{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T09:47:06Z","timestamp":1764841626131},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642106279"},{"type":"electronic","value":"9783642106286"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-10628-6_8","type":"book-chapter","created":{"date-parts":[[2009,12,4]],"date-time":"2009-12-04T06:41:25Z","timestamp":1259908885000},"page":"119-135","source":"Crossref","is-referenced-by-count":13,"title":["Software Oriented Stream Ciphers Based upon FCSRs in Diversified Mode"],"prefix":"10.1007","author":[{"given":"Thierry P.","family":"Berger","sequence":"first","affiliation":[]},{"given":"Marine","family":"Minier","sequence":"additional","affiliation":[]},{"given":"Benjamin","family":"Pousse","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","unstructured":"Arnault, F., Berger, T.P., Lauradoux, C.: The FCSR: primitive specification and supporting documentation. In: ECRYPT - Network of Excellence in Cryptology, Call for stream Cipher Primitives (2005), \n                    \n                      http:\/\/www.ecrypt.eu.org\/stream\/"},{"key":"8_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"433","DOI":"10.1007\/978-3-642-05445-7_27","volume-title":"SAC 2009","author":"F. Arnault","year":"2009","unstructured":"Arnault, F., Berger, T.P., Lauradoux, C., Minier, M., Pousse, B.: A new approach for FCSRs. In: Jacobson Jr., M.J., Rijmen, V., Safavi-Naini, R. (eds.) SAC 2009. LNCS, vol.\u00a05867, pp. 433\u2013448. Springer, Heidelberg (2009), \n                    \n                      http:\/\/eprint.iacr.org\/2009\/167"},{"key":"8_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1007\/11502760_6","volume-title":"Fast Software Encryption","author":"F. Arnault","year":"2005","unstructured":"Arnault, F., Berger, T.P.: F-FCSR: Design of a new class of stream ciphers. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol.\u00a03557, pp. 83\u201397. Springer, Heidelberg (2005)"},{"key":"8_CR4","unstructured":"Arnault, F., Berger, T.P., Lauradoux, C.: Update on F-FCSR Stream Cipher. In: ECRYPT - Network of Excellence in Cryptology, Call for stream Cipher Primitives - Phase 2 (2006), \n                    \n                      http:\/\/www.ecrypt.eu.org\/stream\/"},{"key":"8_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1007\/978-3-540-77026-8_26","volume-title":"Progress in Cryptology \u2013 INDOCRYPT 2007","author":"F. Arnault","year":"2007","unstructured":"Arnault, F., Berger, T.P., Lauradoux, C., Minier, M.: X-FCSR - a new software oriented stream cipher based upon FCSRs. In: Srinathan, K., Rangan, C.P., Yung, M. (eds.) INDOCRYPT 2007. LNCS, vol.\u00a04859, pp. 341\u2013350. Springer, Heidelberg (2007)"},{"issue":"2","key":"8_CR6","doi-asserted-by":"publisher","first-page":"836","DOI":"10.1109\/TIT.2007.913244","volume":"54","author":"F. Arnault","year":"2008","unstructured":"Arnault, F., Berger, T.P., Minier, M.: Some Results on FCSR Automata With Applications to the Security of FCSR-Based Pseudorandom Generators. IEEE Transactions on Information Theory\u00a054(2), 836\u2013840 (2008)","journal-title":"IEEE Transactions on Information Theory"},{"key":"8_CR7","unstructured":"Berbain, C., Billet, O., Canteaut, A., Courtois, N., Gilbert, H., Goubin, L., Gouget, A., Granboulan, L., Lauradoux, C., Minier, M., Pornin, T., Sibert, H.: Sosemanuk: a fast oriented software-oriented stream cipher. In: ECRYPT - Network of Excellence in Cryptology, Call for stream Cipher Primitives - Phase 2 (2005), \n                    \n                      http:\/\/www.ecrypt.eu.org\/stream\/"},{"key":"8_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1007\/978-3-540-74619-5_17","volume-title":"Fast Software Encryption","author":"C. Berbain","year":"2007","unstructured":"Berbain, C., Gilbert, H.: On the security of IV dependent stream ciphers. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol.\u00a04593, pp. 254\u2013273. Springer, Heidelberg (2007)"},{"key":"8_CR9","series-title":"Lecture Notes in Computer Science","first-page":"398","volume-title":"Advances in Cryptology - EUROCRYPT \u201992","author":"E. Biham","year":"1993","unstructured":"Biham, E.: New types of cryptoanalytic attacks using related keys (extended abstract). In: Rueppel, R.A. (ed.) EUROCRYPT 1992. LNCS, vol.\u00a0658, pp. 398\u2013409. Springer, Heidelberg (1993)"},{"key":"8_CR10","unstructured":"de Canni\u00e8res, C.: eSTREAM Optimized Code HOWTO (2005), \n                    \n                      http:\/\/www.ecrypt.eu.org\/stream\/perf"},{"key":"8_CR11","unstructured":"Fischer, S., Meier, W., Stegemann, D.: Equivalent Representations of the F-FCSR Keystream Generator. In: ECRYPT Network of Excellence - SASC Workshop, pp. 87\u201394 (2008), \n                    \n                      http:\/\/www.ecrypt.eu.org\/stvl\/sasc2008\/"},{"issue":"4","key":"8_CR12","doi-asserted-by":"publisher","first-page":"1342","DOI":"10.1109\/18.605605","volume":"43","author":"M. Goresky","year":"1997","unstructured":"Goresky, M., Klapper, A.: Arithmetic crosscorrelations of feedback with carry shift register sequences. IEEE Transactions on Information Theory\u00a043(4), 1342\u20131345 (1997)","journal-title":"IEEE Transactions on Information Theory"},{"issue":"11","key":"8_CR13","doi-asserted-by":"publisher","first-page":"2826","DOI":"10.1109\/TIT.2002.804048","volume":"48","author":"M. Goresky","year":"2002","unstructured":"Goresky, M., Klapper, A.: Fibonacci and Galois representations of feedback-with-carry shift registers. IEEE Transactions on Information Theory\u00a048(11), 2826\u20132836 (2002)","journal-title":"IEEE Transactions on Information Theory"},{"key":"8_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1007\/11863854_29","volume-title":"Sequences and Their Applications \u2013 SETA 2006","author":"M. Goresky","year":"2006","unstructured":"Goresky, M., Klapper, A.: Periodicity and distribution properties of combined fcsr sequences. In: Gong, G., Helleseth, T., Song, H.-Y., Yang, K. (eds.) SETA 2006. LNCS, vol.\u00a04086, pp. 334\u2013341. Springer, Heidelberg (2006)"},{"key":"8_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/11799313_5","volume-title":"Fast Software Encryption","author":"L. Granboulan","year":"2006","unstructured":"Granboulan, L., Levieil, \u00c9., Piret, G.: Pseudorandom permutation families over abelian groups. In: Robshaw, M.J.B. (ed.) FSE 2006. LNCS, vol.\u00a04047, pp. 57\u201377. Springer, Heidelberg (2006)"},{"key":"8_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1007\/978-3-540-89255-7_34","volume-title":"Advances in Cryptology - ASIACRYPT 2008","author":"M. Hell","year":"2008","unstructured":"Hell, M., Johansson, T.: Breaking the F-FCSR-H stream cipher in real time. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol.\u00a05350, pp. 557\u2013569. Springer, Heidelberg (2008)"},{"key":"8_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"368","DOI":"10.1007\/11502760_25","volume-title":"Fast Software Encryption","author":"S. Hong","year":"2005","unstructured":"Hong, S., Kim, J., Lee, S., Preneel, B.: Related-key rectangle attacks on reduced versions of SHACAL-1 and AES-192. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol.\u00a03557, pp. 368\u2013383. Springer, Heidelberg (2005)"},{"key":"8_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"174","DOI":"10.1007\/3-540-58108-1_21","volume-title":"Fast Software Encryption","author":"A. Klapper","year":"1994","unstructured":"Klapper, A., Goresky, M.: 2-adic shift registers. In: Anderson, R. (ed.) FSE 1993. LNCS, vol.\u00a0809, pp. 174\u2013178. Springer, Heidelberg (1994)"},{"issue":"3","key":"8_CR19","doi-asserted-by":"publisher","first-page":"456","DOI":"10.1145\/321765.321777","volume":"20","author":"T.G. Lewis","year":"1973","unstructured":"Lewis, T.G., Payne, W.H.: Generalized feedback shift register pseudorandom number algorithm. J. ACM\u00a020(3), 456\u2013468 (1973)","journal-title":"J. ACM"},{"issue":"14","key":"8_CR20","doi-asserted-by":"crossref","first-page":"1","DOI":"10.18637\/jss.v008.i14","volume":"8","author":"G. Marsaglia","year":"2003","unstructured":"Marsaglia, G.: Xorshift RNGs. Journal of Statistical Software\u00a08(14), 1\u20136 (2003)","journal-title":"Journal of Statistical Software"},{"issue":"3","key":"8_CR21","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1145\/146382.146383","volume":"2","author":"M. Matsumoto","year":"1992","unstructured":"Matsumoto, M., Kurita, Y.: Twisted GFSR generators. ACM Trans. Model. Comput. Simul.\u00a02(3), 179\u2013194 (1992)","journal-title":"ACM Trans. Model. Comput. Simul."},{"issue":"1","key":"8_CR22","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/272991.272995","volume":"8","author":"M. Matsumoto","year":"1998","unstructured":"Matsumoto, M., Nishimura, T.: Mersenne twister: A 623-dimensionally equidistributed uniform pseudo-random number generator. ACM Trans. Model. Comput. Simul.\u00a08(1), 3\u201330 (1998)","journal-title":"ACM Trans. Model. Comput. Simul."},{"issue":"1","key":"8_CR23","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1006\/ffta.1995.1002","volume":"1","author":"H. Niederreiter","year":"1995","unstructured":"Niederreiter, H.: The multiple-recursive matrix method for pseudorandom number generation. Finite Fields Appl.\u00a01(1), 3\u201330 (1995)","journal-title":"Finite Fields Appl."},{"issue":"4","key":"8_CR24","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1145\/1113316.1113319","volume":"15","author":"F. Panneton","year":"2005","unstructured":"Panneton, F., L\u2019Ecuyer, P.: On the xorshift random number generators. ACM Trans. Model. Comput. Simul.\u00a015(4), 346\u2013361 (2005)","journal-title":"ACM Trans. Model. Comput. Simul."},{"key":"8_CR25","unstructured":"Rivest, R.: The RC4 encryption algorithm. RSA Data Security (1992)"},{"key":"8_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1007\/978-3-540-68164-9_18","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2008","author":"A. R\u00f6ck","year":"2008","unstructured":"R\u00f6ck, A.: Stream ciphers using a random update function: Study of the entropy of the inner state. In: Vaudenay, S. (ed.) AFRICACRYPT 2008. LNCS, vol.\u00a05023, pp. 258\u2013275. Springer, Heidelberg (2008)"},{"key":"8_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"670","DOI":"10.1007\/3-540-46885-4_66","volume-title":"Advances in Cryptology - EUROCRYPT \u201989","author":"Y. Roggeman","year":"1990","unstructured":"Roggeman, Y.: Varying feedback shift registers. In: Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol.\u00a0434, pp. 670\u2013679. Springer, Heidelberg (1990)"},{"key":"8_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1007\/978-3-642-03317-9_2","volume-title":"FSE 2009","author":"P. Stankovski","year":"2009","unstructured":"Stankovski, P., Hell, M., Johansson, T.: An efficient state recovery attack on X-FCSR-256. In: Dunkelman, O. (ed.) FSE 2009. LNCS, vol.\u00a05665, pp. 23\u201337. Springer, Heidelberg (2009)"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology - INDOCRYPT 2009"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-10628-6_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T11:36:39Z","timestamp":1619782599000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-10628-6_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642106279","9783642106286"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-10628-6_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}