{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:53:17Z","timestamp":1725562397249},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540209966"},{"type":"electronic","value":"9783540246602"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24660-2_5","type":"book-chapter","created":{"date-parts":[[2010,8,2]],"date-time":"2010-08-02T11:18:44Z","timestamp":1280747924000},"page":"54-66","source":"Crossref","is-referenced-by-count":5,"title":["A Fast Correlation Attack via Unequal Error Correcting LDPC Codes"],"prefix":"10.1007","author":[{"given":"Maneli","family":"Noorkami","sequence":"first","affiliation":[]},{"given":"Faramarz","family":"Fekri","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-82865-2","volume-title":"Analysis and Design of Stream Ciphers","author":"R.A. Rueppel","year":"1986","unstructured":"Rueppel, R.A.: Analysis and Design of Stream Ciphers. Springer, Heidelberg (1986)"},{"key":"5_CR2","doi-asserted-by":"publisher","first-page":"776","DOI":"10.1109\/TIT.1984.1056949","volume":"IT-30","author":"T. Siegenthaler","year":"1984","unstructured":"Siegenthaler, T.: Correlation-immunity of nonlinear combining functions for cryptographic applications. IEEE Trans. on Information Theory\u00a0IT-30, 776\u2013780 (1984)","journal-title":"IEEE Trans. on Information Theory"},{"key":"5_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1007\/3-540-45961-8_28","volume-title":"Advances in Cryptology - EUROCRYPT \u201988","author":"W. Meier","year":"1988","unstructured":"Meier, W., Staffelbach, O.: Fast correlation attacks on stream ciphers. In: G\u00fcnther, C.G. (ed.) EUROCRYPT 1988. LNCS, vol.\u00a0330, pp. 301\u2013314. Springer, Heidelberg (1988)"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Golic, J., Salmasizadeh, M., Clark, A., Khodkar, A., Dawson, E.: Discrete optimisation and fast correlation attacks. In: Proceedings of Cryptography: Policy and Algorithms. International Conference, pp. 186\u2013200 (1996)","DOI":"10.1007\/BFb0032358"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Penzhorn, W., Kuhn, G.: Computation of low-weight parity checks for correlation attacks on stream ciphers. In: Proceedings of Cryptography and Coding. 5th IMA Conference, pp. 74\u201383 (1995)","DOI":"10.1007\/3-540-60693-9_10"},{"key":"5_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1007\/3-540-46416-6_16","volume-title":"Advances in Cryptology - EUROCRYPT \u201991","author":"V. Chepyzhov","year":"1991","unstructured":"Chepyzhov, V., Smeets, B.: On a fast correlation attack on certain stream ciphers. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol.\u00a0547, pp. 176\u2013185. Springer, Heidelberg (1991)"},{"key":"5_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/BFb0030359","volume-title":"Advances in Cryptology - AUSCRYPT \u201990","author":"M. Mihaljevic","year":"1990","unstructured":"Mihaljevic, M., Golic, J.: A fast iterative algorithm for a shift register initial state reconstruction given the noisy output sequence. In: Seberry, J., Pieprzyk, J.P. (eds.) AUSCRYPT 1990. LNCS, vol.\u00a0453, pp. 165\u2013185. Springer, Heidelberg (1990)"},{"key":"5_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1007\/3-540-48910-X_24","volume-title":"Advances in Cryptology - EUROCRYPT \u201999","author":"T. Johansson","year":"1999","unstructured":"Johansson, T., Jonsson, F.: Improved fast correlation attacks on stream ciphers via convolutional codes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol.\u00a01592, pp. 347\u2013362. Springer, Heidelberg (1999)"},{"key":"5_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/3-540-48405-1_12","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"T. Johansson","year":"1999","unstructured":"Johansson, T., Jonsson, F.: Fast correlation attacks based on turbo code techniques. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 181\u2013197. Springer, Heidelberg (1999)"},{"key":"5_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/3-540-44706-7_13","volume-title":"Fast Software Encryption","author":"V. Chepyzhov","year":"2001","unstructured":"Chepyzhov, V., Johansson, T., Smeets, B.: A simple algorithm for fast correlation attacks on stream ciphers. In: Schneier, B. (ed.) FSE 2000. LNCS, vol.\u00a01978, pp. 181\u2013195. Springer, Heidelberg (2001)"},{"key":"5_CR11","unstructured":"Jonsson, F.: Some results on fast correlation attacks. PhD thesis, Lund University (2002)"},{"key":"5_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1007\/3-540-45539-6_40","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"A. Canteaut","year":"2000","unstructured":"Canteaut, A., Trabbia, M.: Improved fast correlation attacks using parity-check equations of weight 4 and 5. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 573\u2013588. Springer, Heidelberg (2000)"},{"key":"5_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1007\/3-540-44706-7_14","volume-title":"Fast Software Encryption","author":"M. Mihaljevic","year":"2001","unstructured":"Mihaljevic, M., Fossorier, M., Imai, H.: A low-complexity and high performance algorithm for the fast correlation attack. In: Schneier, B. (ed.) FSE 2000. LNCS, vol.\u00a01978, pp. 196\u2013212. Springer, Heidelberg (2001)"},{"key":"5_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1007\/3-540-45473-X_17","volume-title":"Fast Software Encryption","author":"M. Mihaljevic","year":"2002","unstructured":"Mihaljevic, M., Fossorier, M., Imai, H.: Fast correlation attack algorithm with list decoding and an application. In: Matsui, M. (ed.) FSE 2001. LNCS, vol.\u00a02355, pp. 196\u2013210. Springer, Heidelberg (2002)"},{"key":"5_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/3-540-46035-7_14","volume-title":"Advances in Cryptology - EUROCRYPT 2002","author":"P. Chose","year":"2002","unstructured":"Chose, P., Joux, A., Mitton, M.: Fast correlation attacks: an algorithmic point of view. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol.\u00a02332, pp. 209\u2013221. Springer, Heidelberg (2002)"},{"key":"5_CR16","doi-asserted-by":"publisher","first-page":"498","DOI":"10.1109\/18.910572","volume":"47","author":"F. Kschischang","year":"2001","unstructured":"Kschischang, F., Frey, B., Loeliger, H.: Factor graphs and the sum-product algorithm. IEEE Trans. on Information Theory\u00a047, 498\u2013519 (2001)","journal-title":"IEEE Trans. on Information Theory"}],"container-title":["Lecture Notes in Computer Science","Topics in Cryptology \u2013 CT-RSA 2004"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24660-2_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T23:30:35Z","timestamp":1559345435000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24660-2_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540209966","9783540246602"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24660-2_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}