{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:30:07Z","timestamp":1725888607390},"publisher-location":"Cham","reference-count":7,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319598697"},{"type":"electronic","value":"9783319598703"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-59870-3_25","type":"book-chapter","created":{"date-parts":[[2017,5,29]],"date-time":"2017-05-29T22:14:17Z","timestamp":1496096057000},"page":"406-413","source":"Crossref","is-referenced-by-count":5,"title":["On the Security of Designing a Cellular Automata Based Stream Cipher"],"prefix":"10.1007","author":[{"given":"Swapan","family":"Maiti","sequence":"first","affiliation":[]},{"given":"Shamit","family":"Ghosh","sequence":"additional","affiliation":[]},{"given":"Dipanwita Roy","family":"Chowdhury","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,31]]},"reference":[{"key":"25_CR1","volume-title":"Additive Cellular Automata: Theory and Applications","author":"PP Chaudhuri","year":"1997","unstructured":"Chaudhuri, P.P., Roy Chowdhury, D., Nandi, S., Chattopadhyay, S.: Additive Cellular Automata: Theory and Applications. IEEE Computer Socity Press, Los Alamitos (1997)"},{"issue":"2","key":"25_CR2","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1007\/s12095-012-0079-1","volume":"5","author":"S Das","year":"2013","unstructured":"Das, S., Roy Chowdhury, D.: CAR30: a new scalable stream cipher with rule 30. Crypt. Commun. 5(2), 137\u2013162 (2013)","journal-title":"Crypt. Commun."},{"key":"25_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/978-3-319-11520-7_8","volume-title":"Cellular Automata","author":"S Ghosh","year":"2014","unstructured":"Ghosh, S., Sengupta, A., Saha, D., Chowdhury, D.R.: A scalable method for constructing non-linear cellular automata with period \n            $$2^n-1$$\n          . In: W\u0105s, J., Sirakoulis, G.C., Bandini, S. (eds.) ACRI 2014. LNCS, vol. 8751, pp. 65\u201374. Springer, Cham (2014). doi:\n10.1007\/978-3-319-11520-7_8"},{"key":"25_CR4","doi-asserted-by":"crossref","unstructured":"Hell, M., Johansson, T., Maximov, A., Meier, W.: A stream cipher proposal: grain-128. In: 2006 IEEE International Symposium Information Theory, pp. 1614\u20131618 (2006)","DOI":"10.1109\/ISIT.2006.261549"},{"key":"25_CR5","unstructured":"Karmakar, S., Roy Chowdhury, D.: NOCAS: a nonlinear cellular automata based stream cipher. In: 17th International Workshop on Cellular Automata and Discrete Complex Systems, Automata 2011, Center for Mathematical Modeling, University of Chile, Santiago, Chile, November 21\u201323, 2011, pp. 135\u2013146 (2011)"},{"key":"25_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/3-540-46416-6_17","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 1991","author":"W Meier","year":"1991","unstructured":"Meier, W., Staffelbach, O.: Analysis of pseudo random sequences generated by cellular automata. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 186\u2013199. Springer, Heidelberg (1991). doi:\n10.1007\/3-540-46416-6_17"},{"key":"25_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1007\/3-540-39799-X_32","volume-title":"Advances in Cryptology \u2014 CRYPTO 1985 Proceedings","author":"S Wolfram","year":"1986","unstructured":"Wolfram, S.: Cryptography with cellular automata. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 429\u2013432. Springer, Heidelberg (1986). doi:\n10.1007\/3-540-39799-X_32"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59870-3_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,5,29]],"date-time":"2017-05-29T22:22:39Z","timestamp":1496096559000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-59870-3_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319598697","9783319598703"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59870-3_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}