{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T14:15:37Z","timestamp":1725804937834},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319115191"},{"type":"electronic","value":"9783319115207"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11520-7_44","type":"book-chapter","created":{"date-parts":[[2014,9,12]],"date-time":"2014-09-12T05:05:05Z","timestamp":1410498305000},"page":"427-436","source":"Crossref","is-referenced-by-count":3,"title":["Inapplicability of Fault Attacks against Trivium on a Cellular Automata Based Stream Cipher"],"prefix":"10.1007","author":[{"given":"Jimmy","family":"Jose","sequence":"first","affiliation":[]},{"given":"Sourav","family":"Das","sequence":"additional","affiliation":[]},{"given":"Dipanwita Roy","family":"Chowdhury","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"44_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"601","DOI":"10.1007\/978-3-642-33350-7_62","volume-title":"Cellular Automata","author":"S. Das","year":"2012","unstructured":"Das, S., Roy Chowdhury, D.: CASTREAM: A New Stream Cipher Suitable for Both Hardware and Software. In: Sirakoulis, G.C., Bandini, S. (eds.) ACRI 2012. LNCS, vol.\u00a07495, pp. 601\u2013610. Springer, Heidelberg (2012)"},{"key":"44_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/978-3-642-15979-4_26","volume-title":"Cellular Automata","author":"S. Das","year":"2010","unstructured":"Das, S., Roy Chowdhury, D.: Generating Cryptographically Suitable Non-linear Maximum Length Cellular Automata. In: Bandini, S., Manzoni, S., Umeo, H., Vizzari, G. (eds.) ACRI 2010. LNCS, vol.\u00a06350, pp. 241\u2013250. Springer, Heidelberg (2010)"},{"key":"44_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-03317-9_1","volume-title":"Fast Software Encryption","author":"J.-P. Aumasson","year":"2009","unstructured":"Aumasson, J.-P., Dinur, I., Meier, W., Shamir, A.: Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium. In: Dunkelman, O. (ed.) FSE 2009. LNCS, vol.\u00a05665, pp. 1\u201322. Springer, Heidelberg (2009)"},{"key":"44_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1007\/978-3-642-01001-9_16","volume-title":"Advances in Cryptology - EUROCRYPT 2009","author":"I. Dinur","year":"2009","unstructured":"Dinur, I., Shamir, A.: Cube Attacks on Tweakable Black Box Polynomials. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol.\u00a05479, pp. 278\u2013299. Springer, Heidelberg (2009)"},{"key":"44_CR5","unstructured":"De Canniere, C., Preneel, B.: Trivium Specifcation, http:\/\/www.ecrypt.eu.org\/stream\/triviump3.html (accessed February 25, 2014)"},{"key":"44_CR6","series-title":"LNCS","first-page":"502","volume-title":"FSE 2013","author":"P.A. Fouque","year":"2014","unstructured":"Fouque, P.A., Vannet, T.: Improving Key Recovery to 784 and 799 rounds of Trivium using Optimized Cube Attacks. In: Moriai, S. (ed.) FSE 2013. LNCS, vol.\u00a08424, pp. 502\u2013517. Springer, Heidelberg (2014)"},{"key":"44_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1007\/978-3-540-28632-5_18","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"J.J. Hoch","year":"2004","unstructured":"Hoch, J.J., Shamir, A.: Fault Analysis of Stream Ciphers. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 240\u2013253. Springer, Heidelberg (2004)"},{"key":"44_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1007\/978-3-540-71039-4_10","volume-title":"Fast Software Encryption","author":"M. Hojs\u00edk","year":"2008","unstructured":"Hojs\u00edk, M., Rudolf, B.: Differential Fault Analysis of Trivium. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol.\u00a05086, pp. 158\u2013172. Springer, Heidelberg (2008)"},{"key":"44_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/978-3-540-89754-5_19","volume-title":"Progress in Cryptology - INDOCRYPT 2008","author":"M. Hojs\u00edk","year":"2008","unstructured":"Hojs\u00edk, M., Rudolf, B.: Floating Fault Analysis of Trivium. In: Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. LNCS, vol.\u00a05365, pp. 239\u2013250. Springer, Heidelberg (2008)"},{"key":"44_CR10","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/s10623-011-9518-9","volume":"62","author":"Y. Hu","year":"2011","unstructured":"Hu, Y., Gao, J., Liu, Q., Zhang, Y.: Fault analysis of Trivium. Design Code and Cryptograpy\u00a062, 289\u2013311 (2011), doi:10.1007\/s10623\u2013011\u20139518\u20139","journal-title":"Design Code and Cryptograpy"},{"key":"44_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/978-3-642-17373-8_8","volume-title":"Advances in Cryptology - ASIACRYPT 2010","author":"S. Knellwolf","year":"2010","unstructured":"Knellwolf, S., Meier, W., Naya-Plasencia, M.: Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol.\u00a06477, pp. 130\u2013145. Springer, Heidelberg (2010)"},{"key":"44_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/978-3-642-28496-0_12","volume-title":"Selected Areas in Cryptography","author":"S. Knellwolf","year":"2012","unstructured":"Knellwolf, S., Meier, W., Naya-Plasencia, M.: Conditional Differential Cryptanalysis of Trivium and KATAN. In: Miri, A., Vaudenay, S. (eds.) SAC 2011. LNCS, vol.\u00a07118, pp. 200\u2013212. Springer, Heidelberg (2012)"},{"key":"44_CR13","doi-asserted-by":"crossref","unstructured":"Mohamed, M.S.E., Bulygin, S., Buchmann, J.: Improved Differential Fault Analysis of Trivium. In: COSADE 2011, pp. 147\u2013158 (2011)","DOI":"10.1007\/978-3-642-23141-4_7"},{"issue":"2","key":"44_CR14","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/s12095-012-0079-1","volume":"5","author":"S. Das","year":"2013","unstructured":"Das, S., RoyChoudhury, D.: CAR30: A new scalable stream cipher with rule 30. Cryptography and Communications\u00a05(2), 137\u2013162 (2013)","journal-title":"Cryptography and Communications"},{"key":"44_CR15","unstructured":"The Estream Project, http:\/\/www.ecrypt.eu.org\/stream\/ (accessed February 25, 2014)"}],"container-title":["Lecture Notes in Computer Science","Cellular Automata"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11520-7_44","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,14]],"date-time":"2019-08-14T22:44:27Z","timestamp":1565822667000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-11520-7_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319115191","9783319115207"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11520-7_44","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}