{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T04:54:51Z","timestamp":1764996891874},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540226666"},{"type":"electronic","value":"9783540286325"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-28632-5_18","type":"book-chapter","created":{"date-parts":[[2010,9,20]],"date-time":"2010-09-20T16:45:31Z","timestamp":1285001131000},"page":"240-253","source":"Crossref","is-referenced-by-count":82,"title":["Fault Analysis of Stream Ciphers"],"prefix":"10.1007","author":[{"given":"Jonathan J.","family":"Hoch","sequence":"first","affiliation":[]},{"given":"Adi","family":"Shamir","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","unstructured":"Anderson, R.: Optical Fault Induction (June 2002)"},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"Boneh, Demillo, Lipton: On the Importance of Checking Cryptographic Prtocols for Faults (September 1996)","DOI":"10.1007\/3-540-69053-0_4"},{"key":"18_CR3","unstructured":"Biham, Shamir: A New Cryptanalytic Attack on DES: Differential Fault Analysis (October 1996)"},{"key":"18_CR4","unstructured":"Dawson, E., Clark, A., Golic, J., Millan, W., Penna, L., Simpson, L.: The LILI-128 Keystream Generator (November 2000)"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Halevi, S., Coppersmith, D., Jutla, C.: Scream an efficient stream cipher (June 2002)","DOI":"10.1007\/3-540-45661-9_15"},{"key":"18_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1007\/3-540-48329-2_3","volume-title":"Advances in Cryptology - CRYPTO \u201993","author":"D. Coppersmith","year":"1994","unstructured":"Coppersmith, D., Krawczyk, H., Mansour, Y.: The shrinking generator. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol.\u00a0773, pp. 22\u201339. Springer, Heidelberg (1994)"},{"key":"18_CR7","unstructured":"Hawks, P., Rose, G.G.: Primitive Specification and Supporting Documentation for SOBER-t32 Submission to NESSIE (June 2003)"},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"Mantin, I., Shamir, A.: A Practical Attack on Broadcast RC4. FSE 2001","DOI":"10.1007\/3-540-45473-X_13"},{"key":"18_CR9","doi-asserted-by":"crossref","unstructured":"Golic, J.D., Morgari, G.: On the Resynchronization Attack. FSE 2003","DOI":"10.1007\/978-3-540-39887-5_9"},{"key":"18_CR10","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1023\/A:1027386519887","volume":"31","author":"J.D.. Golic","year":"2004","unstructured":"Golic, J.D., Morgari, G.: Correlation Analysis of the Alternating Step Generator. Designs, Codes and Cryptography\u00a031, 51\u201374 (2004)","journal-title":"Designs, Codes and Cryptography"},{"key":"18_CR11","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1023\/A:1008399109102","volume":"22","author":"S. Dubuc","year":"2001","unstructured":"Dubuc, S.: Characterization of linear structures. Designs, Codes and Cryptography\u00a022, 33\u201345 (2001)","journal-title":"Designs, Codes and Cryptography"},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"Courtois, N., Meier, W.: Algebraic Attacks on Stream Ciphers with Linear Feedback. In: Eurocrypt 2003 (2003)","DOI":"10.1007\/978-3-540-45146-4_11"},{"key":"18_CR13","unstructured":"Babbage, S.: Cryptanalysis of LILI-128. In: Proceedings of the 2nd NESSIE Workshop (2001)"},{"key":"18_CR14","doi-asserted-by":"crossref","unstructured":"Babbage, S., De Canni\u00e8re, C., Lano, J., Preneel, B., Vandewalle, J.: Cryptanalysis of SOBER-t32. In: FSE 2003 (2003)","DOI":"10.1007\/978-3-540-39887-5_10"},{"key":"18_CR15","doi-asserted-by":"crossref","unstructured":"Cho, J.Y., Pieprzyk, J.: Algebraic Attacks on SOBER-t32 and SOBER- 128. In: FSE 2004","DOI":"10.1007\/978-3-540-25937-4_4"}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems - CHES 2004"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-28632-5_18.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,18]],"date-time":"2020-11-18T23:26:07Z","timestamp":1605741967000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-28632-5_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540226666","9783540286325"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-28632-5_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}