{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:33:16Z","timestamp":1725496396793},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540773597"},{"type":"electronic","value":"9783540773603"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-77360-3_25","type":"book-chapter","created":{"date-parts":[[2007,12,1]],"date-time":"2007-12-01T08:04:18Z","timestamp":1196496258000},"page":"396-407","source":"Crossref","is-referenced-by-count":2,"title":["Distinguishing Attack Against TPypy"],"prefix":"10.1007","author":[{"given":"Yukiyasu","family":"Tsunoo","sequence":"first","affiliation":[]},{"given":"Teruo","family":"Saito","sequence":"additional","affiliation":[]},{"given":"Takeshi","family":"Kawabata","sequence":"additional","affiliation":[]},{"given":"Hiroki","family":"Nakashima","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"25_CR1","unstructured":"eSTREAM, the ECRYPT Stream Cipher Project, available at \n                  \n                    http:\/\/www.ecrypt.eu.org\/stream\/"},{"key":"25_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"432","DOI":"10.1007\/978-3-540-30539-2_31","volume-title":"ASIACRYPT 2004","author":"T. Baign\u00e8res","year":"2004","unstructured":"Baign\u00e8res, T., Junod, P., Vaudenay, S.: How Far Can We Go Beyond Linear Cryptanalysis? In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol.\u00a03329, pp. 432\u2013450. Springer, Heidelberg (2004)"},{"key":"25_CR3","unstructured":"Biham, E., Seberry, J.: Py (Roo): A Fast and Secure Stream Cipher Using Rolling Arrays. eSTREAM, the ECRYPT Stream Cipher Project, Report 2005\/023 (2005)"},{"key":"25_CR4","unstructured":"Biham, E., Seberry, J.: Pypy: Another Version of Py. eSTREAM, the ECRYPT Stream Cipher Project, Report 2006\/038 (2006)"},{"key":"25_CR5","unstructured":"Biham, E., Seberry, J.: Tweaking the IV Setup of the Py Family of Stream Ciphers \u2013 The Ciphers TPy, TPypy, and TPy6. eSTREAM, the ECRYPT Stream Cipher Project, Report 2007\/038 (2007)"},{"key":"25_CR6","unstructured":"Crowley, P.: Improved Cryptanalysis of Py. In: SASC 2006 - Stream Ciphers Revisited, Workshop Record, pp. 52\u201360 (2006)"},{"key":"25_CR7","unstructured":"Isobe, T., Ohigashi, T., Kuwakado, H., Morii, M.: How to Break Py and Pypy by a Chosen-IV Attack. In: SASC 2007 - The State of the Art of Stream Ciphers, Workshop Record, pp. 340\u2013352 (2007)"},{"key":"25_CR8","unstructured":"Kogiso, M., Shimoyama, T.: A Distinguishing Attack on the Stream Cipher Pypy. In: Symposium on Cryptography and Information Security - SCIS, IEICE Technical Report, 2A2-2 (2007) (in Japanese)"},{"key":"25_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1007\/11799313_26","volume-title":"Fast Software Encryption","author":"S. Paul","year":"2006","unstructured":"Paul, S., Preneel, B., Sekar, G.: Distinguishing Attacks on the Stream Cipher Py. In: Robshaw, M. (ed.) FSE 2006. LNCS, vol.\u00a04047, pp. 405\u2013421. Springer, Heidelberg (2006)"},{"key":"25_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/11935230_5","volume-title":"ASIACRYPT 2006","author":"S. Paul","year":"2006","unstructured":"Paul, S., Preneel, B.: On the (In)security of Stream Ciphers Based on Arrays and Modular Addition. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol.\u00a04284, pp. 69\u201383. Springer, Heidelberg (2006)"},{"key":"25_CR11","volume-title":"Applied Cryptography","author":"B. Schneier","year":"1996","unstructured":"Schneier, B.: Applied Cryptography, 2nd edn. John Wiley & Sons, Chichester (1996)","edition":"2"},{"key":"25_CR12","unstructured":"Sekar, G., Paul, S., Preneel, B.: Weaknesses in the Pseudorandom Bit Generation Algorithms of the Stream Ciphers TPypy and TPy. eSTREAM, the ECRYPT Stream Cipher Project, Report 2007\/037 (2007)"},{"key":"25_CR13","unstructured":"Wu, H., Preneel, B.: Attacking the IV Setup of Py and Pypy. eSTREAM, the ECRYPT Stream Cipher Project, Report 2006\/050 (2006)"},{"key":"25_CR14","unstructured":"Wu, H., Preneel, B.: Key Recovery Attack on Py and Pypy with Chosen IVs. eSTREAM, the ECRYPT Stream Cipher Project, Report 2006\/052 (2006)"},{"key":"25_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1007\/978-3-540-72540-4_16","volume-title":"EUROCRYPT 2007","author":"H. Wu","year":"2007","unstructured":"Wu, H., Preneel, B.: Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol.\u00a04515, pp. 276\u2013290. Springer, Heidelberg (2007)"}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77360-3_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T15:23:00Z","timestamp":1558279380000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77360-3_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540773597","9783540773603"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77360-3_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}