{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T06:18:36Z","timestamp":1757312316159},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642144226"},{"type":"electronic","value":"9783642144233"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14423-3_8","type":"book-chapter","created":{"date-parts":[[2010,6,18]],"date-time":"2010-06-18T12:13:34Z","timestamp":1276863214000},"page":"101-117","source":"Crossref","is-referenced-by-count":8,"title":["Improved Linear Cryptanalysis of SOSEMANUK"],"prefix":"10.1007","author":[{"given":"Joo Yeon","family":"Cho","sequence":"first","affiliation":[]},{"given":"Miia","family":"Hermelin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","unstructured":"Anderson, R., Biham, E., Knudsen, L.: Serpent: A proposal for the advanced encryption standard. In: First Advanced Encryption Standard (AES) conference (1998)"},{"key":"8_CR2","unstructured":"Babbage, S., Canniere, C.: The eSTREAM portfolio (2008), \n                    \n                      http:\/\/www.ecrypt.eu.org\/stream\/portfolio.pdf"},{"key":"8_CR3","unstructured":"Berbain, C., Billet, O., Canteaut, A., Courtois, N., Gilbert, H., Goubin, L., Gouget, A., Granboulan, L., Lauradoux, C., Minier, M., Pornin, T., Sibert, H.: SOSEMANUK: a fast software-oriented stream cipher, eSTREAM, ECRYPT Stream Cipher Project, Report 2005\/027 (2005), \n                    \n                      http:\/\/www.ecrypt.eu.org\/stream\/sosemanukp3.html"},{"key":"8_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/11799313_2","volume-title":"Fast Software Encryption","author":"C. Berbain","year":"2006","unstructured":"Berbain, C., Gilbert, H., Maximov, A.: Cryptanalysis of grain. In: Robshaw, M.J.B. (ed.) FSE 2006. LNCS, vol.\u00a04047, pp. 15\u201329. Springer, Heidelberg (2006)"},{"key":"8_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1007\/978-3-540-25937-4_4","volume-title":"Fast Software Encryption","author":"J. Cho","year":"2004","unstructured":"Cho, J., Pieprzyk, J.: Algebraic attacks on SOBER-t32 and SOBER-t16 without stuttering. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol.\u00a03017, pp. 49\u201364. Springer, Heidelberg (2004)"},{"key":"8_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/11780656_3","volume-title":"Information Security and Privacy","author":"J. Cho","year":"2006","unstructured":"Cho, J., Pieprzyk, J.: Distinguishing attack on SOBER-128 with linear masking. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, vol.\u00a04058, pp. 29\u201339. Springer, Heidelberg (2006)"},{"key":"8_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1007\/3-540-45708-9_33","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"D. Coppersmith","year":"2002","unstructured":"Coppersmith, D., Halevi, S., Jutla, C.: Cryptanalysis of stream ciphers with linear masking. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.\u00a02442, pp. 515\u2013532. Springer, Heidelberg (2002)"},{"key":"8_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-36492-7_5","volume-title":"Selected Areas in Cryptography","author":"P. Ekdahl","year":"2003","unstructured":"Ekdahl, P., Johansson, T.: A new version of the stream cipher SNOW. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol.\u00a02595, pp. 47\u201361. Springer, Heidelberg (2003)"},{"key":"8_CR9","unstructured":"Hawkes, P., Rose, G.: Primitive specification for SOBER-128, Cryptology ePrint Archive, Report 2003\/081 (2003), \n                    \n                      http:\/\/eprint.iacr.org\/"},{"key":"8_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"524","DOI":"10.1007\/978-3-540-89255-7_32","volume-title":"Advances in Cryptology - ASIACRYPT 2008","author":"J. Lee","year":"2008","unstructured":"Lee, J., Lee, D., Park, S.: Cryptanalysis of SOSEMANUK and SNOW 2.0 using linear masks. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol.\u00a05350, pp. 524\u2013538. Springer, Heidelberg (2008)"},{"key":"8_CR11","unstructured":"NIST, Nist announces encryption standard finalists (1999), \n                    \n                      http:\/\/csrc.nist.gov\/archive\/aes\/round2\/r2report.pdf"},{"key":"8_CR12","unstructured":"ECRYPT NoE, eSTREAM - the ECRYPT stream cipher project (2005), \n                    \n                      http:\/\/www.ecrypt.eu.org\/stream\/"},{"key":"8_CR13","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1016\/S0166-218X(00)00351-6","volume":"111","author":"K. Nyberg","year":"2001","unstructured":"Nyberg, K.: Correlation theorems in cryptanalysis. Discrete Applied Mathematics\u00a0111, 177\u2013188 (2001)","journal-title":"Discrete Applied Mathematics"},{"key":"8_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/11799313_10","volume-title":"Fast Software Encryption","author":"K. Nyberg","year":"2006","unstructured":"Nyberg, K., Wallen, J.: Improved linear distinguishers for SNOW 2.0. In: Robshaw, M.J.B. (ed.) FSE 2006. LNCS, vol.\u00a04047, pp. 144\u2013162. Springer, Heidelberg (2006)"},{"key":"8_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1007\/978-3-540-39887-5_20","volume-title":"Fast Software Encryption","author":"J. Wall\u00e9n","year":"2003","unstructured":"Wall\u00e9n, J.: Linear approximations of addition modulo 2\n                    n\n                  . In: Johansson, T. (ed.) FSE 2003. LNCS, vol.\u00a02887, pp. 261\u2013273. Springer, Heidelberg (2003)"}],"container-title":["Lecture Notes in Computer Science","Information, Security and Cryptology \u2013 ICISC 2009"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14423-3_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T12:26:58Z","timestamp":1619785618000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14423-3_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642144226","9783642144233"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14423-3_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}