{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T10:04:26Z","timestamp":1768730666174,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642219689","type":"print"},{"value":"9783642219696","type":"electronic"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-21969-6_5","type":"book-chapter","created":{"date-parts":[[2011,6,28]],"date-time":"2011-06-28T15:41:28Z","timestamp":1309275688000},"page":"77-91","source":"Crossref","is-referenced-by-count":12,"title":["Attacking Bivium and Trivium with the Characteristic Set Method"],"prefix":"10.1007","author":[{"given":"Zhenyu","family":"Huang","sequence":"first","affiliation":[]},{"given":"Dongdai","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"5_CR1","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/s11424-008-9103-0","volume":"21","author":"F. Chai","year":"2008","unstructured":"Chai, F., Gao, X.S., Yuan, C.: A Characteristic Set Method for Solving Boolean Equations and Applications in Cryptanalysis of Stream Ciphers. Journal of Systems Science and Complexity\u00a021(2), 191\u2013208 (2008)","journal-title":"Journal of Systems Science and Complexity"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"De Canni\u00e8re, C., Preneel, B.: TRIVIUM - a stream cipher construction inspired by block cipher design principles. eSTREAM, ECRYPT Stream Cipher Project, Report 2005\/030 (2005)","DOI":"10.1007\/11836810_13"},{"key":"5_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1007\/978-3-642-01001-9_16","volume-title":"Advances in Cryptology - EUROCRYPT 2009","author":"I. Dinur","year":"2009","unstructured":"Dinur, I., Shamir, A.: Cube attacks on tweakable black box polynomials. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol.\u00a05479, pp. 278\u2013299. Springer, Heidelberg (2009)"},{"key":"5_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-540-79719-7_7","volume-title":"Theory and Applications of Satisfiability Testing \u2013 SAT 2008","author":"T. Eibach","year":"2008","unstructured":"Eibach, T., Pilz, E., V\u00f6lkel, G.: Attacking Bivium using SAT solvers. In: Kleine B\u00fcning, H., Zhao, X. (eds.) SAT 2008. LNCS, vol.\u00a04996, pp. 63\u201376. Springer, Heidelberg (2008)"},{"issue":"2","key":"5_CR5","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/s11786-009-0016-7","volume":"3","author":"T. Eibach","year":"2010","unstructured":"Eibach, T., V\u00f6lkel, G.: Optimising Gr\u00f6bner Bases on Bivium. Mathematics in Computer Science\u00a03(2), 159\u2013172 (2010)","journal-title":"Mathematics in Computer Science"},{"key":"5_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1007\/978-3-540-68164-9_16","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2008","author":"S. Fischer","year":"2008","unstructured":"Fischer, S., Khazaei, S., Meier, W.: Chosen IV statistical analysis for key recovery attacks on stream ciphers. In: Vaudenay, S. (ed.) AFRICACRYPT 2008. LNCS, vol.\u00a05023, pp. 236\u2013245. Springer, Heidelberg (2008)"},{"key":"5_CR7","unstructured":"Gao, X.S., Huang, Z.: Efficient Characteristic Set Algorithms for Equation Solving in Finite Fields and Application in Analysis of Stream Ciphers. Cryptology ePrint Archive, 2009\/637; Accepted by Journal of Symbolic Computation"},{"key":"5_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/978-3-540-77360-3_3","volume-title":"Selected Areas in Cryptography","author":"A. Maximov","year":"2007","unstructured":"Maximov, A., Biryukov, A.: Two Trivial Attacks on Trivium. In: Adams, C., Miri, A., Wiener, M. (eds.) SAC 2007. LNCS, vol.\u00a04876, pp. 36\u201355. Springer, Heidelberg (2007)"},{"key":"5_CR9","unstructured":"McDonald, C., Charnes, C., Pieprzyk, J.: Attacking Bivium with MiniSat. Cryptology ePrint Archive, Report 2007\/040 (2007)"},{"key":"5_CR10","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1145\/157485.164890","volume-title":"Proc. ACM\/IEEE Design Automation","author":"S. Minto","year":"1993","unstructured":"Minto, S.: Zero-Sppressed BDDs for Set Manipulation in Combinatorial Problems. In: Proc. ACM\/IEEE Design Automation, pp. 272\u2013277. ACM Press, New York (1993)"},{"key":"5_CR11","unstructured":"Raddum, H.: Cryptanalytic results on TRIVIUM. eSTREAM, ECRYPT Stream Cipher Project, Report 2006\/039 (2006)"},{"key":"5_CR12","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/BF02328447","volume":"2","author":"W.T. Wu","year":"1986","unstructured":"Wu, W.T.: Basic Principles of Mechanical Theorem-proving in Elementary Geometries. Journal Automated Reasoning\u00a02, 221\u2013252 (1986)","journal-title":"Journal Automated Reasoning"},{"key":"5_CR13","unstructured":"eSTREAM - The ECRYPT Stream Cipher Project, http:\/\/www.ecrypt.eu.org\/stream\/"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 AFRICACRYPT 2011"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-21969-6_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,12]],"date-time":"2019-06-12T09:32:01Z","timestamp":1560331921000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-21969-6_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642219689","9783642219696"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-21969-6_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011]]}}}