{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:26:40Z","timestamp":1725488800172},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540642657"},{"type":"electronic","value":"9783540697107"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/3-540-69710-1_6","type":"book-chapter","created":{"date-parts":[[2007,8,9]],"date-time":"2007-08-09T20:50:55Z","timestamp":1186692655000},"page":"75-92","source":"Crossref","is-referenced-by-count":2,"title":["Joint Hardware \/ Software Design of a Fast Stream Cipher"],"prefix":"10.1007","author":[{"given":"Craig S. K.","family":"Clapp","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[1998,10,16]]},"reference":[{"key":"6_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"346","DOI":"10.1007\/3-540-60590-8_26","volume-title":"Fast Software Encryption","author":"R. J. Anderson","year":"1995","unstructured":"R. J. Anderson, \u201cOn Fibonacci Keystream Generators\u201d, Fast Software Encryption (Ed. B. Preneel), LNCS 1008, Springer-Verlag, 1995, pp. 346\u2013352"},{"key":"6_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1007\/3-540-58108-1_4","volume-title":"Fast Software Encryption","author":"U. Bl\u00f6cher","year":"1994","unstructured":"U. Bl\u00f6cher, M. Dichtl, \u201cFish: A Fast Software Stream Cipher\u201d, Fast Software Encryption (Ed. R. Anderson), LNCS 809, Springer-Verlag, 1994, pp. 41\u201344"},{"key":"6_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/BFb0052353","volume-title":"Fast Software Encryption","author":"C. S. K. Clapp","year":"1997","unstructured":"C. S. K. Clapp, \u201cOptimizing a Fast Stream Cipher for VLIW, SIMD, and Superscalar Processors\u201d, Fast Software Encryption (Ed. E. Biham), LNCS 1267, Springer-Verlag, 1997, pp. 273\u2013287"},{"key":"6_CR4","unstructured":"J. Daemen, Cipher and Hash Function Design-strategies based on linear and differential cryptanalysis, Doctoral Dissertation, K.U. Leuven, March 1995, pp. 172\u2013180"},{"key":"6_CR5","unstructured":"D. Knuth, The Art of Computer Programming, Volume 2-Seminumerical Algorithms, Second edition, Addison Wesley, 1981"},{"key":"6_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1007\/3-540-48329-2_3","volume-title":"Advances in Cryptology-Crypto\u2019 93","author":"D. Coppersmith","year":"1994","unstructured":"D. Coppersmith, H. Krawczyk, Y. Mansour, \u201cThe Shrinking Generator\u201d, Advances in Cryptology-Crypto\u2019 93, LNCS 773, Springer-Verlag, 1994, pp. 22\u201339"},{"key":"6_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1007\/3-540-58108-1_8","volume-title":"Fast Software Encryption","author":"P. Rogaway","year":"1994","unstructured":"P. Rogaway and D. Coppersmith, \u201cA Software-Optimized Encryption Algorithm\u201d, Fast Software Encryption (Ed. R. Anderson), LNCS 809, Springer-Verlag, 1994, pp. 56\u201363"},{"key":"6_CR8","unstructured":"B. Schneier, Applied Cryptography, Second Edition, John Wiley & Sons, 1996"},{"key":"6_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1007\/3-540-58108-1_24","volume-title":"Fast Software Encryption","author":"B. Schneier","year":"1994","unstructured":"B. Schneier, \u201cDescription of a New Variable-Length Key, 64-bit Block Cipher (Blowfish)\u201d, Fast Software Encryption (Ed. R. Anderson), LNCS 809, Springer-Verlag, 1994, pp. 191\u2013204"},{"key":"6_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1007\/3-540-58108-1_16","volume-title":"Fast Software Encryption","author":"D. J. Wheeler","year":"1994","unstructured":"D. J. Wheeler, \u201cA Bulk Data Encryption Algorithm\u201d, Fast Software Encryption (Ed. R. Anderson), LNCS 809, Springer-Verlag, 1994, pp. 127\u2013134"}],"container-title":["Lecture Notes in Computer Science","Fast Software Encryption"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-69710-1_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,10,6]],"date-time":"2018-10-06T18:33:19Z","timestamp":1538850799000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-69710-1_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540642657","9783540697107"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/3-540-69710-1_6","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1998]]}}}