{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:43:19Z","timestamp":1725496999941},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540772712"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-77272-9_13","type":"book-chapter","created":{"date-parts":[[2007,12,6]],"date-time":"2007-12-06T06:56:55Z","timestamp":1196924215000},"page":"204-219","source":"Crossref","is-referenced-by-count":0,"title":["Remarks on the New Attack on the Filter Generator and the Role of High Order Complexity"],"prefix":"10.1007","author":[{"given":"Panagiotis","family":"Rizomiliotis","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","doi-asserted-by":"crossref","unstructured":"Canteaut, A.: Fast Correlation Attacks Against Stream Ciphers and Related Open Problems. In: IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, pp. 49\u201354 (2005)","DOI":"10.1109\/ITWTPI.2005.4638690"},{"key":"13_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11779360_10","volume-title":"Coding and Cryptography","author":"A. Canteaut","year":"2006","unstructured":"Canteaut, A.: Open problems related to algebraic attacks on stream ciphers. In: Ytrehus, \u00d8. (ed.) WCC 2005. LNCS, vol.\u00a03969, pp. 1\u201311. Springer, Heidelberg (2006)"},{"key":"13_CR3","unstructured":"eSTREAM. http:\/\/www.ecrypt.eu.org\/stream\/"},{"key":"13_CR4","volume-title":"Shift Register Sequences","author":"S.W. Golomb","year":"1967","unstructured":"Golomb, S.W.: Shift Register Sequences. Holden\u2013Day Inc, San Francisco (1967)"},{"key":"13_CR5","volume-title":"Finite Fields. Encyclopedia of Mathematics and its Applications","author":"R. Lidl","year":"1996","unstructured":"Lidl, R., Niederreiter, H.: Finite Fields. Encyclopedia of Mathematics and its Applications, 2nd edn., vol.\u00a020. Cambridge University Press, Cambridge (1996)","edition":"2"},{"key":"13_CR6","doi-asserted-by":"crossref","DOI":"10.1201\/9781439821916","volume-title":"Handbook of applied cryptography","author":"A.J. Menezes","year":"1996","unstructured":"Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A.: Handbook of applied cryptography. CRC Press, Boca Raton (1996)"},{"key":"13_CR7","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"INDOCRYPT 2003","author":"H. Niederreiter","year":"2003","unstructured":"Niederreiter, H.: Linear Complexity and Related Complexity Measures for Sequences. In: Johansson, T., Maitra, S. (eds.) INDOCRYPT 2003. LNCS, vol.\u00a02904, pp. 1\u201317. Springer, Heidelberg (2003)"},{"key":"13_CR8","doi-asserted-by":"publisher","first-page":"1555","DOI":"10.1109\/TIT.2005.844090","volume":"51","author":"P. Rizomiliotis","year":"2005","unstructured":"Rizomiliotis, P., Kalouptsidis, N.: Results on the nonlinear span of binary sequences. IEEE Trans. Inform. Theory\u00a051, 1555\u20131563 (2005)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"13_CR9","doi-asserted-by":"publisher","first-page":"1752","DOI":"10.1109\/TIT.2007.894690","volume":"53","author":"S. Ronjom","year":"2007","unstructured":"Ronjom, S., Helleseth, T.: A new attack on the filter generator. IEEE Trans. Inform. Theory\u00a053, 1752\u20131758 (2007)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Ronjom, S., Helleseth, T.: S.\u00a0Ronjom and T.\u00a0Helleseth: Attacking the Filter Generator over GF(2 m ). In: SASC 2007. The State of the Art of Stream Ciphers (2007)","DOI":"10.1109\/TIT.2007.894690"},{"key":"13_CR11","volume-title":"Communications and Control Engineering Series","author":"R.A. Rueppel","year":"1986","unstructured":"Rueppel, R.A.: Analysis and Design of Stream Ciphers. In: Communications and Control Engineering Series, Springer, Heidelberg (1986)"}],"container-title":["Lecture Notes in Computer Science","Cryptography and Coding"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77272-9_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,15]],"date-time":"2023-05-15T00:38:12Z","timestamp":1684111092000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77272-9_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540772712"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77272-9_13","relation":{},"subject":[]}}