{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:26:37Z","timestamp":1725488797748},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540642657"},{"type":"electronic","value":"9783540697107"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/3-540-69710-1_4","type":"book-chapter","created":{"date-parts":[[2007,8,9]],"date-time":"2007-08-09T16:50:55Z","timestamp":1186678255000},"page":"49-59","source":"Crossref","is-referenced-by-count":2,"title":["JEROBOAM"],"prefix":"10.1007","author":[{"given":"Herv\u00e9","family":"Chabanne","sequence":"first","affiliation":[]},{"given":"Emmanuel","family":"Michon","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[1998,10,16]]},"reference":[{"key":"4_CR1","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1137\/0217016","volume":"17","author":"A.M. Frieze","year":"1988","unstructured":"FRIEZE A.M., HASTAD J., KANNAN R., LAGARIAS J.C., SHAMIR A., \u201cReconstructing truncated integer variables satisfying linear congruences\u201d SIAM Jour. Comp., 17 (1988) 262\u2013280.","journal-title":"SIAM Jour. Comp."},{"key":"4_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1007\/3-540-58108-1_8","volume-title":"Fast software encryption, Cambridge Security Work-shop","author":"P. Rogaway","year":"1994","unstructured":"ROGAWAY P., COPPERSMITH D., \u201cA software-optimized encryption algorithm\u201d R. Anderson, editor, Fast software encryption, Cambridge Security Work-shop, (LNCS 809) 56\u201363, 1994."},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"KNUTH D.E., The Art of Computer Programming, volume 2, Addison-Wesley, 1984.","DOI":"10.1093\/comjnl\/27.2.97"},{"key":"4_CR4","unstructured":"MICHON E., Rapport de stage d\u2019option scientifique: \u00e9tude cryptologique du chiffreur JEROBOAM, Document LaTeX 2\u03b5, 74 ko, Ecole Polytechnique, june 1997."},{"key":"4_CR5","unstructured":"MARSAGLIA G., Diehard, http:\/\/ftpstat.fsu.edu\/pub\/diehard\/diehard.zip ."},{"key":"4_CR6","doi-asserted-by":"publisher","first-page":"331","DOI":"10.2307\/2008698","volume":"54","author":"G.S. Fishman","year":"1990","unstructured":"FISHMAN G.S., \u201cMultiplicative congruential random number generators with modulus 2\u03b2\u201d Math. Comp., 54 (1990) 331\u2013344.","journal-title":"Math. Comp."},{"key":"4_CR7","unstructured":"INTEL, Developers\u2019 insight CDROM, january 1997, F. Instruction format and timing, in http:\/\/\/design\/pentium\/manuals\/241430_4.pdf ."},{"key":"4_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1007\/3-540-46877-3_35","volume-title":"EUROCRYPT 90, Advances in Cryptology","author":"X. Lai","year":"1991","unstructured":"LAI X., MASSEY J.L., \u201cA proposal for a new block encryption standard\u201d I. Darmg\u00e5rd, editor, EUROCRYPT 90, Advances in Cryptology, (LNCS 473) 389\u2013404, 1991."},{"key":"4_CR9","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1137\/0907002","volume":"7","author":"G.S. Fishman","year":"1986","unstructured":"FISHMAN G.S., MOORE L.R. \u201cAn exhaustive analysis of multiplicative congruential random number generators with modulus 231 \u2212 1\u201d SIAM Jour. Comp., 7 (1986), 24\u201345.","journal-title":"SIAM Jour. Comp."},{"key":"4_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1007\/3-540-60865-6_41","volume-title":"Fast Software Encryption, Third International Workshop","author":"R.J. Jenkins","year":"1996","unstructured":"JENKINS R.J., \u201cISAAC\u201d D. Gollman, editor, Fast Software Encryption, Third International Workshop, (LNCS 1039) 41\u201350, 1996."},{"key":"4_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1007\/3-540-46416-6_2","volume-title":"EUROCRYPT 91, Advances in Cryptology","author":"X. Lai","year":"1991","unstructured":"LAI X., MASSEY J.L., MURPHY S., \u201cMarkov ciphers and differential cryptanalysis\u201d D.W. Davies, editor, EUROCRYPT 91, Advances in Cryptology, (LNCS 547) 17\u201338, 1991."}],"container-title":["Lecture Notes in Computer Science","Fast Software Encryption"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-69710-1_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T17:58:59Z","timestamp":1556733539000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-69710-1_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540642657","9783540697107"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/3-540-69710-1_4","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1998]]}}}