{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T12:46:07Z","timestamp":1750337167621},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540204497"},{"type":"electronic","value":"9783540398875"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-39887-5_22","type":"book-chapter","created":{"date-parts":[[2010,9,5]],"date-time":"2010-09-05T22:02:13Z","timestamp":1283724133000},"page":"290-306","source":"Crossref","is-referenced-by-count":22,"title":["Turing: A Fast Stream Cipher"],"prefix":"10.1007","author":[{"given":"Gregory G.","family":"Rose","sequence":"first","affiliation":[]},{"given":"Philip","family":"Hawkes","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","unstructured":"Blackburn, S., Murphy, S., Piper, F., Wild, P.: A SOBERing remark. Unpublished technical report, Information Security Group, Royal Holloway University of London, Egham, Surrey TW20 0EX, U.K (1998)"},{"key":"22_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/3-540-48519-8_22","volume-title":"Fast Software Encryption","author":"D. Bleichenbacher","year":"1999","unstructured":"Bleichenbacher, D., Patel, S.: SOBER cryptanalysis. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol.\u00a01636, pp. 305\u2013316. Springer, Heidelberg (1999)"},{"key":"22_CR3","unstructured":"Bleichenbacher, D., Patel, S., Meier, W.: Analysis of the SOBER stream cipher. TIA Contribution TR45.AHAG\/99.08.30.12"},{"key":"22_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1007\/3-540-45708-9_33","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"D. Coppersmith","year":"2002","unstructured":"Coppersmith, D., Halevi, S., Jutla, C.: Cryptanalysis of Stream Ciphers using Linear Masking. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.\u00a02442, pp. 515\u2013532. Springer, Heidelberg (2002)"},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Courtois, N.T.: Higher Order Correlatoin Attacks, XL algorithm and Cryptanalysis of Toyocrypt. Cryptology ePrint Archive, International Association for Cryptological Research (IACR), document 2002\/087 (2002), See http:\/\/eprint.iacr.org","DOI":"10.1007\/3-540-36552-4_13"},{"key":"22_CR6","unstructured":"Daemen, J., Rijmen, V.: AES Proposal: Rijndael (2000), See http:\/\/www.esat.kuleuven.ac.be\/~rijmen\/rijndael"},{"key":"22_CR7","unstructured":"Dawson, E., Clark, A., Gustafson, H., May, L.: CRYPT-X 1998 (Java Version) User Manual. Queensland University of Technology (1999)"},{"key":"22_CR8","unstructured":"Dawson, E., Millan, W., Burnett, L., Carter, G.: On the Design of 8*32 S-boxes. Unpublished report, by the Information Systems Research Centre, Queensland University of Technology (1999)"},{"key":"22_CR9","unstructured":"Ekdahl, P., Johansson, T.: SNOW - a new stream cipher (2000), This paper is found in the NESSIE webpages: http:\/\/www.cosic.esat.kuleuven.ac.be\/nessie\/workshop\/submissions\/snow.zip"},{"key":"22_CR10","series-title":"Lecture Notes in Computer Science","first-page":"27","volume-title":"Fast Software Encryption","author":"J.D. Golic","year":"1996","unstructured":"Golic, J.D.: On Security of Nonlinear Filter Generators. In: Gollmann, D. (ed.) FSE 1996. LNCS, vol.\u00a01039, pp. 27\u201332. Springer, Heidelberg (1996)"},{"key":"22_CR11","unstructured":"Hall, C., Schneier, B.: An Analysis of SOBER (1999) (Unpublished report)"},{"key":"22_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1007\/3-540-44448-3_23","volume-title":"Advances in Cryptology - ASIACRYPT 2000","author":"P. Hawkes","year":"2000","unstructured":"Hawkes, P., Rose, G.: Exploiting multiples of the connection polynomial in word-oriented stream ciphers. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol.\u00a01976, pp. 302\u2013316. Springer, Heidelberg (2000)"},{"key":"22_CR13","unstructured":"Hawkes, P., Rose, G.: The t-class of SOBER stream ciphers (2000), See: http:\/\/people.qualcomm.com\/ggr\/QC\/tclass.pdf"},{"key":"22_CR14","unstructured":"Hawkes, P., Rose, G.: Primitive specification and supporting documentation for SOBER-t32 submission to NESSIE (2000), See: http:\/\/www.cosic.esat.kuleuven.ac.be\/nessie\/workshop\/submissions\/sobert32.zip"},{"key":"22_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/3-540-39805-8_14","volume-title":"Advances in Cryptology - EUROCRYPT \u201985","author":"T. Herlestam","year":"1986","unstructured":"Herlestam, T.: On functions of Linear Shift Register Sequences. In: Pichler, F. (ed.) EUROCRYPT 1985. LNCS, vol.\u00a0219, pp. 119\u2013129. Springer, Heidelberg (1986)"},{"key":"22_CR16","series-title":"Lecture Notes in Computer Science","volume-title":"Fast Software Encryption","author":"J.L. Massey","year":"1994","unstructured":"Massey, J.L.: SAFER K-64: A Byte-oriented Block-Ciphering Algorithm. In: Anderson, R. (ed.) FSE 1993. LNCS, vol.\u00a0809. Springer, Heidelberg (1994)"},{"key":"22_CR17","unstructured":"Massey, J., Khachatrian, G., Kuregian, M.: Nomination of SAFER++ as Candidate Algorithm for the New European Schemes for Signatures, Integrity, and Encryption (NESSIE) (September 2000), See: http:\/\/www.cosic.esat.kuleuven.ac.be\/nessie\/workshop\/submissions\/safer++.zip"},{"key":"22_CR18","series-title":"ch. 6","volume-title":"Handbook of Applied Cryptography","author":"A. Menezes","year":"1997","unstructured":"Menezes, A., Van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. ch. 6. CRC Press, Boca Raton (1997)"},{"key":"22_CR19","unstructured":"The NESSIE Project New European Schemes for Signatures, Integrity, and Encryption (2000-2003), See: http:\/\/www.cryptonessie.org"},{"key":"22_CR20","unstructured":"Paar, C.: Efficieint VLSI Architectures for Bit-Parallel Computation in Galois Fields. Ph.D. Thesis, Institute for Experimental Mathematics, University of Essen (1994) ISBN 3-18-332810-0"},{"key":"22_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1007\/BFb0053728","volume-title":"Information Security and Privacy","author":"G. Rose","year":"1998","unstructured":"Rose, G.: A stream cipher based on Linear Feedback over GF(28). In: Boyd, C., Dawson, E. (eds.) ACISP 1998. LNCS, vol.\u00a01438, pp. 146\u2013155. Springer, Heidelberg (1998)"},{"key":"22_CR22","unstructured":"Rose, G.: Reference Source Code for Turing. QUALCOMM Australia (2002), See: http:\/\/people.qualcomm.com\/ggr\/QC\/Turing.tgz"},{"key":"22_CR23","unstructured":"Schneier, B., Kelsey, J., Whiting, D., Wagner, D., Hall, C., Ferguson, N.: Twofish: A 128-Bit Block Cipher. See: http:\/\/www.counterpane.com\/twofish.html"},{"key":"22_CR24","unstructured":"St, T.: Denis. Weekend Cipher. sci.crypt news article: 3d4d614d_17@news.teranews.com"}],"container-title":["Lecture Notes in Computer Science","Fast Software Encryption"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-39887-5_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,8]],"date-time":"2021-11-08T17:22:24Z","timestamp":1636392144000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-39887-5_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540204497","9783540398875"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-39887-5_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}