{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T02:52:20Z","timestamp":1761706340121,"version":"3.40.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319269603"},{"type":"electronic","value":"9783319269610"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-26961-0_20","type":"book-chapter","created":{"date-parts":[[2015,12,16]],"date-time":"2015-12-16T08:07:52Z","timestamp":1450253272000},"page":"334-344","source":"Crossref","is-referenced-by-count":8,"title":["A New Distinguisher on Grain v1 for 106 Rounds"],"prefix":"10.1007","author":[{"given":"Santanu","family":"Sarkar","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,31]]},"reference":[{"key":"20_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-03317-9_1","volume-title":"Fast Software Encryption","author":"J-P Aumasson","year":"2009","unstructured":"Aumasson, J.-P., Dinur, I., Meier, W., Shamir, A.: Cube testers and key recovery attacks on reduced-round MD6 and trivium. In: Dunkelman, O. (ed.) FSE 2009. LNCS, vol. 5665, pp. 1\u201322. Springer, Heidelberg (2009)"},{"key":"20_CR2","unstructured":"Aumasson, J.P., Dinur, I., Henzen, L., Meier, W., Shamir, A.: Efficient FPGA implementations of high-dimensional cube testers on the stream cipher Grain-128. In: SHARCS - Special-Purpose Hardware for Attacking Cryptographic Systems (2009)"},{"key":"20_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1007\/978-3-319-08344-5_3","volume-title":"Information Security and Privacy","author":"S Banik","year":"2014","unstructured":"Banik, S.: Some insights into differential cryptanalysis of grain v1. In: Susilo, W., Mu, Y. (eds.) ACISP 2014. LNCS, vol. 8544, pp. 34\u201349. Springer, Heidelberg (2014)"},{"key":"20_CR4","unstructured":"Banik, S.: A Dynamic Cube Attack on 105 round Grain v1. IACR Cryptology ePrint Archive 2014: 652. \n                      http:\/\/eprint.iacr.org\/2014\/652"},{"key":"20_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1007\/3-540-48329-2_17","volume-title":"Advances in Cryptology - CRYPTO 1993","author":"I Ben-Aroya","year":"1994","unstructured":"Ben-Aroya, I., Biham, E.: Differential cryptanalysis of lucifer. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 187\u2013199. Springer, Heidelberg (1994)"},{"key":"20_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/11799313_2","volume-title":"Fast Software Encryption","author":"C Berbain","year":"2006","unstructured":"Berbain, C., Gilbert, H., Maximov, A.: Cryptanalysis of grain. In: Robshaw, M. (ed.) FSE 2006. LNCS, vol. 4047, pp. 15\u201329. Springer, Heidelberg (2006)"},{"key":"20_CR7","unstructured":"Bj\u00f8rstad, T.E.: Cryptanalysis of Grain using Time\/Memory\/Data tradeoffs (v1.0\/2008\u201302-25). \n                      http:\/\/www.ecrypt.eu.org\/stream"},{"key":"20_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/3-540-48285-7_14","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"J Daemen","year":"1994","unstructured":"Daemen, J., Govaerts, R., Vandewalle, J.: Resynchronization weaknesses in synchronous stream ciphers. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 159\u2013167. Springer, Heidelberg (1994)"},{"key":"20_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1007\/978-3-540-68164-9_19","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2008","author":"C Canni\u00e8re De","year":"2008","unstructured":"De Canni\u00e8re, C., K\u00fc\u00e7\u00fck, \u00d6., Preneel, B.: Analysis of grain\u2019s initialization algorithm. In: Vaudenay, S. (ed.) AFRICACRYPT 2008. LNCS, vol. 5023, pp. 276\u2013289. Springer, Heidelberg (2008)"},{"key":"20_CR10","unstructured":"De Canni\u00e8re, C., Preneel, B.: Trivium. \n                      http:\/\/www.ecrypt.eu.org\/stream\/p3ciphers\/trivium\/trivium_p3.pdf"},{"key":"20_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/978-3-642-25385-0_18","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2011","author":"I Dinur","year":"2011","unstructured":"Dinur, I., G\u00fcneysu, T., Paar, C., Shamir, A., Zimmermann, R.: An experimentally verified attack on full grain-128 using dedicated reconfigurable hardware. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 327\u2013343. Springer, Heidelberg (2011)"},{"key":"20_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1007\/978-3-642-01001-9_16","volume-title":"Advances in Cryptology - EUROCRYPT 2009","author":"I Dinur","year":"2009","unstructured":"Dinur, I., Shamir, A.: Cube attacks on tweakable black box polynomials. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 278\u2013299. Springer, Heidelberg (2009)"},{"key":"20_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/978-3-642-21702-9_10","volume-title":"Fast Software Encryption","author":"I Dinur","year":"2011","unstructured":"Dinur, I., Shamir, A.: Breaking grain-128 with dynamic cube attacks. In: Joux, A. (ed.) FSE 2011. LNCS, vol. 6733, pp. 167\u2013187. Springer, Heidelberg (2011)"},{"key":"20_CR14","unstructured":"The ECRYPT Stream Cipher Project. eSTREAM Portfolio of Stream Ciphers. Accepted 8 September 2008"},{"key":"20_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1007\/978-3-540-77026-8_20","volume-title":"Progress in Cryptology \u2013 INDOCRYPT 2007","author":"H Englund","year":"2007","unstructured":"Englund, H., Johansson, T., S\u00f6nmez Turan, M.: A framework for chosen IV statistical analysis of stream ciphers. In: Srinathan, K., Rangan, C.P., Yung, M. (eds.) INDOCRYPT 2007. LNCS, vol. 4859, pp. 268\u2013281. Springer, Heidelberg (2007)"},{"key":"20_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1007\/978-3-540-68164-9_16","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2008","author":"S Fischer","year":"2008","unstructured":"Fischer, S., Khazaei, S., Meier, W.: Chosen IV statistical analysis for key recovery attacks on stream ciphers. In: Vaudenay, S. (ed.) AFRICACRYPT 2008. LNCS, vol. 5023, pp. 236\u2013245. Springer, Heidelberg (2008)"},{"issue":"1982","key":"20_CR17","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1137\/1024041","volume":"24","author":"H Fredricksen","year":"1982","unstructured":"Fredricksen, H.: A survey of full length nonlinear shift register cycle algorithms. SIAM Rev. 24(1982), 195\u2013221 (1982)","journal-title":"SIAM Rev."},{"key":"20_CR18","unstructured":"Hell, M., Johansson, T., Meier, W.: Grain - A Stream Cipher for Constrained Environments. ECRYPT Stream Cipher Project Report 2005\/001 (2005). \n                      http:\/\/www.ecrypt.eu.org\/stream"},{"key":"20_CR19","unstructured":"Khazaei, S., Hassanzadeh, M., Kiaei, M.: Distinguishing Attack on Grain. ECRYPT Stream Cipher Project Report 2005\/071 (2005). \n                      http:\/\/www.ecrypt.eu.org\/stream"},{"key":"20_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/978-3-642-17373-8_8","volume-title":"Advances in Cryptology - ASIACRYPT 2010","author":"S Knellwolf","year":"2010","unstructured":"Knellwolf, S., Meier, W., Naya-Plasencia, M.: Conditional differential cryptanalysis of NLFSR-based cryptosystems. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 130\u2013145. Springer, Heidelberg (2010)"},{"key":"20_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/978-3-642-28496-0_12","volume-title":"Selected Areas in Cryptography","author":"S Knellwolf","year":"2012","unstructured":"Knellwolf, S., Meier, W., Naya-Plasencia, M.: Conditional differential cryptanalysis of trivium and KATAN. In: Miri, A., Vaudenay, S. (eds.) SAC 2011. LNCS, vol. 7118, pp. 200\u2013212. Springer, Heidelberg (2012)"},{"issue":"3\u20134","key":"20_CR22","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/s12095-012-0071-9","volume":"4","author":"S Knellwolf","year":"2012","unstructured":"Knellwolf, S., Meier, W.: High order differential attacks on stream ciphers. Crypt. Commun. 4(3\u20134), 203\u2013215 (2012)","journal-title":"Crypt. Commun."},{"key":"20_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-35404-5_1","volume-title":"Cryptology and Network Security","author":"M Lehmann","year":"2012","unstructured":"Lehmann, M., Meier, W.: Conditional differential cryptanalysis of grain-128a. In: Pieprzyk, J., Sadeghi, A.-R., Manulis, M. (eds.) CANS 2012. LNCS, vol. 7712, pp. 1\u201311. Springer, Heidelberg (2012)"},{"key":"20_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1007\/978-3-540-70500-0_24","volume-title":"Information Security and Privacy","author":"Y Lee","year":"2008","unstructured":"Lee, Y., Jeong, K., Sung, J., Hong, S.H.: Related-key chosen IV attacks on grain-v1 and grain-128. In: Mu, Y., Susilo, W., Seberry, J. (eds.) ACISP 2008. LNCS, vol. 5107, pp. 321\u2013335. Springer, Heidelberg (2008)"},{"issue":"2","key":"20_CR25","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1049\/iet-ifs.2011.0107","volume":"6","author":"MJ Mihaljevic","year":"2012","unstructured":"Mihaljevic, M.J., Gangopadhyay, S., Paul, G., Imai, H.: Internal state recovery of grain-v1 employing normality order of the filter function. IET Inf. Secur. 6(2), 55\u201364 (2012)","journal-title":"IET Inf. Secur."},{"key":"20_CR26","unstructured":"Stein, W.: Sage Mathematics Software. Free Software Foundation Inc. (2009). \n                      http:\/\/www.sagemath.org\n                      \n                    . (Open source project initiated by W. Stein and contributed by many)"},{"key":"20_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1007\/978-3-642-17401-8_16","volume-title":"Progress in Cryptology - INDOCRYPT 2010","author":"P Stankovski","year":"2010","unstructured":"Stankovski, P.: Greedy distinguishers and nonrandomness detectors. In: Gong, G., Gupta, K.C. (eds.) INDOCRYPT 2010. LNCS, vol. 6498, pp. 210\u2013226. Springer, Heidelberg (2010)"},{"key":"20_CR28","unstructured":"Zhang, H., Wang, X.: Cryptanalysis of Stream Cipher Grain Family. IACR Cryptology ePrint Archive 2009: 109. \n                      http:\/\/eprint.iacr.org\/2009\/109"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26961-0_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T19:59:36Z","timestamp":1559332776000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26961-0_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319269603","9783319269610"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26961-0_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}