{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T12:09:00Z","timestamp":1725970140117},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319763538"},{"type":"electronic","value":"9783319763545"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-76354-5_31","type":"book-chapter","created":{"date-parts":[[2018,3,9]],"date-time":"2018-03-09T11:43:48Z","timestamp":1520595828000},"page":"339-349","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Statistical Analysis for High-Speed Stream Ciphers"],"prefix":"10.1007","author":[{"given":"Youssef","family":"Harmouch","sequence":"first","affiliation":[]},{"given":"Rachid","family":"El Kouch","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,3,10]]},"reference":[{"key":"31_CR1","doi-asserted-by":"crossref","unstructured":"Harmouch, Y., El Kouch, R.: A fair comparison between several ciphers in characteristics, safety and speed test. In: Rocha, \u00c1., Serrhini, M., Felgueiras, C. (eds.) Europe and MENA Cooperation Advances in Information and Communication Technologies. Advances in Intelligent Systems and Computing, vol. 520. Springer, Cham (2017)","DOI":"10.1007\/978-3-319-46568-5_54"},{"key":"31_CR2","unstructured":"Banegas, G.: Attacks in stream ciphers: a survey. http:\/\/eprint.iacr.org\/2014\/677.pdf"},{"key":"31_CR3","isbn-type":"print","volume-title":"Vector Quantization and Signal Compression","author":"A Gersho","year":"1991","unstructured":"Gersho, A., Gray, R.M.: Vector Quantization and Signal Compression. Springer, New York (1991). ISBN 978-0-7923-9181-4","ISBN":"http:\/\/id.crossref.org\/isbn\/9780792391814"},{"key":"31_CR4","unstructured":"Wu, H., Preneel, B.: Cryptanalysis and Design of Stream Ciphers, Ph.D. thesis, Katholieke Universiteit Leuven (Belgium) (2008)"},{"key":"31_CR5","unstructured":"Daneshgar, A., Mohebbipoor, F.: A Secure Self-synchronized Stream Cipher (2017). CoRR, abs\/1709.08613"},{"key":"31_CR6","unstructured":"Rivest, R.: The RC4 encryption algorithm. RSA Data Security (1992)"},{"key":"31_CR7","unstructured":"NIST Computer Security Division\u2019s (CSD) Security Technology Group (STG). \u201cBlock cipher modes\u201d. Cryptographic Toolkit. NIST. Accessed 12 Apr 2013"},{"key":"31_CR8","doi-asserted-by":"crossref","unstructured":"Maximov, A., Johansson, T., Babbage, S.: An improved correlation attack on A5\/1. In: Selected Areas in Cryptography 2004, pp. 1\u201318 (2004)","DOI":"10.1007\/978-3-540-30564-4_1"},{"key":"31_CR9","unstructured":"Goldberg, I., Wagner, D., Green, L.: The (Real-Time) Cryptanalysis of A5\/2. Rump session of Crypto 1999 (1999)"},{"key":"31_CR10","doi-asserted-by":"crossref","unstructured":"Ferguson, N., Whiting, D., Schneier, B., Kelsey, J., Lucks, S., Kohno, T.: Helix: fast encryption and authentication in a single cryptographic primitive. In: Fast Software Encryption \u2013 FSE 2003. LNCS, vol. 2887, pp. 330\u2013346, Springer, Heidelberg (2003)","DOI":"10.1007\/978-3-540-39887-5_24"},{"key":"31_CR11","doi-asserted-by":"crossref","unstructured":"Jenkins Jr., R.J.: ISAAC. Fast Software Encryption, pp. 41\u201349 (1996)","DOI":"10.1007\/3-540-60865-6_41"},{"key":"31_CR12","doi-asserted-by":"crossref","unstructured":"Watanabe, D., Furuya, S., Takaragi, K., Preneel, B.: A new keystream generator MUGI (PDF). In: 9th International Workshop on Fast Software Encryption (FSE 2002), pp. 179\u2013194. Springer, Leuven. Accessed 07 July 2007","DOI":"10.1007\/3-540-45661-9_14"},{"key":"31_CR13","unstructured":"Whiting, D., Schneier, B., Lucks, S., Muller, F.: Phelix-fast encryption and authentication in a single cryptographic primitive. In: ECRYPT-Network of Excellence in Cryptology, Call for stream Cipher Primitives - Phase 2-(2005). http:\/\/www.ecrypt.eu.org\/stream\/"},{"key":"31_CR14","unstructured":"Bernstein, D.J.: ChaCha, a variant of Salsa20. In: Workshop Record of SASC 2008: The State of the Art of Stream Ciphers. http:\/\/cr.yp.to\/chacha\/chacha-20080128.pdf"},{"key":"31_CR15","doi-asserted-by":"crossref","unstructured":"Wu, H.: The stream cipher HC-128. In: Robshaw, M., Billet, O. (eds.) New Stream Cipher Designs. Lecture Notes in Computer Science, vol 4986. Springer, Heidelberg (2008)","DOI":"10.1007\/978-3-540-68351-3_4"},{"key":"31_CR16","doi-asserted-by":"crossref","unstructured":"Wu, H.: A new stream cipher HC-256. In: Fast Software Encryption (FSE 2004). LNCS 3017, pp. 226\u2013244. http:\/\/eprint.iacr.org\/2004\/092.pdf","DOI":"10.1007\/978-3-540-25937-4_15"},{"key":"31_CR17","doi-asserted-by":"crossref","unstructured":"Daemen, J., Clapp, C.: Fast hashing and stream encryption with panama. In: Vaudenay, S. (ed.) Fast Software Encryption, FSE 1998. Lecture Notes in Computer Science, vol 1372. Springer, Heidelberg (1998)","DOI":"10.1007\/3-540-69710-1_5"},{"key":"31_CR18","doi-asserted-by":"crossref","unstructured":"Boesgaard, M., Vesterager, M., Pedersen, T., Christiansen, J., Scavenius, O.: Rabbit: a new high-performance stream cipher. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 307\u2013329. Springer, Heidelberg (2003)","DOI":"10.1007\/978-3-540-39887-5_23"},{"key":"31_CR19","doi-asserted-by":"crossref","unstructured":"Berbain, C., et al.: Sosemanuk, a fast software-oriented stream cipher. In: Robshaw, M., Billet, O. (eds.) New Stream Cipher Designs. Lecture Notes in Computer Science, vol 4986. Springer, Heidelberg (2008)","DOI":"10.1007\/978-3-540-68351-3_9"},{"key":"31_CR20","unstructured":"Bernstein, D.J.: The Salsa20 stream cipher, slides of talk. In: ECRYPT STVL Workshop on Symmetric Key Encryption (2005). http:\/\/cr.yp.to\/talks.html#2005.05.26"},{"key":"31_CR21","doi-asserted-by":"crossref","unstructured":"Rogaway, P., Coppersmith, D.: A software-optimized encryption algorithm. In: Anderson, R.J. (ed.) FSE 1994. Lecture Notes in Computer Science, vol. 809, pp. 56\u201363. Springer, Berlin (1994)","DOI":"10.1007\/3-540-58108-1_8"},{"key":"31_CR22","doi-asserted-by":"crossref","unstructured":"Wheeler, D.J., A bulk data encryption algorithm. In: Anderson, R. (ed.) Fast Software Encryption. LNCS, vol. 809, pp. 127\u2013134. Springer (1994)","DOI":"10.1007\/3-540-58108-1_16"},{"key":"31_CR23","unstructured":"G\u00e9rard, B.: Cryptanalyses statistiques des algorithmes de chiffrement la clef secr\u00e8te. Other [cs.OH]. Universit\u00e9 Pierre et Marie Curie - Paris VI (2010). French"},{"key":"31_CR24","unstructured":"Junod, P.: Statistical Cryptanalysis of Block Ciphers. \u00c9cole Polytechnique F\u00e9d\u00e9rale de Lausanne"},{"key":"31_CR25","unstructured":"Beker, H., Piper, F.: Cipher Systems: The Protection of Communication. John Wiley & Sons (1983) Beutelsbacher, Albrecht: \u201cKryptologie\u201d, Vieweg, Teubner (1993)"},{"key":"31_CR26","unstructured":"Klima, R., Sigmon, N.P., Stitzinger, E.: Applications of Abstract Algebra with Maple and MATLAB, Second Edition (2007)"},{"key":"31_CR27","unstructured":"Cochran, D.: For Whose Eyes Only? Cryptanalysis and Frequency Analysis. http:\/\/www.westpoint.edu\/math\/Military%20Math%20Modeling\/PS5.pdf"},{"key":"31_CR28","doi-asserted-by":"crossref","unstructured":"Ganesan, R., Sherman, A.T.: Statistical Technique for Language Recognition: An Introduction and Guide for Cryptanalysts, 25 February 1993","DOI":"10.1080\/0161-119391867980"},{"key":"31_CR29","doi-asserted-by":"crossref","unstructured":"L\u2019ecuyer, P., Simard, R.: TestU01: a C library for empirical testing of random number generators. ACM Trans. Math. Softw. 33(4), 1\u201340 (2007)","DOI":"10.1145\/1268776.1268777"}],"container-title":["Advances in Intelligent Systems and Computing","Innovations in Bio-Inspired Computing and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-76354-5_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,12]],"date-time":"2019-10-12T15:36:58Z","timestamp":1570894618000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-76354-5_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319763538","9783319763545"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-76354-5_31","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2018]]}}}