{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:53:08Z","timestamp":1725562388739},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540209966"},{"type":"electronic","value":"9783540246602"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24660-2_4","type":"book-chapter","created":{"date-parts":[[2010,8,2]],"date-time":"2010-08-02T15:18:44Z","timestamp":1280762324000},"page":"39-53","source":"Crossref","is-referenced-by-count":1,"title":["Periodic Properties of Counter Assisted Stream Ciphers"],"prefix":"10.1007","author":[{"given":"Ove","family":"Scavenius","sequence":"first","affiliation":[]},{"given":"Martin","family":"Boesgaard","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Pedersen","sequence":"additional","affiliation":[]},{"given":"Jesper","family":"Christiansen","sequence":"additional","affiliation":[]},{"given":"Vincent","family":"Rijmen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1006\/ffta.2001.0339","volume":"8","author":"S. Shelah","year":"2002","unstructured":"Shelah, S., Tsaban, B.: Efficient linear feedback shift registers with maximal period. Finite Fields and their Applications\u00a08, 256\u2013267 (2002)","journal-title":"Finite Fields and their Applications"},{"key":"4_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/3-540-36492-7_5","volume-title":"Selected Areas in Cryptography","author":"P. Ekdahl","year":"2003","unstructured":"Ekdahl, P., Johansson, T.: A New Version of the Stream Cipher SNOW. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol.\u00a02595, pp. 49\u201361. Springer, Heidelberg (2003)"},{"issue":"2","key":"4_CR3","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1006\/inco.2001.3045","volume":"171","author":"A. Shamir","year":"2001","unstructured":"Shamir, A., Tsaban, B.: Guaranteeing the Diversity of Number Generators. Information and Computation\u00a0171(2), 350\u2013363 (2001), \n                    \n                      http:\/\/xxx.lanl.gov\/abs\/cs.CR\/0112014","journal-title":"Information and Computation"},{"key":"4_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1007\/3-540-45708-9_33","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"D. Coppersmith","year":"2002","unstructured":"Coppersmith, D., Halevi, S., Jutla, C.: Cryptanalysis of Stream Ciphers with Linear Masking. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.\u00a02442, p. 515. Springer, Heidelberg (2002)"},{"key":"4_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1007\/978-3-540-39887-5_23","volume-title":"Fast Software Encryption","author":"M. Boesgaard","year":"2003","unstructured":"Boesgaard, M., Vesterager, M., Pedersen, T., Christiansen, J., Scavenius, O.: Rabbit: A New High-Performance Stream Cipher. In: Johansson, T. (ed.) FSE 2003. LNCS, vol.\u00a02887, pp. 307\u2013329. Springer, Heidelberg (2003)"},{"key":"4_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1007\/3-540-46885-4_34","volume-title":"Advances in Cryptology - EUROCRYPT \u201989","author":"P. Flajolet","year":"1990","unstructured":"Flajolet, P., Odlyzko, A.M.: Random Mapping statistics. In: Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol.\u00a0434, pp. 329\u2013354. Springer, Heidelberg (1990)"},{"key":"4_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/3-540-48519-8_11","volume-title":"Fast Software Encryption","author":"J. Kelsey","year":"1999","unstructured":"Kelsey, J., Schneier, B., Wagner, D.: Mod n Cryptanalysis, with Applications against RC5P and M6. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol.\u00a01636, pp. 139\u2013155. Springer, Heidelberg (1999)"},{"key":"4_CR8","unstructured":"\u201cmod n\u201d Cryptanalysis of Rabbit, white paper, version 1.0 (2003), \n                    \n                      http:\/\/www.cryptico.com"},{"key":"4_CR9","unstructured":"Rijmen, V.: Analysis of Rabbit, unpublished report (2003), \n                    \n                      http:\/\/www.cryptico.com"}],"container-title":["Lecture Notes in Computer Science","Topics in Cryptology \u2013 CT-RSA 2004"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24660-2_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,17]],"date-time":"2019-03-17T16:19:42Z","timestamp":1552839582000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24660-2_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540209966","9783540246602"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24660-2_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}