{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T22:03:28Z","timestamp":1759961008240},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540794981"},{"type":"electronic","value":"9783540794998"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-79499-8_7","type":"book-chapter","created":{"date-parts":[[2008,8,16]],"date-time":"2008-08-16T16:35:36Z","timestamp":1218904536000},"page":"66-80","source":"Crossref","is-referenced-by-count":13,"title":["Linear Slide Attacks on the KeeLoq Block Cipher"],"prefix":"10.1007","author":[{"given":"Andrey","family":"Bogdanov","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","unstructured":"Bogdanov, A.: Attacks in the KeeLoq Block Cipher and Authentication Systems. In: The 3rd Conference on RFID Security (RFIDSec 2007), Malaga, Spain (2007)"},{"key":"7_CR2","unstructured":"Wikipedia: Keeloq algorithm (2006), \n                    \n                      http:\/\/en.wikipedia.org\/wiki\/KeeLoq"},{"key":"7_CR3","unstructured":"HomeLink: Homelink and KeeLoq-based Rolling Code Garage Door Openers (2006), \n                    \n                      http:\/\/www.homelink.com\/home\/keeloq.tml"},{"key":"7_CR4","unstructured":"Microchip: Hopping Code Decoder using a PIC16C56, AN642 (1998), \n                    \n                      http:\/\/en.wikipedia.org\/wiki\/KeeLoq\n                    \n                    \n                   and \n                    \n                      http:\/\/www.keeloq.boom.ru\/decryption.pdf"},{"key":"7_CR5","unstructured":"Microchip: An Introduction to KeeLoq Code Hopping (1996), \n                    \n                      http:\/\/ww1.microchip.com\/downloads\/en\/AppNotes\/91002a.pdf"},{"key":"7_CR6","unstructured":"Microchip: HCS101 Fixed Code Encoder Data Sheet (2001), \n                    \n                      http:\/\/ww1.microchip.com\/downloads\/en\/DeviceDoc\/41115c.pdf"},{"key":"7_CR7","unstructured":"Microchip: Using KeeLoq to Validate Subsystem Compatibility, AN827 (2002), \n                    \n                      http:\/\/ww1.microchip.com\/downloads\/en\/AppNotes\/00827a.pdf"},{"key":"7_CR8","unstructured":"Microchip: PIC12F635\/PIC16F636\/PIC16F639 Cryptographic Module General Overview, TB086 (2005), \n                    \n                      http:\/\/ww1.microchip.com\/downloads\/en\/DeviceDoc\/91086A.pdf"},{"key":"7_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48519-8_18","volume-title":"Fast Software Encryption","author":"A. Biryukov","year":"1999","unstructured":"Biryukov, A., Wagner, D.: Slide Attacks. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol.\u00a01636, Springer, Heidelberg (1999)"},{"key":"7_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45539-6_41","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"A. Biryukov","year":"2000","unstructured":"Biryukov, A., Wagner, D.: Advanced Slide Attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, Springer, Heidelberg (2000)"},{"key":"7_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-74462-7","volume-title":"Fast Software Encryption","author":"E. Biham","year":"2007","unstructured":"Biham, E., Dunkelman, O., Keller, N.: Improved Slide Attacks. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol.\u00a04593, Springer, Heidelberg (2007)"},{"key":"7_CR12","unstructured":"Courtois, N., Bard, G.: Algebraic and Slide attacks on KeeLoq (2007), \n                    \n                      http:\/\/eprint.iacr.org\/2007\/062"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Siegenthaler, T.: Correlation-immunity of Nonlinear Combining Functions for Cryptographic Applications. IEEE Trans. on Inform. Theory\u00a0IT-30 (1984)","DOI":"10.1109\/TIT.1984.1056949"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Siegenthaler, T.: Decrypting a Class of Stream Ciphers Using Ciphertext Only. IEEE Trans. on Computers\u00a034 (1985)","DOI":"10.1109\/TC.1985.1676518"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Chor, B., Goldreich, O., Hastad, J., Fridman, J., Rudich, S., Smolensky, R.: The Bit Extraction Problem or t-Resilient Functions. In: 26th Symposium on Foundations of Computer Science (1985)","DOI":"10.1109\/SFCS.1985.55"},{"key":"7_CR16","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Cryptology - ASIACRYPT 2004","author":"T. Baigneres","year":"2004","unstructured":"Baigneres, T., Junod, P., Vaudenay, S.: How Far Can We Go Beyond Linear Cryptanalysis? In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol.\u00a03329, Springer, Heidelberg (2004)"},{"key":"7_CR17","doi-asserted-by":"crossref","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Cryptography","author":"A. Menezes","year":"1996","unstructured":"Menezes, A., van Oorshot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)"},{"key":"7_CR18","unstructured":"Microchip: HCS301 KeeLoq Code Hopping Encoder Data Sheet (2001), \n                    \n                      http:\/\/ww1.microchip.com\/downloads\/en\/devicedoc\/21143b.pdf"},{"key":"7_CR19","unstructured":"Microchip: HCS410 Keeloq Code Hopping Encoder and Transponder (2001), \n                    \n                      http:\/\/ww1.microchip.com\/downloads\/en\/DeviceDoc\/40158e.pdf"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-79499-8_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T11:23:56Z","timestamp":1619522636000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-79499-8_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540794981","9783540794998"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-79499-8_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}