{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:58:13Z","timestamp":1725487093835},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540734574"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-73458-1_1","type":"book-chapter","created":{"date-parts":[[2007,7,4]],"date-time":"2007-07-04T15:09:27Z","timestamp":1183561767000},"page":"1-10","source":"Crossref","is-referenced-by-count":0,"title":["An Analysis of the Hermes8 Stream Ciphers"],"prefix":"10.1007","author":[{"given":"Steve","family":"Babbage","sequence":"first","affiliation":[]},{"given":"Carlos","family":"Cid","sequence":"additional","affiliation":[]},{"given":"Norbert","family":"Pramstaller","sequence":"additional","affiliation":[]},{"given":"H\u00e5vard","family":"Raddum","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Barkan, E., Biham, E.: In How Many Ways Can You Write Rijndael? Cryptology ePrint Archive, 2002\/157 (2002), http:\/\/eprint.iacr.org\/2002\/157\/","DOI":"10.1007\/3-540-36178-2_10"},{"key":"1_CR2","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The Design of Rijndael","author":"J. Daemen","year":"2002","unstructured":"Daemen, J., Rijmen, V.: The Design of Rijndael. Springer, Heidelberg (2002)"},{"key":"1_CR3","unstructured":"eSTREAM, the ECRYPT Stream Cipher Project, http:\/\/www.ecrypt.eu.org\/stream\/"},{"key":"1_CR4","unstructured":"De Canni\u00e8re, C.: eSTREAM testing framework, http:\/\/www.ecrypt.eu.org\/stream\/perf\/"},{"key":"1_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1007\/10718964_18","volume-title":"Information Security and Privacy","author":"J. Golic","year":"2000","unstructured":"Golic, J.: Iterative Probabilistic Cryptanalysis of RC4 Keystream Generator. In: Clark, A., Boyd, C., Dawson, E.P. (eds.) ACISP 2000. LNCS, vol.\u00a01841, pp. 220\u2013233. Springer, Heidelberg (2000)"},{"key":"1_CR6","unstructured":"Kaiser, U.: Hermes8 : A Low-Complexity Low-Power Stream Cipher. Cryptology ePrint Archive, Report 2006\/019, http:\/\/eprint.iacr.org\/2006\/019.pdf"},{"key":"1_CR7","unstructured":"Kaiser, U.: Hermes8F: A Low-Complexity Low-Power Stream Cipher. eSTREAM, the ECRYPT Stream Cipher Project, Second Phase Ciphers, http:\/\/www.ecrypt.eu.org\/stream\/p2ciphers\/hermes8\/hermes8f_p2.pdf"},{"key":"1_CR8","doi-asserted-by":"crossref","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Cryptography","author":"A.J. Menezes","year":"1996","unstructured":"Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)"},{"key":"1_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1007\/3-540-48285-7_6","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"K. Nyberg","year":"1994","unstructured":"Nyberg, K.: Diferentially uniform mappings for cryptography. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 55\u201364. Springer, Heidelberg (1994)"},{"key":"1_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"142","DOI":"10.1007\/11506447_12","volume-title":"Advanced Encryption Standard \u2013 AES","author":"H. Raddum","year":"2005","unstructured":"Raddum, H.: More Dual Rijndaels. In: Dobbertin, H., Rijmen, V., Sowa, A. (eds.) Advanced Encryption Standard \u2013 AES. LNCS, vol.\u00a03373, pp. 142\u2013147. Springer, Heidelberg (2005)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-73458-1_1.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T05:15:25Z","timestamp":1605762925000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-73458-1_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540734574"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-73458-1_1","relation":{},"subject":[]}}