{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T16:22:22Z","timestamp":1759335742967},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642255120"},{"type":"electronic","value":"9783642255137"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-25513-7_5","type":"book-chapter","created":{"date-parts":[[2011,12,5]],"date-time":"2011-12-05T05:48:54Z","timestamp":1323064134000},"page":"40-53","source":"Crossref","is-referenced-by-count":5,"title":["The Initialization Stage Analysis of ZUC v1.5"],"prefix":"10.1007","author":[{"given":"Chunfang","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Xiutao","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Dongdai","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","unstructured":"ETSI\/SAGE: Specification of the 3GPP Confidentiality and Integrity Algorithms 128-EEA3 & 128-EIA3, Document 2: ZUC Specification, Version 1.5 (January 4, 2011), \n                    \n                      http:\/\/gsmworld.com\/documents\/EEA3_EIA3_ZUC_v1_5.pdf"},{"key":"5_CR2","unstructured":"ETSI\/SAGE: Specification of the 3GPP Confidentiality and Integrity Algorithms 128-EEA3 & 128-EIA3, Document 1: 128-EEA3 and 128-EIA3 Specification, Version 1.5 (January 4, 2011), \n                    \n                      http:\/\/gsmworld.com\/documents\/EEA3_EIA3_specification_v1_5.pdf"},{"key":"5_CR3","unstructured":"ETSI\/SAGE: Specification of the 3GPP Confidentiality and Integrity Algorithms 128-EEA3 & 128-EIA3, Document 4: Design and Evaluation Report, Version 1.3 (January 18, 2011), \n                    \n                      http:\/\/gsmworld.com\/documents\/EEA3_EIA3_Design_Evaluation_v1_3.pdf"},{"key":"5_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1007\/978-3-540-77026-8_20","volume-title":"Progress in Cryptology \u2013 INDOCRYPT 2007","author":"H. Englund","year":"2007","unstructured":"Englund, H., Johansson, T., S\u00f6nmez Turan, M.: A Framework for Chosen IV Statistical Analysis of Stream Ciphers. In: Srinathan, K., Rangan, C.P., Yung, M. (eds.) INDOCRYPT 2007. LNCS, vol.\u00a04859, pp. 268\u2013281. Springer, Heidelberg (2007)"},{"key":"5_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1007\/978-3-540-68164-9_16","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2008","author":"S. Fischer","year":"2008","unstructured":"Fischer, S., Khazaei, S., Meier, W.: Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers. In: Vaudenay, S. (ed.) AFRICACRYPT 2008. LNCS, vol.\u00a05023, pp. 236\u2013245. Springer, Heidelberg (2008)"},{"key":"5_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1007\/3-540-38424-3_1","volume-title":"Advances in Cryptology - CRYPTO \u201990","author":"E. Biham","year":"1991","unstructured":"Biham, E., Shamir, A.: Differential Cryptanalysis of DES-like Cryptosystems. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol.\u00a0537, pp. 2\u201321. Springer, Heidelberg (1991)"},{"key":"5_CR7","unstructured":"Li, J.: Improved Differential Paths on ZUC. Appear in the First International Workshop on ZUC Algorithm (December 2010)"},{"key":"5_CR8","unstructured":"Li, J.: Differential analysis of ZUC. Appear in the Second International Workshop on ZUC Algorithm and Related Topics (June 2011)"},{"key":"5_CR9","unstructured":"Sun, B., Tang, X., Li, C.: Preliminary Cryptanalysis Results of ZUC. Appear in the First International Workshop on ZUC Algorithm (December 2010)"},{"key":"5_CR10","unstructured":"Wu, H.: Cryptanalysis of the Stream Cipher ZUC in the 3GPP Confidentiality & Integrity Algorithms 128-EEA3 & 128-EIA3. Appear at the sump session in ASIACRYPT (2010)"},{"key":"5_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/978-3-642-19574-7_3","volume-title":"Selected Areas in Cryptography","author":"N. Mouha","year":"2011","unstructured":"Mouha, N., Velichkov, V., De Canni\u00e8re, C., Preneel, B.: The Differential Analysis of S-Functions. In: Biryukov, A., Gong, G., Stinson, D.R. (eds.) SAC 2010. LNCS, vol.\u00a06544, pp. 36\u201356. Springer, Heidelberg (2011)"},{"key":"5_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1007\/978-3-642-21702-9_20","volume-title":"Fast Software Encryption","author":"V. Velichkov","year":"2011","unstructured":"Velichkov, V., Mouha, N., De Canni\u00e8re, C., Preneel, B.: The Additive Differential Probability of ARX. In: Joux, A. (ed.) FSE 2011. LNCS, vol.\u00a06733, pp. 342\u2013358. Springer, Heidelberg (2011)"}],"container-title":["Lecture Notes in Computer Science","Cryptology and Network Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-25513-7_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,20]],"date-time":"2019-04-20T08:17:02Z","timestamp":1555748222000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-25513-7_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642255120","9783642255137"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-25513-7_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}