{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T04:36:43Z","timestamp":1770525403979,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540859116","type":"print"},{"value":"9783540859123","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-85912-3_3","type":"book-chapter","created":{"date-parts":[[2008,9,11]],"date-time":"2008-09-11T13:34:32Z","timestamp":1221140072000},"page":"30-41","source":"Crossref","is-referenced-by-count":7,"title":["New Distinguishers Based on Random Mappings against Stream Ciphers"],"prefix":"10.1007","author":[{"given":"Meltem","family":"S\u00f6nmez Turan","sequence":"first","affiliation":[]},{"given":"\u00c7a\u011fda\u015f","family":"\u00c7al\u0131k","sequence":"additional","affiliation":[]},{"given":"Nurdan Buz","family":"Saran","sequence":"additional","affiliation":[]},{"given":"Ali","family":"Do\u011fanaksoy","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1109\/TIT.1980.1056220","volume":"IT-26","author":"M.E. Hellman","year":"1980","unstructured":"Hellman, M.E.: A cryptanalytic time-memory trade off. IEEE Trans. Inform. Theory\u00a0IT-26, 401\u2013406 (1980)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Babbage, H.: Improved exhaustive search attacks on stream ciphers. In: European Convention on Security and Detection, IEE Conference publication (408), pp. 161\u2013166 (1995)","DOI":"10.1049\/cp:19950490"},{"key":"3_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/3-540-69053-0_17","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"J.D. Goli\u0107","year":"1997","unstructured":"Goli\u0107, J.D.: Cryptanalysis of alleged A5 stream cipher. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.\u00a01233, pp. 239\u2013255. Springer, Heidelberg (1997)"},{"key":"3_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44448-3_1","volume-title":"Advances in Cryptology - ASIACRYPT 2000","author":"A. Biryukov","year":"2000","unstructured":"Biryukov, A., Shamir, A.: Cryptanalytic time\/memory\/data tradeoffs for stream ciphers. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol.\u00a01976, pp. 1\u201313. Springer, Heidelberg (2000)"},{"key":"3_CR5","unstructured":"Hong, J., Sarkar, P.: Rediscovery of time memory tradeoffs. Cryptology ePrint Archive, Report 2005\/090 (2005), http:\/\/eprint.iacr.org\/"},{"key":"3_CR6","unstructured":"eStream: ECRYPT Stream Cipher Project. IST-2002-507932 (2004), http:\/\/www.ecrypt.eu.org\/stream"},{"key":"3_CR7","series-title":"Lecture Notes in Computer Science","first-page":"780","volume-title":"Field-Programmable Logic and Applications. Reconfigurable Computing Is Going Mainstream","author":"J. Quisquater","year":"2002","unstructured":"Quisquater, J., Standaert, F., Rouvroy, G., David, J., Legat, J.: A cryptanalytic time-memory tradeoff: First FPGA implementation. In: Glesner, M., Zipf, P., Renovell, M. (eds.) FPL 2002. LNCS, vol.\u00a02438, pp. 780\u2013789. Springer, Heidelberg (2002)"},{"key":"3_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"617","DOI":"10.1007\/978-3-540-45146-4_36","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"P. Oechslin","year":"2003","unstructured":"Oechslin, P.: Making a faster cryptanalytic time-memory trade-off. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 617\u2013630. Springer, Heidelberg (2003)"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Rukhin, A., Soto, J., Nechvatal, J., Smid, M., Barker, E., Leigh, S., Levenson, M., Vangel, M., Banks, D., Heckert, A., Dray, J., Vo, S.: A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications (2001), http:\/\/www.nist.gov","DOI":"10.6028\/NIST.SP.800-22"},{"key":"3_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1007\/978-3-540-77026-8_20","volume-title":"Progress in Cryptology \u2013 INDOCRYPT 2007","author":"H. Englund","year":"2007","unstructured":"Englund, H., Johansson, T., Sonmez Turan, M.: A framework for chosen IV statistical analysis of stream ciphers. In: Srinathan, K., Rangan, C.P., Yung, M. (eds.) INDOCRYPT 2007. LNCS, vol.\u00a04859, pp. 268\u2013281. Springer, Heidelberg (2007)"},{"key":"3_CR11","unstructured":"Sonmez Turan, M., Do\u00f6anaksoy, A., \u00c7alik, \u00c7 .: Statistical analysis of synchronous stream ciphers. In: SASC 2006: Stream Ciphers Revisited (2006)"},{"key":"3_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44706-7_1","volume-title":"Fast Software Encryption","author":"A. Biryukov","year":"2001","unstructured":"Biryukov, A., Shamir, A., Wagner, D.: Real time cryptanalysis of A5\/1 on a PC. In: Schneier, B. (ed.) FSE 2000. LNCS, vol.\u00a01978, pp. 1\u201318. Springer, Heidelberg (2001)"},{"key":"3_CR13","unstructured":"Jansen, C., Kolosha, A.: Cascade jump controlled sequence generator. eSTREAM, ECRYPT Stream Cipher Project, Report 2005\/022 (2005)"}],"container-title":["Lecture Notes in Computer Science","Sequences and Their Applications - SETA 2008"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-85912-3_3.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:36:22Z","timestamp":1606185382000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-85912-3_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540859116","9783540859123"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-85912-3_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[]}}