{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:18:42Z","timestamp":1761675522439},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540773597"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-77360-3_2","type":"book-chapter","created":{"date-parts":[[2007,12,1]],"date-time":"2007-12-01T08:04:18Z","timestamp":1196496258000},"page":"17-35","source":"Crossref","is-referenced-by-count":11,"title":["Extended BDD-Based Cryptanalysis of Keystream Generators"],"prefix":"10.1007","author":[{"given":"Dirk","family":"Stegemann","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1007\/978-3-540-45146-4_10","volume-title":"CRYPTO 2003","author":"F. Armknecht","year":"2003","unstructured":"Armknecht, F., Krause, M.: Algebraic attacks on combiners with memory. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 162\u2013176. Springer, Heidelberg (2003)"},{"key":"2_CR2","unstructured":"Arnault, F., Berger, T.P., Lauradoux, C.: Update on F-FCSR stream cipher. eSTREAM, ECRYPT Stream Cipher Project, Report 2006\/025 (2006), http:\/\/www.ecrypt.eu.org\/stream"},{"key":"2_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44448-3_1","volume-title":"ASIACRYPT 2000","author":"A. Biryukov","year":"2000","unstructured":"Biryukov, A., Shamir, A.: Cryptanalytic time\/memory\/data tradeoffs for stream ciphers. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol.\u00a01976, pp. 1\u201313. Springer, Heidelberg (2000)"},{"key":"2_CR4","unstructured":"The Bluetooth SIG. Specification of the Bluetooth System (February 2001)"},{"key":"2_CR5","unstructured":"Briceno, M., Goldberg, I., Wagner, D.: A pedagogical implementation of A5\/1 (May 1999), http:\/\/jya.com\/a51-pi.htm"},{"key":"2_CR6","series-title":"Lecture Notes in Computer Science","first-page":"177","volume-title":"CRYPTO 2003","author":"N. Courtois","year":"2003","unstructured":"Courtois, N.: Fast algebraic attacks on stream ciphers with linear feedback. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 177\u2013194. Springer, Heidelberg (2003)"},{"key":"2_CR7","unstructured":"de Canni\u00e8re, C., Preneel, B.: Trivium specifications. eSTREAM, ECRYPT Stream Cipher Project (2005), http:\/\/www.ecrypt.eu.org\/stream"},{"key":"2_CR8","unstructured":"eSTREAM, ECRYPT stream cipher project. http:\/\/www.ecrypt.eu.org\/stream"},{"key":"2_CR9","unstructured":"eSTREAM Discussion\u00a0Forum. A reformulation of Trivium. eSTREAM, ECRYPT Stream Cipher Project, Discussion Forum (2005), http:\/\/www.ecrypt.eu.org\/stream\/phorum\/read.php?1,448"},{"issue":"2","key":"2_CR10","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/BF00190805","volume":"9","author":"J. Goli\u0107","year":"1996","unstructured":"Goli\u0107, J.: Correlation properties of general binary combiners with memory. Journal of Cryptology\u00a09(2), 111\u2013126 (1996)","journal-title":"Journal of Cryptology"},{"issue":"11","key":"2_CR11","doi-asserted-by":"publisher","first-page":"2826","DOI":"10.1109\/TIT.2002.804048","volume":"48","author":"M. Goresky","year":"2002","unstructured":"Goresky, M., Klapper, A.: Fibonacci and galois representations of feedback-with-carry shift registers. IEEE Transactions on Information Theory\u00a048(11), 2826\u20132836 (2002)","journal-title":"IEEE Transactions on Information Theory"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Hell, M., Johansson, T., Maximov, A., Meier, W.: A stream cipher proposal: Grain-128. eSTREAM, ECRYPT Stream Cipher Project, Report 2005\/010 (2005), http:\/\/www.ecrypt.eu.org\/stream","DOI":"10.1109\/ISIT.2006.261549"},{"key":"2_CR13","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/s001459900024","volume":"10","author":"A. Klapper","year":"1997","unstructured":"Klapper, A., Goresky, M.: Feedback shift registers, 2-adic span, and combiners with memory. Journal of Cryptology\u00a010, 111\u2013147 (1997)","journal-title":"Journal of Cryptology"},{"key":"2_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1007\/3-540-46035-7_15","volume-title":"EUROCRYPT 2002","author":"M. Krause","year":"2002","unstructured":"Krause, M.: BDD-based cryptanalysis of keystream generators. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol.\u00a02332, pp. 222\u2013237. Springer, Heidelberg (2002)"},{"issue":"1","key":"2_CR15","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/s00224-005-1282-8","volume":"40","author":"M. Krause","year":"2007","unstructured":"Krause, M.: OBDD-based cryptanalysis of oblivious keystream generators. Theor. Comp. Sys.\u00a040(1), 101\u2013121 (2007)","journal-title":"Theor. Comp. Sys."},{"key":"2_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/11799313_11","volume-title":"Fast Software Encryption","author":"M. Krause","year":"2006","unstructured":"Krause, M., Stegemann, D.: Reducing the space complexity of BDD-based attacks on keystream generators. In: Robshaw, M. (ed.) FSE 2006. LNCS, vol.\u00a04047, pp. 163\u2013178. Springer, Heidelberg (2006)"},{"key":"2_CR17","unstructured":"Maximov, A., Biryukov, A.: Two trivial attacks on Trivium. eSTREAM, ECRYPT Stream Cipher Project, Repor 2007\/006 (2007), http:\/\/www.ecrypt.eu.org\/stream"},{"key":"2_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/BFb0053436","volume-title":"EUROCRYPT 1994","author":"W. Meier","year":"1995","unstructured":"Meier, W., Staffelbach, O.: The self-shrinking generator. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 205\u2013214. Springer, Heidelberg (1995)"},{"key":"2_CR19","unstructured":"Noras, J.: Fast pseudorandom sequence generators: Linear feedback shift registers, cellular automata, and carry feedback shift registers. Technical Report\u00a094, Univ. Bradford Elec. Eng. Dept., Bradford, U.K (1997)"},{"key":"2_CR20","doi-asserted-by":"crossref","unstructured":"Shaked, Y., Wool, A.: Cryptanalysis of the bluetooth E 0 cipher using OBDDs. Technical report, Cryptology ePrint Archive, Report 2006\/072 (2006)","DOI":"10.1007\/11836810_14"},{"key":"2_CR21","doi-asserted-by":"crossref","unstructured":"Wegener, I.: Branching Programs and Binary Decision Diagrams: Theory and Applications. SIAM Monographs on Discrete Mathematics and Applications (2000)","DOI":"10.1137\/1.9780898719789"}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77360-3_2.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T11:09:30Z","timestamp":1619521770000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77360-3_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540773597"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77360-3_2","relation":{},"subject":[]}}