{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T15:15:40Z","timestamp":1753888540628},"publisher-location":"London","reference-count":7,"publisher":"Springer London","isbn-type":[{"type":"print","value":"9781852331962"},{"type":"electronic","value":"9781447105510"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/978-1-4471-0551-0_15","type":"book-chapter","created":{"date-parts":[[2011,8,26]],"date-time":"2011-08-26T04:46:19Z","timestamp":1314333979000},"page":"213-227","source":"Crossref","is-referenced-by-count":7,"title":["Edit Probability Correlation Attack on the Alternating Step Generator"],"prefix":"10.1007","author":[{"given":"Jovan Dj.","family":"Goli\u0107","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Renato","family":"Menicocci","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"15_CR1","first-page":"472","volume-title":"Cryptology - EUROCRYPT \u201882, Lecture Notes in Computer Science","author":"JD Golie","year":"1993","unstructured":"J. Dj. Golie and S. Petrovi\u00e9, \u201cA generalized correlation attack with a probabilistic constrained edit distance,\u201d Advances in Cryptology - EUROCRYPT \u201882, Lecture Notes in Computer Science, vol. 658, R. A. Rueppel ed., Springer-Verlag, pp. 472\u2013476, 1993."},{"key":"15_CR2","first-page":"230","volume-title":"Cryptology - EUROCRYPT \u201884, Lecture Notes in Computer Science","author":"JD Goli\u00e9","year":"1995","unstructured":"J. Dj. Goli\u00e9 and L. O\u2019Connor, \u201cEmbedding and probabilistic correlation attacks on clock-controlled shift registers,\u201d Advances in Cryptology - EUROCRYPT \u201884, Lecture Notes in Computer Science, vol. 950, A. De Santis ed., Springer-Verlag, pp. 230\u2013243, 1995."},{"key":"15_CR3","first-page":"499","volume-title":"Cryptology - CRYPTO \u201887, Lecture Notes in Computer Science","author":"JD Goli\u00e9","year":"1997","unstructured":"J. Dj. Goli\u00e9 and R. Menicocci, \u201cEdit distance correlation attack on the alternating step generator,\u201d Advances in Cryptology - CRYPTO \u201887, Lecture Notes in Computer Science, vol. 1294, B. Kaliski ed., Springer-Verlag, pp. 499\u2013512, 1997."},{"key":"15_CR4","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1109\/49.17716","volume":"7","author":"D Gollmann","year":"1989","unstructured":"D. Gollmann and W. G. Chambers, \u201cClock-controlled shift registers: A review,\u201d IEEE Journal on Selected Areas in Communications, vol. 7, pp. 525\u2013533, May 1989.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"15_CR5","first-page":"5","volume-title":"Cryptology - EUROCRYPT \u201887, Lecture Notes in Computer Science","author":"CG G\u00fcnther","year":"1988","unstructured":"C. G. G\u00fcnther, \u201cAlternating step generators controlled by de Bruijn sequences,\u201d Advances in Cryptology - EUROCRYPT \u201887, Lecture Notes in Computer Science, vol. 304, D. Chaum and W. L. Price eds., Springer-Verlag, pp. 5\u201314, 1988."},{"key":"15_CR6","volume-title":"Handbook of Applied Cryptography","author":"A Menezes","year":"1997","unstructured":"A. Menezes, P. van Oorschot, and S. Vanstone, Handbook of Applied Cryptography. New York: CRC Press, 1997."},{"key":"15_CR7","first-page":"164","volume-title":"Cryptology - CRYPTO \u201889, Lecture Notes in Computer Science","author":"K Zeng","year":"1990","unstructured":"K. Zeng, C. H. Yang, and T. R. N. Rao, \u201cOn the linear consistency test (LCT) in cryptanalysis with applications,\u201d Advances in Cryptology - CRYPTO \u201889, Lecture Notes in Computer Science, vol. 435, G. Brassard ed., Springer-Verlag, pp. 164\u2013174, 1990."}],"container-title":["Sequences and their Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4471-0551-0_15.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T20:26:14Z","timestamp":1619814374000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4471-0551-0_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9781852331962","9781447105510"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-1-4471-0551-0_15","relation":{},"subject":[],"published":{"date-parts":[[1999]]}}}