-title":"Journal of Cryptology"},{"key":"17_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1007\/3-540-58108-1_12","volume-title":"Fast Software Encryption \u2014 Cambridge\u2019 93","author":"J. Dj. Goli\u0107","year":"1994","unstructured":"J. Dj. Goli\u0107, \u201cOn the security of shift register based keystream generators,\u201d Fast Software Encryption \u2014 Cambridge\u2019 93, Lecture Notes in Computer Science, vol. 809, R. J. Anderson ed., Springer-Verlag, pp. 90\u2013100, 1994."},{"key":"17_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"248","DOI":"10.1007\/3-540-49264-X_20","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u2019 95","author":"J. Dj. Goli\u0107","year":"1995","unstructured":"J. Dj. Goli\u0107, \u201cTowards fast correlation attacks on irregularly clocked shift registers,\u201d Advances in Cryptology \u2014 EUROCRYPT\u2019 95, Lecture Notes in Computer Science, vol. 921, L. C. Guillou and J.-J. Quisquater eds., Springer-Verlag, pp. 248\u2013262, 1995."},{"key":"17_CR7","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/12.481485","volume":"C-45","author":"J. Dj. Goli\u0107","year":"1996","unstructured":"J. Dj. Goli\u0107, \u201cLinear models for keystream generators,\u201d IEEE Trans. Computers, vol. C-45, pp. 41\u201349, Jan. 1996.","journal-title":"IEEE Trans. Computers"},{"key":"17_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1007\/3-540-60865-6_52","volume-title":"Fast Software Encryption \u2014 Cambridge\u2019 96","author":"J. Dj. Goli\u0107","year":"1996","unstructured":"J. Dj. Goli\u0107, \u201cOn the security of nonlinear filter generators,\u201d Fast Software Encryption \u2014 Cambridge\u2019 96, Lecture Notes in Computer Science, vol. 1039, D. Gollmann ed., Springer-Verlag, pp. 173\u2013188, 1996."},{"key":"17_CR9","unstructured":"J. Dj. Goli\u0107, A. Clark, and E. Dawson, \u201cGeneralized inversion attack on nonlinear filter generators,\u201d submitted."},{"key":"17_CR10","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-51866-9","volume-title":"The Theory of Branching Processes","author":"T. H. Harris","year":"1963","unstructured":"T. H. Harris, The Theory of Branching Processes. Berlin: Springer-Verlag, 1963."},{"key":"17_CR11","unstructured":"R. Menicocci, \u201cCryptanalysis of a two-stage Gollmann cascade generator,\u201d Proceedings of SPRC\u2019 93, Rome, Italy, pp. 62\u201369, 1993."},{"key":"17_CR12","first-page":"65","volume-title":"Contemporary Cryptology: The Science of Information Integrity","author":"R. A. Rueppel","year":"1991","unstructured":"R. A. Rueppel, \u201cStream ciphers,\u201d Contemporary Cryptology: The Science of Information Integrity, G. Simmons ed., pp. 65\u2013134. New York: IEEE Press, 1991."},{"key":"17_CR13","volume-title":"Applied Cryptography","author":"B. Schneier","year":"1996","unstructured":"B. Schneier, Applied Cryptography. New York: Wiley, 1996."},{"key":"17_CR14","unstructured":"S. Shepherd and W. Chambers, private communication."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201997"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-69053-0_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,20]],"date-time":"2019-02-20T19:38:37Z","timestamp":1550691517000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-69053-0_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997]]},"ISBN":["9783540629757","9783540690535"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/3-540-69053-0_17","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[1997]]}}}