{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,4]],"date-time":"2025-04-04T07:26:04Z","timestamp":1743751564103},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540770251"},{"type":"electronic","value":"9783540770268"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-77026-8_26","type":"book-chapter","created":{"date-parts":[[2007,11,30]],"date-time":"2007-11-30T06:56:14Z","timestamp":1196405774000},"page":"341-350","source":"Crossref","is-referenced-by-count":14,"title":["X-FCSR \u2013 A New Software Oriented Stream Cipher Based Upon FCSRs"],"prefix":"10.1007","author":[{"given":"Fran\u00e7ois","family":"Arnault","sequence":"first","affiliation":[]},{"given":"Thierry P.","family":"Berger","sequence":"additional","affiliation":[]},{"given":"C\u00e9dric","family":"Lauradoux","sequence":"additional","affiliation":[]},{"given":"Marine","family":"Minier","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"26_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1007\/11502760_6","volume-title":"Fast Software Encryption","author":"F. Arnault","year":"2005","unstructured":"Arnault, F., Berger, T.P.: F-FCSR: design of a new class of stream ciphers. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol.\u00a03557, pp. 83\u201397. Springer, Heidelberg (2005)"},{"unstructured":"Arnault, F., Berger, T.P., Lauradoux, C.: The FCSR: primitive specification and supporting documentation. ECRYPT - Network of Excellence in Cryptology, Call for stream Cipher Primitives (2005), http:\/\/www.ecrypt.eu.org\/stream\/","key":"26_CR2"},{"unstructured":"Arnault, F., Berger, T.P., Lauradoux, C.: Update on F-FCSR stream cipher. ECRYPT - Network of Excellence in Cryptology, Call for stream Cipher Primitives - Phase 2 (2006), http:\/\/www.ecrypt.eu.org\/stream\/","key":"26_CR3"},{"doi-asserted-by":"crossref","unstructured":"Arnault, F., Berger, T.P., Lauradoux, C., Minier, M.: X-FCSR: a new software oriented stream cipher based upon FCSRs (full paper). Cryptology ePrint Archive, Report 2007\/380, http:\/\/eprint.iacr.org\/2007\/280","key":"26_CR4","DOI":"10.1007\/978-3-540-77026-8_26"},{"issue":"11","key":"26_CR5","doi-asserted-by":"publisher","first-page":"1374","DOI":"10.1109\/TC.2005.181","volume":"54","author":"F. Arnault","year":"2005","unstructured":"Arnault, F., Berger, T.P.: Design and properties of a new pseudorandom generator based on a filtered FCSR automaton. IEEE Trans. Computers\u00a054(11), 1374\u20131383 (2005)","journal-title":"IEEE Trans. Computers"},{"unstructured":"Arnault, F., Berger, T.P., Minier, M.: On the security of FCSR-based pseudorandom generators. In: ECRYPT Network of Excellence - SASC Workshop (2007), Available at: http:\/\/sasc.crypto.rub.de\/files\/sasc2007_179.pdf","key":"26_CR6"},{"unstructured":"Ars, G., Faug\u00e8re, J.-C.: An algebraic cryptanalysis of nonlinear filter generators using Gr\u00f6bner bases. Research Report INRIA Lorraine, number 4739 (2003)","key":"26_CR7"},{"unstructured":"Berbain, C., Billet, O., Canteaut, A., Courtois, N., Gilbert, H., Goubin, L., Gouget, A., Granboulan, L., Lauradoux, C., Minier, M., Pornin, T., Sibert, H.: Sosemanuk: a fast oriented software-oriented stream cipher. ECRYPT - Network of Excellence in Cryptology, Call for stream Cipher Primitives - Phase 2 (2005), http:\/\/www.ecrypt.eu.org\/stream\/","key":"26_CR8"},{"key":"26_CR9","series-title":"Lecture Notes in Computer Science","volume-title":"FSE 2007","author":"C. Berbain","year":"2007","unstructured":"Berbain, C., Gilbert, H.: On the security of IV dependent stream ciphers. In: FSE 2007. LNCS, vol.\u00a04593, Springer, Heidelberg (2007)"},{"key":"26_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/11596219_12","volume-title":"Progress in Cryptology - INDOCRYPT 2005","author":"T.P. Berger","year":"2005","unstructured":"Berger, T.P., Minier, M.: Two algebraic attacks against the F-FCSRs using the IV mode. In: Maitra, S., Madhavan, C.E.V., Venkatesan, R. (eds.) INDOCRYPT 2005. LNCS, vol.\u00a03797, pp. 143\u2013154. Springer, Heidelberg (2005)"},{"key":"26_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"398","DOI":"10.1007\/3-540-48285-7_34","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"E. Biham","year":"1994","unstructured":"Biham, E.: New types of cryptoanalytic attacks using related keys (extended abstract). In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 398\u2013409. Springer, Heidelberg (1994)"},{"key":"26_CR12","series-title":"Lecture Notes in Computer Science","first-page":"177","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"N. Courtois","year":"2003","unstructured":"Courtois, N.: Fast algebraic attacks on stream ciphers with linear feedback. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 177\u2013194. Springer, Heidelberg (2003)"},{"unstructured":"Daemen, J., Rijmen, V.: AES proposal: Rijndael. In: The Second Advanced Encryption Standard Candidate Conference. N.I.S.T. (1999), available at: http:\/\/csrc.nist.gov\/encryption\/aes\/","key":"26_CR13"},{"unstructured":"de Canni\u00e8res, C.: eSTREAM Optimized Code HOWTO (2005), http:\/\/www.ecrypt.eu.org\/stream\/perf","key":"26_CR14"},{"key":"26_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1007\/11863854_29","volume-title":"Sequences and Their Applications \u2013 SETA 2006","author":"M. Goresky","year":"2006","unstructured":"Goresky, M., Klapper, A.: Periodicity and distribution properties of combined FCSR sequences. In: Gong, G., Helleseth, T., Song, H.-Y., Yang, K. (eds.) SETA 2006. LNCS, vol.\u00a04086, pp. 334\u2013341. Springer, Heidelberg (2006)"},{"key":"26_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/11799313_5","volume-title":"Fast Software Encryption","author":"L. Granboulan","year":"2006","unstructured":"Granboulan, L., Levieil, E., Piret, G.: Pseudorandom permutation families over abelian groups. In: Robshaw, M. (ed.) FSE 2006. LNCS, vol.\u00a04047, pp. 57\u201377. Springer, Heidelberg (2006)"},{"key":"26_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"368","DOI":"10.1007\/11502760_25","volume-title":"Fast Software Encryption","author":"S. Hong","year":"2005","unstructured":"Hong, S., Kim, J., Lee, S., Preneel, B.: Related-key rectangle attacks on reduced versions of shacal-1 and aes-192. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol.\u00a03557, pp. 368\u2013383. Springer, Heidelberg (2005)"},{"unstructured":"Jaulmes, E., Muller, F.: Cryptanalysis of ecrypt candidates F-FCSR-8 and F-FCSR-H. ECRYPT Stream Cipher Project Report, 2005\/04 (2005), http:\/\/www.ecrypt.eu.org\/stream","key":"26_CR18"},{"key":"26_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1007\/11693383_2","volume-title":"Selected Areas in Cryptography","author":"E. Jaulmes","year":"2005","unstructured":"Jaulmes, E., Muller, F.: Cryptanalysis of the F-FCSR stream cipher family. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol.\u00a03897, pp. 20\u201335. Springer, Heidelberg (2005)"},{"key":"26_CR20","series-title":"Lecture Notes in Computer Science","first-page":"174","volume-title":"Fast Software Encryption","author":"A. Klapper","year":"1993","unstructured":"Klapper, A., Goresky, M.: 2-adic shift registers. In: Anderson, R. (ed.) Fast Software Encryption. LNCS, vol.\u00a0809, pp. 174\u2013178. Springer, Heidelberg (1993)"},{"issue":"2","key":"26_CR21","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/s001459900024","volume":"10","author":"A. Klapper","year":"1997","unstructured":"Klapper, A., Goresky, M.: Feedback Shift Registers, 2-Adic Span, and Combiners with Memory. J. Cryptol.\u00a010(2), 111\u2013147 (1997)","journal-title":"J. Cryptol."},{"unstructured":"Network of Excellence in Cryptology ECRYPT. Call for stream cipher primitives, http:\/\/www.ecrypt.eu.org\/stream\/","key":"26_CR22"},{"unstructured":"National\u00a0Institute of\u00a0Standards and Technology. The statistical test suite (v.1.8) (2005), http:\/\/csrc.nist.gov\/rng\/rng2.html","key":"26_CR23"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 INDOCRYPT 2007"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77026-8_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,28]],"date-time":"2020-04-28T23:43:11Z","timestamp":1588117391000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77026-8_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540770251","9783540770268"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77026-8_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}