{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:33:41Z","timestamp":1725496421707},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540773597"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-77360-3_24","type":"book-chapter","created":{"date-parts":[[2007,12,1]],"date-time":"2007-12-01T08:04:18Z","timestamp":1196496258000},"page":"378-395","source":"Crossref","is-referenced-by-count":6,"title":["Revisiting Correlation-Immunity in Filter Generators"],"prefix":"10.1007","author":[{"given":"Aline","family":"Gouget","sequence":"first","affiliation":[]},{"given":"Herv\u00e9","family":"Sibert","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"24_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1007\/3-540-60590-8_11","volume-title":"Fast Software Encryption","author":"R.J. Anderson","year":"1995","unstructured":"Anderson, R.J.: Searching for the Optimum Correlation Attack. In: Preneel, B. (ed.) Fast Software Encryption. LNCS, vol.\u00a01008, pp. 137\u2013143. Springer, Heidelberg (1995)"},{"key":"24_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44448-3_1","volume-title":"Advances in Cryptology - ASIACRYPT 2000","author":"A. Biryukov","year":"2000","unstructured":"Biryukov, A., Shamir, A.: Cryptanalytic Time\/Memory\/Data Tradeoffs for Stream Ciphers. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol.\u00a01976, pp. 1\u201313. Springer, Heidelberg (2000)"},{"key":"24_CR3","unstructured":"Canteaut, A., Filiol, E.: On the influence of the filtering function on the performance of fast correlation attacks on filter generators. In: Proceedings of 23rd Symposium on Information Theory in the Benelux, Louvain-la-Neuve, Belgique, pp. 299\u2013306 (2002)"},{"key":"24_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1007\/3-540-45539-6_40","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"A. Canteaut","year":"2000","unstructured":"Canteaut, A., Trabbia, M.: Improved Fast Correlation Attacks Using Parity-Check Equations of Weight 4 and 5. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 573\u2013588. Springer, Heidelberg (2000)"},{"key":"24_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/3-540-44706-7_13","volume-title":"Fast Software Encryption","author":"V. Chepyzhov","year":"2001","unstructured":"Chepyzhov, V., Johansson, T., Smeets, B.J.M.: A Simple Algorithm for Fast Correlation Attacks on Stream Ciphers. In: Schneier, B. (ed.) FSE 2000. LNCS, vol.\u00a01978, pp. 181\u2013195. Springer, Heidelberg (2001)"},{"key":"24_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/BFb0052338","volume-title":"Fast Software Encryption","author":"M. Dichtl","year":"1997","unstructured":"Dichtl, M.: On Nonlinear Filter Generators. In: Biham, E. (ed.) FSE 1997. LNCS, vol.\u00a01267, pp. 103\u2013106. Springer, Heidelberg (1997)"},{"key":"24_CR7","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-54973-0","volume-title":"The Stability Theory of Stream Ciphers","author":"C. Ding","year":"1991","unstructured":"Ding, C., Xiao, G., Shan, W.: The Stability Theory of Stream Ciphers, vol.\u00a0561. Springer, Berlin (1991)"},{"key":"24_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1007\/3-540-60865-6_52","volume-title":"Proceedings of Fast Software Encryption 1996","author":"J. Dj.Golic","year":"1996","unstructured":"Dj.Golic, J.: On the Security of Nonlinear Filter Generators. In: Gollmann, D. (ed.) Proceedings of Fast Software Encryption 1996. LNCS, vol.\u00a01039, pp. 173\u2013188. Springer, Heidelberg (1996)"},{"key":"24_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1007\/11593447_19","volume-title":"Advances in Cryptology - ASIACRYPT 2005","author":"J. Hong","year":"2005","unstructured":"Hong, J., Sarkar, P.: New Applications of Time Memory Data Tradeoffs. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol.\u00a03788, pp. 353\u2013372. Springer, Heidelberg (2005)"},{"key":"24_CR10","unstructured":"Logachev, O.A.: On Perfectly Balanced Boolean Functions. Cryptology ePrint Archive, Report 2007\/022 (2007), \n                  \n                    http:\/\/eprint.iacr.org\/"},{"issue":"3","key":"24_CR11","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/BF02252874","volume":"1","author":"W. Meier","year":"1989","unstructured":"Meier, W., Staffelbach, O.: Fast Correlation Attacks on Certain Stream Ciphers. Journal of Cryptology\u00a01(3), 159\u2013176 (1989)","journal-title":"Journal of Cryptology"},{"key":"24_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"549","DOI":"10.1007\/3-540-46885-4_53","volume-title":"EUROCRYPT 1989","author":"W. Meier","year":"1990","unstructured":"Meier, W., Staffelbach, O.: Nonlinearity Criteria for Cryptographic Functions. In: Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol.\u00a0434, pp. 549\u2013562. Springer, Heidelberg (1990)"},{"key":"24_CR13","doi-asserted-by":"crossref","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Cryptography","author":"A.J. Menezes","year":"1996","unstructured":"Menezes, A.J., Vanstone, S.A., Van Oorschot, P.C.: Handbook of Applied Cryptography. CRC Press, Inc., Boca Raton, FL, USA (1996)"},{"key":"24_CR14","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-82865-2","volume-title":"Analysis and design of stream ciphers","author":"R.A. Rueppel","year":"1986","unstructured":"Rueppel, R.A.: Analysis and design of stream ciphers. Springer, New York (1986)"},{"issue":"5","key":"24_CR15","doi-asserted-by":"publisher","first-page":"776","DOI":"10.1109\/TIT.1984.1056949","volume":"30","author":"T. Siegenthaler","year":"1984","unstructured":"Siegenthaler, T.: Correlation-immunity of nonlinear combining functions for cryptographic applications. IEEE Transactions on Information Theory\u00a030(5), 776\u2013780 (1984)","journal-title":"IEEE Transactions on Information Theory"},{"key":"24_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1007\/3-540-39805-8_12","volume-title":"EUROCRYPT 1985","author":"T. Siegenthaler","year":"1986","unstructured":"Siegenthaler, T.: Cryptanalysts Representation of Nonlinearly Filtered ML-Sequences. In: Pichler, F. (ed.) EUROCRYPT 1985. LNCS, vol.\u00a0219, pp. 103\u2013110. Springer, Heidelberg (1986)"},{"issue":"1","key":"24_CR17","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1109\/TC.1985.1676518","volume":"34","author":"T. Siegenthaler","year":"1985","unstructured":"Siegenthaler, T.: Decrypting a Class of Stream Ciphers Using Ciphertext Only. IEEE Trans. Computers\u00a034(1), 81\u201385 (1985)","journal-title":"IEEE Trans. Computers"},{"issue":"1","key":"24_CR18","first-page":"33","volume":"1","author":"S.N. Sumarokov","year":"1994","unstructured":"Sumarokov, S.N.:  Zaprety dvoichnyx funkcii i obratimost\u2019 dlya odnogo klassa kodiruyushchix ustrojstv (Defects of Boolean functions and invertibility of a class of coding circuits, in Russian). Obozrenie prikladnoj i promyshlennoj matematiki\u00a01(1), 33\u201355 (1994)","journal-title":"Obozrenie prikladnoj i promyshlennoj matematiki"},{"key":"24_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/11799313_3","volume-title":"Fast Software Encryption","author":"H. Wu","year":"2006","unstructured":"Wu, H., Preneel, B.: Cryptanalysis of the Stream Cipher DECIM. In: Robshaw, M. (ed.) FSE 2006. LNCS, vol.\u00a04047, pp. 30\u201340. Springer, Heidelberg (2006)"},{"issue":"3","key":"24_CR20","doi-asserted-by":"publisher","first-page":"569","DOI":"10.1109\/18.6037","volume":"IT-34","author":"G. Xiao","year":"1988","unstructured":"Xiao, G., Massey, J.L.: A spectral characterization of correlation immune combining functions. IEEE Transactions on Information Theory\u00a0IT-34(3), 569\u2013571 (1988)","journal-title":"IEEE Transactions on Information Theory"}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77360-3_24.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T11:09:32Z","timestamp":1619521772000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77360-3_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540773597"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77360-3_24","relation":{},"subject":[]}}