{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T22:15:20Z","timestamp":1725574520485},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540221715"},{"type":"electronic","value":"9783540259374"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-25937-4_30","type":"book-chapter","created":{"date-parts":[[2011,1,8]],"date-time":"2011-01-08T13:25:16Z","timestamp":1294493116000},"page":"472-482","source":"Crossref","is-referenced-by-count":4,"title":["A MAC Forgery Attack on SOBER-128"],"prefix":"10.1007","author":[{"given":"Dai","family":"Watanabe","sequence":"first","affiliation":[]},{"given":"Soichi","family":"Furuya","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"30_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1007\/3-540-60865-6_48","volume-title":"Fast Software Encryption","author":"R. Anderson","year":"1996","unstructured":"Anderson, R., Biham, E.: The Practical and Provably Secure Block Ciphers: BEAR and LION. In: Gollmann, D. (ed.) FSE 1996. LNCS, vol.\u00a01039, pp. 113\u2013120. Springer, Heidelberg (1996)"},{"key":"30_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1007\/3-540-44448-3_41","volume-title":"Advances in Cryptology - ASIACRYPT 2000","author":"M. Bellare","year":"2000","unstructured":"Bellare, M., Namprempre, C.: Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol.\u00a01976, pp. 531\u2013545. Springer, Heidelberg (2000)"},{"key":"30_CR3","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4613-9314-6","volume-title":"Differential Cryptanalysis of the Data Encryption Standard","author":"E. Biham","year":"1993","unstructured":"Biham, E., Shamir, A.: Differential Cryptanalysis of the Data Encryption Standard. Springer, Heidelberg (1993)"},{"key":"30_CR4","unstructured":"Babbage, S., Lano, J.: Probabilistic Factors in the Sober-t Stream Ciphers. In: Proceedings Third Open NESSIE Workshop (2002)"},{"key":"30_CR5","unstructured":"De Canni\u00e8re, C., Lano, J., Preneel, B., Vandewalle, J.: Distinguishing Attacks on Sober-t32. In: Proceedings Third Open NESSIE Workshop (2002)"},{"key":"30_CR6","unstructured":"Daemen, J.: Cipher and hash function design strategies based on linear and differential cryptanalysis. Doctoral Dissertation, K.U.Leuven (1995)"},{"key":"30_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1007\/3-540-69710-1_5","volume-title":"Fast Software Encryption","author":"J. Daemen","year":"1998","unstructured":"Daemen, J., Clapp, C.S.K.: Fast Hashing and Stream Encryption with Panama. In: Vaudenay, S. (ed.) FSE 1998. LNCS, vol.\u00a01372, pp. 60\u201374. Springer, Heidelberg (1998)"},{"key":"30_CR8","unstructured":"Ekdahl, P., Johansson, T.: SNOW \u2013 a new stream cipher, NESSIE project submission (2000), available at \n                  \n                    http:\/\/www.cryptonessie.org\/"},{"key":"30_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1007\/3-540-45661-9_16","volume-title":"Fast Software Encryption","author":"P. Ekdahl","year":"2002","unstructured":"Ekdahl, P., Johansson, T.: Distinguishing Attacks on SOBER-t16 and t32. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol.\u00a02365, pp. 210\u2013224. Springer, Heidelberg (2002)"},{"key":"30_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-36492-7_5","volume-title":"Selected Areas in Cryptography","author":"P. Ekdahl","year":"2002","unstructured":"Ekdahl, P., Johansson, T.: A new version of the stream cipher SNOW. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol.\u00a02595, pp. 47\u201361. Springer, Heidelberg (2002)"},{"key":"30_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1007\/978-3-540-39887-5_24","volume-title":"Fast Software Encryption","author":"N. Ferguson","year":"2003","unstructured":"Ferguson, N., Whiting, D., Schneier, B., Kelsey, J., Lucks, S., Kohno, T.: Helix, Fast Encryption and Authentication in a Single Cryptographic Primitive. In: Johansson, T. (ed.) FSE 2003. LNCS, vol.\u00a02887, pp. 345\u2013362. Springer, Heidelberg (2003)"},{"key":"30_CR12","unstructured":"Hawkes, P., Rose, G.: Primitive Specification and Supporting Documentation for SOBER-t16 Submission to NESSIE. In: Proceedings First Open NESSIE Workshop (2000)"},{"key":"30_CR13","unstructured":"Hawkes, P., Rose, G.: Primitive Specification and Supporting Documentation for SOBER-t32 Submission to NESSIE. In: Proceedings First Open NESSIE Workshop(2000)"},{"key":"30_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1007\/978-3-540-39887-5_22","volume-title":"Fast Software Encryption","author":"G. Rose","year":"2003","unstructured":"Rose, G., Hawkes, P.: Turing, A Fast Stream Cipher. In: Johansson, T. (ed.) FSE 2003. LNCS, vol.\u00a02887, pp. 307\u2013324. Springer, Heidelberg (2003)"},{"key":"30_CR15","unstructured":"Hawkes, P., Rose, G.: Primitive Specification for SOBER-128. IACR ePrint Archive (2003), \n                  \n                    http:\/\/eprint.iacr.org\/2003\/81\/"},{"key":"30_CR16","series-title":"Lecture Notes in Computer Science","volume-title":"Selected Areas in Cryptography","author":"A. Joux","year":"2003","unstructured":"Joux, A., Muller, F.: A Chosen IV Attack against Turing. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol.\u00a03006. Springer, Heidelberg (2003)"},{"key":"30_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1007\/3-540-45473-X_28","volume-title":"Fast Software Encryption","author":"H. Lipmaa","year":"2001","unstructured":"Lipmaa, H., Moriai, S.: Efficient Algorithms for Computing Differential Properties of Addition. In: Matsui, M. (ed.) FSE 2001. LNCS, vol.\u00a02355, pp. 336\u2013350. Springer, Heidelberg (2001)"},{"key":"30_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/BFb0053728","volume-title":"Information Security and Privacy","author":"G.G. Rose","year":"1998","unstructured":"Rose, G.G.: A Stream Cipher based on Linear Feedback over GF(28). In: Boyd, C., Dawson, E. (eds.) ACISP 1998. LNCS, vol.\u00a01438, p. 135. Springer, Heidelberg (1998)"},{"key":"30_CR19","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-82865-2","volume-title":"Analysis and Design of Stream Ciphers","author":"R. Rueppel","year":"1986","unstructured":"Rueppel, R.: Analysis and Design of Stream Ciphers. Springer, Heidelberg (1986)"},{"key":"30_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/3-540-44706-7_3","volume-title":"Fast Software Encryption","author":"M. Zhang","year":"2000","unstructured":"Zhang, M., Carroll, C., Chan, A.H.: The Software-Oriented Stream Cipher SSC2. In: Schneier, B. (ed.) FSE 2000. LNCS, vol.\u00a01978, pp. 31\u201348. Springer, Heidelberg (2000)"}],"container-title":["Lecture Notes in Computer Science","Fast Software Encryption"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-25937-4_30.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,2]],"date-time":"2021-05-02T23:17:15Z","timestamp":1619997435000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-25937-4_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540221715","9783540259374"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-25937-4_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}