{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:39:36Z","timestamp":1725518376086},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540859116"},{"type":"electronic","value":"9783540859123"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-85912-3_19","type":"book-chapter","created":{"date-parts":[[2008,9,11]],"date-time":"2008-09-11T13:34:32Z","timestamp":1221140072000},"page":"197-218","source":"Crossref","is-referenced-by-count":4,"title":["Sequences, DFT and Resistance against Fast Algebraic Attacks"],"prefix":"10.1007","author":[{"given":"Guang","family":"Gong","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1007\/978-3-540-45146-4_10","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"F. Armknecht","year":"2003","unstructured":"Armknecht, F., Krause, M.: Algebraic attacks on combiners with memory. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 162\u2013175. Springer, Heidelberg (2003)"},{"key":"19_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1007\/978-3-540-25937-4_5","volume-title":"Fast Software Encryption","author":"F. Armknecht","year":"2004","unstructured":"Armknecht, F.: Improving fast algebraic attacks. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol.\u00a03017, pp. 65\u201382. Springer, Heidelberg (2004)"},{"key":"19_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/11554868_3","volume-title":"Progress in Cryptology \u2013 Mycrypt 2005","author":"F. Armknecht","year":"2005","unstructured":"Armknecht, F., Ars, G.: Introducing a new variant of fast algebraic attacks and minimizing their successive data complexity. In: Dawson, E., Vaudenay, S. (eds.) Mycrypt 2005. LNCS, vol.\u00a03715, pp. 16\u201332. Springer, Heidelberg (2005)"},{"key":"19_CR4","unstructured":"Bluetooth CIG, Specification of the Bluetooth system, Version 1.1 (February 22, 2001), \n                    \n                      www.bluetooth.com"},{"issue":"4","key":"19_CR5","doi-asserted-by":"publisher","first-page":"1491","DOI":"10.1109\/18.923730","volume":"47","author":"A. Canteaut","year":"2001","unstructured":"Canteaut, A., Carlet, C., Charpin, P., Fontaine, C.: On cryptographic properties of the cosets of R(1, m). IEEE Trans. on Inform. Theory\u00a047(4), 1491\u20131513 (2001)","journal-title":"IEEE Trans. on Inform. Theory"},{"key":"19_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"584","DOI":"10.1007\/11818175_35","volume-title":"Advances in Cryptology - CRYPTO 2006","author":"C. Carlet","year":"2006","unstructured":"Carlet, C.: On the higher order nonlinearities of algebraic immune functions. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol.\u00a04117, pp. 584\u2013601. Springer, Heidelberg (2006)"},{"key":"19_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1007\/3-540-36552-4_13","volume-title":"Information Security and Cryptology - ICISC 2002","author":"N. Courtois","year":"2003","unstructured":"Courtois, N.: Higher order correlation attacks, XL algorithm and cryptanalysis of Toyocrypt. In: Lee, P.J., Lim, C.H. (eds.) ICISC 2002. LNCS, vol.\u00a02587, pp. 549\u2013564. Springer, Heidelberg (2003)"},{"key":"19_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1007\/3-540-39200-9_21","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"N. Courtois","year":"2003","unstructured":"Courtois, N., Meier, W.: Algebraic attacks on stream ciphers with linear feedback. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656, pp. 345\u2013359. Springer, Heidelberg (2003)"},{"key":"19_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1007\/978-3-540-45146-4_11","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"N. Courtois","year":"2003","unstructured":"Courtois, N.: Fast algebraic attacks on stream ciphers with linear feedback. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 176\u2013194. Springer, Heidelberg (2003)"},{"key":"19_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1007\/11502760_7","volume-title":"Fast Software Encryption","author":"D.K. Dalai","year":"2005","unstructured":"Dalai, D.K., Gupta, K.C., Maitra, S.: Cryptographically Significant Boolean functions: Construction and Analysis in terms of Algebraic Immunity. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol.\u00a03557, pp. 98\u2013111. Springer, Heidelberg (2005)"},{"key":"19_CR11","unstructured":"eSTREAM - The ECRYPT Stream Cipher Project, \n                    \n                      http:\/\/www.ecrypt.eu.org\/stream\/"},{"key":"19_CR12","series-title":"Lecture Notes in Computer Science","first-page":"93","volume-title":"Advances in Cryptology-Eurocrypt 1984","author":"D. Gollmann","year":"1984","unstructured":"Gollmann, D.: Pseudo random properties of cascade connections of clock controlled shift registers. In: Advances in Cryptology-Eurocrypt 1984. LNCS, pp. 93\u201398. Springer, Heidelberg (1984)"},{"key":"19_CR13","unstructured":"Golomb, S.W.: Shift Register Sequences. Holden-Day, Inc., San Francisco 1967, revised edition. Aegean Park Press, Laguna Hills, CA (1982)"},{"key":"19_CR14","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511546907","volume-title":"Signal Design with Good Correlation: for Wireless Communications, Cryptography and Radar Applications","author":"S.W. Golomb","year":"2005","unstructured":"Golomb, S.W., Gong, G.: Signal Design with Good Correlation: for Wireless Communications, Cryptography and Radar Applications. Cambridge University Press, Cambridge (2005)"},{"key":"19_CR15","unstructured":"Gong, G.: On existence and Invariant of algebraic attacks, Technical Report of University of Waterloo, CORR 2004-17 (2004)"},{"key":"19_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"390","DOI":"10.1007\/978-3-540-28628-8_24","volume-title":"Advances in Cryptology \u2013 CRYPTO 2004","author":"P. Hawkes","year":"2004","unstructured":"Hawkes, P., Rose, G.G.: Rewriting variables: the complexity of fast algebraic attacks on stream ciphers. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol.\u00a03152, pp. 390\u2013406. Springer, Heidelberg (2004)"},{"key":"19_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"474","DOI":"10.1007\/978-3-540-24676-3_28","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"W. Meier","year":"2004","unstructured":"Meier, W., Pasalic, E., Carlet, C.: Algebraic attacks and decomposition of boolean functions. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 474\u2013491. Springer, Heidelberg (2004)"},{"key":"19_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1007\/11799313_24","volume-title":"Fast Software Encryption","author":"Y. Nawaz","year":"2006","unstructured":"Nawaz, Y., Gong, G., Gupta, K.C.: Upper bounds on algebraic immunity of boolean power functions. In: Robshaw, M. (ed.) FSE 2006. LNCS, vol.\u00a04047, pp. 375\u2013389. Springer, Heidelberg (2006)"},{"key":"19_CR19","unstructured":"Nawaz, Y., Gupta, K.C., Gong, G.: Efficient techniques to find algebraic immunity of s-boxes based on power mappings. In: Proceedings of International Workshop on Coding and Cryptography, Versailles, France, April 16-20, 2007, pp. 237\u2013246 (2007)"},{"issue":"5","key":"19_CR20","doi-asserted-by":"publisher","first-page":"1752","DOI":"10.1109\/TIT.2007.894690","volume":"53","author":"S. R\u00f8njom","year":"2007","unstructured":"R\u00f8njom, S., Helleseth, T.: A New Attack on the Filter Generator. IEEE Transactions on Information Theory\u00a053(5), 1752\u20131758 (2007)","journal-title":"IEEE Transactions on Information Theory"},{"key":"19_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1007\/978-3-540-77404-4_20","volume-title":"Sequences, Subsequences, and Consequences","author":"S. R\u00f8njom","year":"2007","unstructured":"R\u00f8njom, S., Gong, G., Helleseth, T.: On attacks on filtering generators using linear subspace structures. In: Golomb, S.W., Gong, G., Helleseth, T., Song, H.-Y. (eds.) SSC 2007. LNCS, vol.\u00a04893, pp. 204\u2013217. Springer, Heidelberg (2007)"},{"key":"19_CR22","doi-asserted-by":"crossref","unstructured":"R\u00f8njom, S., Gong, G., Helleseth, T.: A survey of recent attacks on the filter generator. In: The Proceedings of AAECC 2007, pp. 7\u201317 (2007)","DOI":"10.1007\/978-3-540-77224-8_2"},{"key":"19_CR23","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-82865-2","volume-title":"Analysis and Design of Stream Ciphers","author":"R.A. Rueppel","year":"1986","unstructured":"Rueppel, R.A.: Analysis and Design of Stream Ciphers. Springer, Heidelberg (1986)"},{"key":"19_CR24","series-title":"Lecture Notes in Computer Science","first-page":"392","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"A. Shamir","year":"2000","unstructured":"Shamir, A., Patarin, J., Courtois, N., Klimov, A.: Efficient algorithms for solving overdefined systems of multivariate polynomial equations. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 392\u2013407. Springer, Heidelberg (2000)"},{"key":"19_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1007\/3-540-44987-6_25","volume-title":"Advances in Cryptology - EUROCRYPT 2001","author":"A.M. Youssef","year":"2001","unstructured":"Youssef, A.M., Gong, G.: Hyper-Bent Functions. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.\u00a02045, pp. 406\u2013419. Springer, Heidelberg (2001)"}],"container-title":["Lecture Notes in Computer Science","Sequences and Their Applications - SETA 2008"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-85912-3_19.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T11:54:32Z","timestamp":1619524472000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-85912-3_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540859116","9783540859123"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-85912-3_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}