{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:33:33Z","timestamp":1725496413973},"publisher-location":"Berlin, Heidelberg","reference-count":5,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540773597"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-77360-3_19","type":"book-chapter","created":{"date-parts":[[2007,12,1]],"date-time":"2007-12-01T03:04:18Z","timestamp":1196478258000},"page":"296-310","source":"Crossref","is-referenced-by-count":0,"title":["Attacks on the ESA-PSS-04-151 MAC Scheme"],"prefix":"10.1007","author":[{"given":"Georg","family":"Illies","sequence":"first","affiliation":[]},{"given":"Marian","family":"Margraf","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1007\/978-3-540-30564-4_17","volume-title":"Selected Areas in Cryptography","author":"J. Gathen von zur","year":"2004","unstructured":"von zur Gathen, J., Shparlinski, I.E.: Predicting Subset Sum Pseudorandom Generators. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol.\u00a03357, pp. 241\u2013251. Springer, Heidelberg (2004)"},{"key":"19_CR2","unstructured":"Telecommand Decoder Specification, ESA PSS-04-151, Issue 1. ESA, Paris (September 1993)"},{"key":"19_CR3","first-page":"46","volume-title":"IEEE Intern. Symp. of Inform. Theory","author":"R.A. Rueppel","year":"1985","unstructured":"Rueppel, R.A., Massey, J.L.: Knapsack as a nonlinear function. In: IEEE Intern. Symp. of Inform. Theory, p. 46. IEEE Press, Los Alamitos (1985)"},{"key":"19_CR4","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-82865-2","volume-title":"Analysis and design of stream ciphers","author":"R.A. Rueppel","year":"1986","unstructured":"Rueppel, R.A.: Analysis and design of stream ciphers. Springer, New York (1986)"},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"Spinsante, S., Chiaraluce, F., Gambi, E.: Numerical verification of the historicity of the ESA telecommand authentication approach, talk given at Spaceops 2006, Rome (2006), on-line: http:\/\/www.aiaa.org\/spaceops2006\/presentations\/55955.ppt","DOI":"10.2514\/6.2006-5580"}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77360-3_19.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:09:30Z","timestamp":1619507370000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77360-3_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540773597"],"references-count":5,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77360-3_19","relation":{},"subject":[]}}