{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T05:38:41Z","timestamp":1742967521799,"version":"3.40.3"},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319197128"},{"type":"electronic","value":"9783319197135"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-19713-5_10","type":"book-chapter","created":{"date-parts":[[2015,5,26]],"date-time":"2015-05-26T13:19:45Z","timestamp":1432646385000},"page":"111-121","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Performance of the Cryptanalysis over the Shrinking Generator"],"prefix":"10.1007","author":[{"given":"Sara D.","family":"Cardell","sequence":"first","affiliation":[]},{"given":"Amparo","family":"F\u00faster-Sabater","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,5,27]]},"reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Paar, C., Pelzl, J.: Understanding Cryptography. Springer, Berlin (2010)","DOI":"10.1007\/978-3-642-04101-3"},{"key":"10_CR2","unstructured":"Golomb, S.W.: Shift Register-Sequences. Aegean Park Press, Laguna Hill (1982)"},{"key":"10_CR3","unstructured":"Coppersmith, D., Krawczyk, H., Mansour, Y.: The shrinking generator. In: Advances in Cryptology\u2014CRYPTO \u201993, vol. 773, pp. 23\u201339. Springer (1993)"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Meier, W., Staffelbach, O.: The self-shrinking generator. In Cachin, C., Camenisch, J. (eds.) Advances in Cryptology\u2014EUROCRYPT 1994. vol. 950, pp. 205\u2013214. Springer (1994)","DOI":"10.1007\/BFb0053436"},{"issue":"3","key":"10_CR5","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1109\/43.489103","volume":"15","author":"K Cattell","year":"1996","unstructured":"Cattell, K., Muzio, J.C.: One-dimensional linear hybrid cellular automata. IEEE Trans. Comput. Aided Des. 15(3), 325\u2013335 (1996)","journal-title":"IEEE Trans. Comput. Aided Des."},{"key":"10_CR6","unstructured":"Cardell, S.D., F\u00faster-Sabater, A.: Modelling the shrinking generator in terms of linear CA. Submitted to Advances in Mathematics of Communications (2014)"},{"key":"10_CR7","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1016\/j.physleta.2007.04.103","volume":"369","author":"A F\u00faster-Sabater","year":"2007","unstructured":"F\u00faster-Sabater, A., Caballero-Gil, P.: Linear solutions for cryptographic nonlinear sequence generators. Phys. Lett. A 369, 432\u2013437 (2007)","journal-title":"Phys. Lett. A"},{"issue":"3","key":"10_CR8","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1016\/j.neunet.2009.12.008","volume":"23","author":"A F\u00faster-Sabater","year":"2010","unstructured":"F\u00faster-Sabater, A., Pazo-Robles, M.E., Caballero-Gil, P.: A simple linearization of the self-shrinking generator by means of cellular automata. Neural Netw. 23(3), 461\u2013464 (2010)","journal-title":"Neural Netw."},{"key":"10_CR9","unstructured":"Wolfram, S.: Cellular automata as simple self-organizing system. Caltrech preprint CALT, pp. 68\u2013938 (1982)"},{"issue":"2","key":"10_CR10","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/s12095-012-0079-1","volume":"5","author":"S Das","year":"2013","unstructured":"Das, S., RoyChowdhury, D.: Car30: a new scalable stream cipher with rule 30. Crypt. Commun. 5(2), 137\u2013162 (2013)","journal-title":"Crypt. Commun."},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Jose, J., Das, S., RoyChowdhury, D.: Inapplicability of fault attacks against trivium on a cellular automata based stream cipher. In: 11th International Conference on Cellular Automata for Research and Industry, ACRI 2014. vol. 875, pp. 427\u2013436. Springer (2014)","DOI":"10.1007\/978-3-319-11520-7_44"}],"container-title":["Advances in Intelligent Systems and Computing","International Joint Conference"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-19713-5_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,24]],"date-time":"2023-01-24T12:44:53Z","timestamp":1674564293000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-19713-5_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319197128","9783319197135"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-19713-5_10","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"27 May 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}