{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T05:37:42Z","timestamp":1725514662320},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540681595"},{"type":"electronic","value":"9783540681649"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-68164-9_18","type":"book-chapter","created":{"date-parts":[[2008,5,30]],"date-time":"2008-05-30T10:48:34Z","timestamp":1212144514000},"page":"258-275","source":"Crossref","is-referenced-by-count":3,"title":["Stream Ciphers Using a Random Update Function: Study of the Entropy of the Inner State"],"prefix":"10.1007","author":[{"given":"Andrea","family":"R\u00f6ck","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","unstructured":"Babbage, S., Dodd, M.: The stream cipher MICKEY (version 1). eSTREAM, ECRYPT Stream Cipher Project, Report 2005\/015 (2005), \n                    \n                      http:\/\/www.ecrypt.eu.org\/stream"},{"key":"18_CR2","series-title":"Lecture Notes in Computer Science","first-page":"255","volume-title":"Advances in Cryptology - CRYPTO \u201987","author":"J.-P. Delescaille","year":"1988","unstructured":"Delescaille, J.-P., Quisquater, J.-J.: Other cycling tests for DES (abstract). In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol.\u00a0293, pp. 255\u2013256. Springer, Heidelberg (1988)"},{"key":"18_CR3","doi-asserted-by":"crossref","unstructured":"Flajolet, P., Odlyzko, A.M.: Random mapping statistics. In: Advances in Cryptology, Proc. Eurocrypt 1998, vol.\u00a0434, pp. 329\u2013354 (1990)","DOI":"10.1007\/3-540-46885-4_34"},{"issue":"2","key":"18_CR4","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1137\/0403019","volume":"3","author":"P. Flajolet","year":"1990","unstructured":"Flajolet, P., Odlyzko, A.M.: Singularity analysis of generating functions. SIAM J. Discrete Math.\u00a03(2), 216\u2013240 (1990)","journal-title":"SIAM J. Discrete Math."},{"key":"18_CR5","volume-title":"An introduction to the analysis of algorithms","author":"P. Flajolet","year":"1996","unstructured":"Flajolet, P., Sedgewick, R.: An introduction to the analysis of algorithms. Addison-Wesley Longman Publishing Co., Inc. Boston (1996)"},{"issue":"4","key":"18_CR6","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1109\/TIT.1980.1056220","volume":"26","author":"M. Hellman","year":"1980","unstructured":"Hellman, M.: A cryptanalytic time-memory trade-off. Information Theory, IEEE Transactions on\u00a026(4), 401\u2013406 (1980)","journal-title":"Information Theory, IEEE Transactions on"},{"key":"18_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/11596219_14","volume-title":"Progress in Cryptology - INDOCRYPT 2005","author":"J. Hong","year":"2005","unstructured":"Hong, J., Kim, W.H.: TMD-tradeoff and state entropy loss considerations of streamcipher MICKEY. In: Maitra, S., Veni Madhavan, C.E., Venkatesan, R. (eds.) INDOCRYPT 2005. LNCS, vol.\u00a03797, pp. 169\u2013182. Springer, Heidelberg (2005)"},{"key":"18_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1007\/11593447_19","volume-title":"Advances in Cryptology - ASIACRYPT 2005","author":"J. Hong","year":"2005","unstructured":"Hong, J., Sarkar, P.: New applications of time memory data tradeoffs. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol.\u00a03788, pp. 353\u2013372. Springer, Heidelberg (2005)"},{"key":"18_CR9","unstructured":"Kolchin, V.F.: Random Mappings. Optimization Software, Inc. (1986)"},{"issue":"4","key":"18_CR10","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1145\/945511.945516","volume":"13","author":"A. Seznec","year":"2003","unstructured":"Seznec, A., Sendrier, N.: HAVEGE: A user-level software heuristic for generating empirically strong random numbers. ACM Trans. Model. Comput. Simul.\u00a013(4), 334\u2013346 (2003)","journal-title":"ACM Trans. Model. Comput. Simul."}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 AFRICACRYPT 2008"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-68164-9_18.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T04:38:52Z","timestamp":1620016732000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-68164-9_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540681595","9783540681649"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-68164-9_18","relation":{},"subject":[]}}