{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:19:42Z","timestamp":1761675582613},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540681595"},{"type":"electronic","value":"9783540681649"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-68164-9_19","type":"book-chapter","created":{"date-parts":[[2008,5,30]],"date-time":"2008-05-30T06:48:34Z","timestamp":1212130114000},"page":"276-289","source":"Crossref","is-referenced-by-count":41,"title":["Analysis of Grain\u2019s Initialization Algorithm"],"prefix":"10.1007","author":[{"given":"Christophe","family":"De Canni\u00e8re","sequence":"first","affiliation":[]},{"given":"\u00d6zg\u00fcl","family":"K\u00fc\u00e7\u00fck","sequence":"additional","affiliation":[]},{"given":"Bart","family":"Preneel","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/978-3-540-74619-5_6","volume-title":"Fast Software Encryption","author":"H. Wu","year":"2007","unstructured":"Wu, H., Preneel, B.: Differential-linear attacks against the stream cipher Phelix. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol.\u00a04593, pp. 87\u2013100. Springer, Heidelberg (2007)"},{"key":"19_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1007\/978-3-540-72540-4_16","volume-title":"Advances in Cryptology - EUROCRYPT 2007","author":"H. Wu","year":"2007","unstructured":"Wu, H., Preneel, B.: Differential cryptanalysis of the stream ciphers Py, Py6 and Pypy. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol.\u00a04515, pp. 276\u2013290. Springer, Heidelberg (2007)"},{"key":"19_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1007\/978-3-540-74619-5_4","volume-title":"Fast Software Encryption","author":"A. Joux","year":"2007","unstructured":"Joux, A., Reinhard, J.R.: Overtaking Vest. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol.\u00a04593, pp. 58\u201372. Springer, Heidelberg (2007)"},{"key":"19_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1007\/11799313_27","volume-title":"Fast Software Encryption","author":"H. Wu","year":"2006","unstructured":"Wu, H., Preneel, B.: Resynchronization attacks on WG and LEX. In: Robshaw, M.J.B. (ed.) FSE 2006. LNCS, vol.\u00a04047, pp. 422\u2013432. Springer, Heidelberg (2006)"},{"key":"19_CR5","unstructured":"K\u00fc\u00e7\u00fck, \u00d6.: Slide resynchronization attack on the initialization of Grain 1.0. eSTREAM, ECRYPT Stream Cipher Project, Report 2006\/044 (2006), http:\/\/www.ecrypt.eu.org\/stream"},{"key":"19_CR6","unstructured":"Hell, M., Johansson, T., Meier, W.: Grain \u2013 A Stream Cipher for Constrained Environments. eSTREAM, ECRYPT Stream Cipher Project, Report 2005\/010 (2005) http:\/\/www.ecrypt.eu.org\/stream"},{"key":"19_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/11799313_2","volume-title":"Fast Software Encryption","author":"C. Berbain","year":"2006","unstructured":"Berbain, C., Gilbert, H., Maximov, A.: Cryptanalysis of Grain. In: Robshaw, M.J.B. (ed.) FSE 2006. LNCS, vol.\u00a04047, pp. 15\u201329. Springer, Heidelberg (2006)"},{"key":"19_CR8","unstructured":"Khazaei, S., Kiaei, M.H.M.: Distinguishing attack on Grain. eSTREAM, ECRYPT Stream Cipher Project, Report 2006\/071 (2005), http:\/\/www.ecrypt.eu.org\/stream ."},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"Hell, M., Johansson, T., Meier, W.: A Stream Cipher Proposal: Grain-128. eSTREAM, ECRYPT Stream Cipher Project (2006), http:\/\/www.ecrypt.eu.org\/stream","DOI":"10.1109\/ISIT.2006.261549"},{"key":"19_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/3-540-48519-8_18","volume-title":"Fast Software Encryption","author":"A. Biryukov","year":"1999","unstructured":"Biryukov, A., Wagner, D.: Slide attacks. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol.\u00a01636, pp. 245\u2013259. Springer, Heidelberg (1999)"},{"key":"19_CR11","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4613-9314-6","volume-title":"Differential Cryptanalysis of the Data Encryption Standard","author":"E. Biham","year":"1993","unstructured":"Biham, E., Shamir, A.: Differential Cryptanalysis of the Data Encryption Standard. Springer, Heidelberg (1993)"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 AFRICACRYPT 2008"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-68164-9_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,11]],"date-time":"2019-05-11T16:00:53Z","timestamp":1557590453000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-68164-9_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540681595","9783540681649"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-68164-9_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}