{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:05:13Z","timestamp":1725516313304},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540683506"},{"type":"electronic","value":"9783540683513"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-68351-3_13","type":"book-chapter","created":{"date-parts":[[2008,8,12]],"date-time":"2008-08-12T16:07:43Z","timestamp":1218557263000},"page":"170-178","source":"Crossref","is-referenced-by-count":6,"title":["F-FCSR Stream Ciphers"],"prefix":"10.1007","author":[{"given":"Fran\u00e7ois","family":"Arnault","sequence":"first","affiliation":[]},{"given":"Thierry","family":"Berger","sequence":"additional","affiliation":[]},{"given":"C\u00e9dric","family":"Lauradoux","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"5","key":"13_CR1","doi-asserted-by":"publisher","first-page":"910","DOI":"10.1109\/TIT.2004.826651","volume":"50","author":"F. Arnault","year":"2004","unstructured":"Arnault, F., Berger, T.P., Necer, A.: Feedback with Carry Shift Registers synthesis with the Euclidean Algorithm. IEEE Trans. Inform. Theory\u00a050(5), 910\u2013917 (2004)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"13_CR2","unstructured":"Arnault, F., Berger, T.P.: Design of new pseudo random generators based on a filtered FCSR automaton. In: SASC, State of the Art of Stream Ciphers Workshop, Bruges, Belgium, October 2004, pp. 109\u2013120 (2004)"},{"key":"13_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1007\/11502760_6","volume-title":"Fast Software Encryption","author":"F. Arnault","year":"2005","unstructured":"Arnault, F., Berger, T.P.: F-FCSR: design of a new class of stream ciphers. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol.\u00a03557, pp. 83\u201397. Springer, Heidelberg (2005)"},{"key":"13_CR4","unstructured":"Arnault, F., Berger, T.P., Minier, M.: On the security of FCSR-based pseudorandom generators. In: ECRYPT Network of Excellence - SASC Workshop (2007), \n                  \n                    http:\/\/sasc.crypto.rub.de\/files\/sasc2007_179.pdf"},{"issue":"11","key":"13_CR5","doi-asserted-by":"publisher","first-page":"1374","DOI":"10.1109\/TC.2005.181","volume":"54","author":"F. Arnault","year":"2005","unstructured":"Arnault, F., Berger, T.P.: Design and properties of a new pseudorandom generator based on a filtered FCSR automaton. IEEE Trans. Computers\u00a054(11), 1374\u20131383 (2005)","journal-title":"IEEE Trans. Computers"},{"key":"13_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/11596219_12","volume-title":"Progress in Cryptology - INDOCRYPT 2005","author":"T.P. Berger","year":"2005","unstructured":"Berger, T.P., Minier, M.: Two algebraic attacks against the F-FCSRs using the IV mode. In: Maitra, S., Veni Madhavan, C.E., Venkatesan, R. (eds.) INDOCRYPT 2005. LNCS, vol.\u00a03797, pp. 143\u2013154. Springer, Heidelberg (2005)"},{"key":"13_CR7","doi-asserted-by":"publisher","first-page":"2826","DOI":"10.1109\/TIT.2002.804048","volume":"48","author":"M. Goresky","year":"2002","unstructured":"Goresky, M., Klapper, A.: Fibonacci and Galois representation of feedback with carry shift registers. IEEE Trans. Inform. Theory\u00a048, 2826\u20132836 (2002)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"13_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1007\/11863854_29","volume-title":"Sequences and Their Applications \u2013 SETA 2006","author":"M. Goresky","year":"2006","unstructured":"Goresky, M., Klapper, A.: Periodicity and distribution properties of combined FCSR sequences. In: Gong, G., Helleseth, T., Song, H.-Y., Yang, K. (eds.) SETA 2006. LNCS, vol.\u00a04086, pp. 334\u2013341. Springer, Heidelberg (2006)"},{"key":"13_CR9","unstructured":"Jaulmes, E., Muller, F.: Cryptanalysis of ecrypt candidates F-FCSR-8 and F-FCSR-H. ECRYPT Stream Cipher Project Report 2005\/046 (2005), \n                  \n                    http:\/\/www.ecrypt.eu.org\/stream"},{"key":"13_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1007\/11693383_2","volume-title":"Selected Areas in Cryptography","author":"E. Jaulmes","year":"2006","unstructured":"Jaulmes, E., Muller, F.: Cryptanalysis of the F-FCSR stream cipher family. In: Preneel, B., Tavares, S.E. (eds.) SAC 2005. LNCS, vol.\u00a03897, pp. 20\u201335. Springer, Heidelberg (2006)"},{"key":"13_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"174","DOI":"10.1007\/3-540-58108-1_21","volume-title":"Fast Software Encryption","author":"A. Klapper","year":"1994","unstructured":"Klapper, A., Goresky, M.: 2-adic shift registers. In: Anderson, R. (ed.) FSE 1993. LNCS, vol.\u00a0809, pp. 174\u2013178. Springer, Heidelberg (1994)"},{"key":"13_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"262","DOI":"10.1007\/3-540-44750-4_21","volume-title":"Advances in Cryptology - CRYPTO \u201995","author":"A. Klapper","year":"1995","unstructured":"Klapper, A., Goresky, M.: Cryptanalysis based on 2-adic rational approximation. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol.\u00a0963, pp. 262\u2013273. Springer, Heidelberg (1995)"},{"key":"13_CR13","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/s001459900024","volume":"10","author":"A. Klapper","year":"1997","unstructured":"Klapper, A., Goresky, M.: Feedback Shift Registers, 2-Adic Span, and Combiners with Memory. Journal of Cryptology\u00a010, 111\u2013147 (1997)","journal-title":"Journal of Cryptology"}],"container-title":["Lecture Notes in Computer Science","New Stream Cipher Designs"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-68351-3_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T04:49:17Z","timestamp":1620017357000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-68351-3_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540683506","9783540683513"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-68351-3_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}