{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T07:49:27Z","timestamp":1772437767103,"version":"3.50.1"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319018539","type":"print"},{"value":"9783319018546","type":"electronic"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-01854-6_51","type":"book-chapter","created":{"date-parts":[[2013,8,8]],"date-time":"2013-08-08T06:47:25Z","timestamp":1375944445000},"page":"499-508","source":"Crossref","is-referenced-by-count":7,"title":["Analysis and Implementation of the SNOW 3G Generator Used in 4G\/LTE Systems"],"prefix":"10.1007","author":[{"given":"J.","family":"Molina-Gil","sequence":"first","affiliation":[]},{"given":"P.","family":"Caballero-Gil","sequence":"additional","affiliation":[]},{"given":"C.","family":"Caballero-Gil","sequence":"additional","affiliation":[]},{"given":"Amparo","family":"F\u00faster-Sabater","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"51_CR1","unstructured":"ETSI\/SAGE. Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2. Document 2: SNOW 3G Specification, version 1.1 (September 2006), \n                    http:\/\/www.3gpp.org\/ftp\/"},{"key":"51_CR2","unstructured":"Ekdahl, P., Johansson, T.: SNOW - a new stream cipher. In: Proceedings of NESSIE Workshop (2000)"},{"key":"51_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-36492-7_5","volume-title":"Selected Areas in Cryptography","author":"P. Ekdahl","year":"2003","unstructured":"Ekdahl, P., Johansson, T.: A New Version of the Stream Cipher SNOW. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol.\u00a02595, pp. 47\u201361. Springer, Heidelberg (2003)"},{"key":"51_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/3-540-36492-7_4","volume-title":"Selected Areas in Cryptography","author":"P. Hawkes","year":"2003","unstructured":"Hawkes, P., Rose, G.G.: Guess-and-determine attacks on SNOW. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol.\u00a02595, pp. 37\u201346. Springer, Heidelberg (2003)"},{"key":"51_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1007\/3-540-45708-9_33","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"D. Coppersmith","year":"2002","unstructured":"Coppersmith, D., Halevi, S., Jutla, C.S.: Cryptanalysis of stream ciphers with linear masking. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.\u00a02442, pp. 515\u2013532. Springer, Heidelberg (2002)"},{"key":"51_CR6","unstructured":"ISO\/IEC 18033-4:2005. Information technology - Security techniques - Encryption algorithms - Part 4: Stream ciphers, \n                    http:\/\/www.iso.org\/iso\/home\/store\/catalogue_ics\/"},{"key":"51_CR7","unstructured":"Berbain, C., Billet, O., Canteaut, A., Courtois, N., Gilbert, H., Gouget, A., Sibert, H.: Sosemanuk, a fast software-oriented stream cipher. In: eSTREAM, ECRYPT Stream Cipher. ECRYPT-Network of Excellence in Cryptology, Call for stream Cipher Primitives-Phase 2 (2005), \n                    http:\/\/www.ecrypt.eu.org\/stream"},{"key":"51_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-540-30574-3_3","volume-title":"Topics in Cryptology \u2013 CT-RSA 2005","author":"O. Billet","year":"2005","unstructured":"Billet, O., Gilbert, H.: Resistance of SNOW 2.0 Against Algebraic Attacks. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol.\u00a03376, pp. 19\u201328. Springer, Heidelberg (2005)"},{"key":"51_CR9","unstructured":"ETSI\/SAGE Technical report: Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2. Document 5: Design and Evaluation Report, Version 1.1 (September 2006)"},{"key":"51_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/11799313_10","volume-title":"Fast Software Encryption","author":"K. Nyberg","year":"2006","unstructured":"Nyberg, K., Wall\u00e9n, J.: Improved Linear Distinguishers for SNOW 2.0. In: Robshaw, M. (ed.) FSE 2006. LNCS, vol.\u00a04047, pp. 144\u2013162. Springer, Heidelberg (2006)"},{"key":"51_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1007\/978-3-540-24654-1_16","volume-title":"Selected Areas in Cryptography","author":"D. Watanabe","year":"2004","unstructured":"Watanabe, D., Biryukov, A., De Canniere, C.: A Distinguishing Attack of SNOW 2.0 with Linear Masking Method. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol.\u00a03006, pp. 222\u2013233. Springer, Heidelberg (2004)"},{"key":"51_CR12","doi-asserted-by":"crossref","unstructured":"Debraize, B., Corbella, I.M.: Fault Analysis of the Stream Cipher Snow 3G. In: Proceedings of Workshop on Fault Diagnosis and Tolerance in Cryptography, pp. 103\u2013110 (2009)","DOI":"10.1109\/FDTC.2009.33"},{"key":"51_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/978-3-642-17650-0_13","volume-title":"Information and Communications Security","author":"B.B. Brumley","year":"2010","unstructured":"Brumley, B.B., Hakala, R.M., Nyberg, K., Sovio, S.: Consecutive S-box Lookups: A Timing Attack on SNOW 3G. In: Soriano, M., Qing, S., L\u00f3pez, J. (eds.) ICICS 2010. LNCS, vol.\u00a06476, pp. 171\u2013185. Springer, Heidelberg (2010)"},{"key":"51_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/978-3-642-13708-2_9","volume-title":"Applied Cryptography and Network Security","author":"A. Biryukov","year":"2010","unstructured":"Biryukov, A., Priemuth-Schmid, D., Zhang, B.: Multiset collision attacks on reduced-round SNOW 3G and SNOW 3G\u2295. In: Zhou, J., Yung, M. (eds.) ACNS 2010. LNCS, vol.\u00a06123, pp. 139\u2013153. Springer, Heidelberg (2010)"},{"issue":"3","key":"51_CR15","first-page":"97","volume":"3","author":"G. Orhanou","year":"2010","unstructured":"Orhanou, G., El Hajji, S., Bentaleb, Y.: SNOW 3G stream cipher operation and complexity study. Contemporary Engineering Sciences\u00a03(3), 97\u2013111 (2010)","journal-title":"Contemporary Engineering Sciences"},{"key":"51_CR16","doi-asserted-by":"crossref","unstructured":"Kitsos, P., Selimis, G., Koufopavlou, O.: High performance ASIC implementation of the SNOW 3G stream cipher. In: IFIP\/IEEE VLSI-SOC (2008)","DOI":"10.4108\/ICST.MOBIMEDIA2007.1679"},{"key":"51_CR17","doi-asserted-by":"crossref","unstructured":"Delgado-Mohatar, O., F\u00faster-Sabater, A.: Software Implementation of Linear Feedback Shift Registers over Extended Fields. In: Proceedings of CISIS\/ICEUTE\/SOCO Special Sessions, pp. 117\u2013126 (2012)","DOI":"10.1007\/978-3-642-33018-6_12"}],"container-title":["Advances in Intelligent Systems and Computing","International Joint Conference SOCO\u201913-CISIS\u201913-ICEUTE\u201913"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-01854-6_51","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,19]],"date-time":"2023-02-19T15:09:08Z","timestamp":1676819348000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-01854-6_51"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319018539","9783319018546"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-01854-6_51","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]}}}