{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T07:00:07Z","timestamp":1761807607217},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540204497"},{"type":"electronic","value":"9783540398875"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-39887-5_23","type":"book-chapter","created":{"date-parts":[[2010,9,5]],"date-time":"2010-09-05T18:02:13Z","timestamp":1283709733000},"page":"307-329","source":"Crossref","is-referenced-by-count":67,"title":["Rabbit: A New High-Performance Stream Cipher"],"prefix":"10.1007","author":[{"given":"Martin","family":"Boesgaard","sequence":"first","affiliation":[]},{"given":"Mette","family":"Vesterager","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Pedersen","sequence":"additional","affiliation":[]},{"given":"Jesper","family":"Christiansen","sequence":"additional","affiliation":[]},{"given":"Ove","family":"Scavenius","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"429","DOI":"10.1007\/3-540-39799-X_32","volume-title":"Advances in Cryptology","author":"S. Wolfram","year":"1986","unstructured":"Wolfram, S.: Cryptography with Cellular Automata. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol.\u00a0218, pp. 429\u2013432. Springer, Heidelberg (1986)"},{"issue":"2","key":"23_CR2","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1109\/81.904880","volume":"48","author":"G. Jakimoski","year":"2001","unstructured":"Jakimoski, G., Kocarev, L.: Chaos and Cryptography: Block Encryption Ciphers Based on Chaotic Maps. IEEE Transactions on Circuits and Systems-1: Fundamental Theory and Applications\u00a048(2), 163\u2013169 (2001)","journal-title":"IEEE Transactions on Circuits and Systems-1: Fundamental Theory and Applications"},{"key":"23_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1007\/3-540-46416-6_11","volume-title":"Advances in Cryptology - EUROCRYPT \u201991","author":"T. Habutso","year":"1991","unstructured":"Habutso, T., Nishio, Y., Sasase, I., Mori, S.: A secret key cryptosystem by iterating a chaotic map. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol.\u00a0547, pp. 127\u2013140. Springer, Heidelberg (1991)"},{"key":"23_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"532","DOI":"10.1007\/3-540-46416-6_49","volume-title":"Advances in Cryptology - EUROCRYPT \u201991","author":"E. Biham","year":"1991","unstructured":"Biham, E.: Cryptoanalysis of the chaotic-map cryptosystem suggested at EUROCRYPT 1991. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol.\u00a0547, pp. 532\u2013534. Springer, Heidelberg (1991)"},{"issue":"1","key":"23_CR5","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1080\/0161-118991863745","volume":"XIII","author":"R. Matthews","year":"1989","unstructured":"Matthews, R.: On the Derivation of a \u201cChaotic\u201d Encryption Algorithm. Cryptology\u00a0XIII(1), 29\u201341 (1989)","journal-title":"Cryptology"},{"key":"23_CR6","unstructured":"Yates, R.: Fixed-Point Arithmetic: An Introduction, \n                    \n                      http:\/\/personal.mia.bellsouth.net\/lig\/y\/a\/yatesc\/fp.pdf"},{"key":"23_CR7","volume-title":"Handbook of Applied Cryptography","author":"A. Menezes","year":"1997","unstructured":"Menezes, A., Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press LLC, Boca Raton (1997)"},{"issue":"2","key":"23_CR8","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1006\/inco.2001.3045","volume":"171","author":"A. Shamir","year":"2001","unstructured":"Shamir, A., Tsaban, B.: Guaranteeing the Diversity of Number Generators. Information and Computation\u00a0171(2), 350\u2013363 (2001)","journal-title":"Information and Computation"},{"key":"23_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"M. Matsui","year":"1994","unstructured":"Matsui, M.: Linear Cryptanalysis Method for DES Cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 386\u2013397. Springer, Heidelberg (1994)"},{"key":"23_CR10","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-82865-2","volume-title":"Analysis and Design of Stream Ciphers","author":"R.A. Rueppel","year":"1986","unstructured":"Rueppel, R.A.: Analysis and Design of Stream Ciphers. Springer, Berlin (1986)"},{"key":"23_CR11","unstructured":"Daemen, J.: ch. 5: Propagation and Correlation. Annex to AES Proposal (1998)"},{"key":"23_CR12","unstructured":"A Statistical Test Suite for the Validation of Random Number Generators and Pseudo Random Number Generators for Cryptographic Applications, NIST Special Publication 800-22, National Institute of Standards and Technology (2001), \n                    \n                      http:\/\/csrc.nist.gov\/rng"},{"key":"23_CR13","unstructured":"Masaglia, G.: A battery of tests for random number generators, Florida State University, \n                    \n                      http:\/\/stat.fsu.edu\/geo\/diehard.html"},{"key":"23_CR14","unstructured":"Walker, J.: A Pseudorandom Number Sequence Test Program, \n                    \n                      http:\/\/www.fourmilab.ch\/random"},{"key":"23_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1007\/3-540-45961-8_28","volume-title":"Advances in Cryptology - EUROCRYPT \u201988","author":"W. Meier","year":"1988","unstructured":"Meier, W., Staffelbach, O.: Fast Correlation Attacks on Stream Ciphers. In: G\u00fcnther, C.G. (ed.) EUROCRYPT 1988. LNCS, vol.\u00a0330, pp. 301\u2013314. Springer, Heidelberg (1988)"}],"container-title":["Lecture Notes in Computer Science","Fast Software Encryption"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-39887-5_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,19]],"date-time":"2019-03-19T22:10:28Z","timestamp":1553033428000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-39887-5_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540204497","9783540398875"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-39887-5_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}