{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T12:00:59Z","timestamp":1725796859539},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319091525"},{"type":"electronic","value":"9783319091532"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-09153-2_44","type":"book-chapter","created":{"date-parts":[[2014,7,2]],"date-time":"2014-07-02T10:14:42Z","timestamp":1404296082000},"page":"592-602","source":"Crossref","is-referenced-by-count":0,"title":["Weak Equivalents for Nonlinear Filtering Functions"],"prefix":"10.1007","author":[{"given":"Amparo","family":"F\u00faster-Sabater","sequence":"first","affiliation":[]},{"given":"Pino","family":"Caballero-Gil","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"44_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44448-3_1","volume-title":"Advances in Cryptology - ASIACRYPT 2000","author":"A. Biryukov","year":"2000","unstructured":"Biryukov, A., Shamir, A.: Cryptanalytic time\/Memory\/Data tradeoffs for stream ciphers. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol.\u00a01976, pp. 1\u201313. Springer, Heidelberg (2000)"},{"key":"44_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1007\/3-540-45539-6_27","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"N. Courtois","year":"2000","unstructured":"Courtois, N., Klimov, A., Patarin, J., Shamir, A.: Efficient algorithms for solving overdefined systems of multivariate polynomial equations. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 392\u2013407. Springer, Heidelberg (2000)"},{"key":"44_CR3","unstructured":"eSTREAM: the ECRYPT Stream Cipher Project, \n                    \n                      http:\/\/www.ecrypt.eu.org\/stream\/"},{"key":"44_CR4","unstructured":"Faugere, J.-C., Ars, G.: An Algebraic Cryptanalysis of Nonlinear Filter Generators using Grobner bases (2003), \n                    \n                      http:\/\/www.inria.fr\/rrrt\/rr-4739.html"},{"key":"44_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/3-540-44495-5_4","volume-title":"Progress in Cryptology - INDOCRYPT 2000","author":"E. Filiol","year":"2000","unstructured":"Filiol, E.: Decimation attack of stream ciphers. In: Roy, B., Okamoto, E. (eds.) INDOCRYPT 2000. LNCS, vol.\u00a01977, pp. 31\u201342. Springer, Heidelberg (2000)"},{"key":"44_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1007\/BFb0000426","volume-title":"Advances in Cryptology - ASIACRYPT \u201994","author":"A. F\u00faster-Sabater","year":"1995","unstructured":"F\u00faster-Sabater, A., Caballero-Gil, P.: On the linear complexity of nonlinearly filtered pn-sequences. In: Safavi-Naini, R., Pieprzyk, J.P. (eds.) ASIACRYPT 1994. LNCS, vol.\u00a0917, pp. 80\u201390. Springer, Heidelberg (1995)"},{"key":"44_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1007\/3-540-48285-7_15","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"R.A. Games","year":"1994","unstructured":"Games, R.A., Rushanan, J.J.: Blind synchronization of m-sequences with even span. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 168\u2013180. Springer, Heidelberg (1994)"},{"key":"44_CR8","unstructured":"Garey, M.R., Johnson, D.S.: Computers and Interactability. Freeman and Company (1979)"},{"issue":"10","key":"44_CR9","doi-asserted-by":"publisher","first-page":"1100","DOI":"10.1109\/12.888045","volume":"49","author":"J.D. Golic","year":"2000","unstructured":"Golic, J.D., Clark, A., Dawson, E.: Generalized inversion attack on nonlinear filter generators. IEEE Transactions on Computers\u00a049(10), 1100\u20131109 (2000)","journal-title":"IEEE Transactions on Computers"},{"key":"44_CR10","volume-title":"Shift Register-Sequences","author":"S.W. Golomb","year":"1982","unstructured":"Golomb, S.W.: Shift Register-Sequences. Aegean Park Press, Laguna Hill (1982)"},{"key":"44_CR11","unstructured":"Hell, M., Johansson, T., Meier, W.: Grain - A Stream Cipher for Constrained Environments (2005), \n                    \n                      http:\/\/www.ecrypt.eu.org\/stream\/p3ciphers\/grain\/Grain_p3.pdf"},{"issue":"6","key":"44_CR12","doi-asserted-by":"publisher","first-page":"732","DOI":"10.1109\/TIT.1976.1055626","volume":"22","author":"E.L. Key","year":"1976","unstructured":"Key, E.L.: An analysis of the structure and complexity of nonlinear binary sequence generators. IEEE Transactions on Information Theory\u00a022(6), 732\u2013736 (1976)","journal-title":"IEEE Transactions on Information Theory"},{"key":"44_CR13","unstructured":"Lohlein, B.: Design and analysis of cryptographic secure keystream generators for stream cipher encryption. PhD thesis, Faculty of Electrical and Information Engineering, University of Hagen, Germany (2001)"},{"issue":"1","key":"44_CR14","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/TIT.1969.1054260","volume":"IT-15","author":"J.L. Massey","year":"1969","unstructured":"Massey, J.L.: Shift-register synthesis and BCH decoding. IEEE Transactions on Information Theory\u00a0IT-15(1), 122\u2013127 (1969)","journal-title":"IEEE Transactions on Information Theory"},{"issue":"3","key":"44_CR15","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/BF02252874","volume":"1","author":"W. Meier","year":"1989","unstructured":"Meier, W., Staffelbach, O.J.: Fast correlation attacks on stream ciphers. Journal of Cryptology\u00a01(3), 159\u2013176 (1989)","journal-title":"Journal of Cryptology"},{"issue":"7","key":"44_CR16","doi-asserted-by":"publisher","first-page":"3398","DOI":"10.1109\/TIT.2009.2021316","volume":"55","author":"E. Pasalic","year":"2009","unstructured":"Pasalic, E.: On guess and determine cryptanalysis of LFSR-based stream ciphers. IEEE Transactions on Information Theory\u00a055(7), 3398\u20133406 (2009)","journal-title":"IEEE Transactions on Information Theory"},{"key":"44_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1007\/978-3-642-13858-4_3","volume-title":"Fast Software Encryption","author":"S. R\u00f8njom","year":"2010","unstructured":"R\u00f8njom, S., Cid, C.: Nonlinear equivalence of stream ciphers. In: Hong, S., Iwata, T. (eds.) FSE 2010. LNCS, vol.\u00a06147, pp. 40\u201354. Springer, Heidelberg (2010)"},{"key":"44_CR18","doi-asserted-by":"crossref","unstructured":"Rueppel, R.A.: Analysis and Design of Stream Ciphers. Springer (1986)","DOI":"10.1007\/978-3-642-82865-2"},{"key":"44_CR19","unstructured":"Schneider, M.: Methods of generating binary pseudo-random sequences for stream cipher encryption. PhD thesis, Faculty of Electrical Engineering, University of Hagen, Germany (1999)"},{"issue":"1","key":"44_CR20","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1109\/TC.1985.1676518","volume":"100","author":"T. Siegenthaler","year":"1985","unstructured":"Siegenthaler, T.: Decrypting a class of stream ciphers using ciphertext only. IEEE Transactions on Computers\u00a0100(1), 81\u201385 (1985)","journal-title":"IEEE Transactions on Computers"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2014"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-09153-2_44","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T06:09:15Z","timestamp":1558937355000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-09153-2_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319091525","9783319091532"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-09153-2_44","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}