{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T19:40:31Z","timestamp":1743104431679,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642275784"},{"type":"electronic","value":"9783642275791"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-27579-1_47","type":"book-chapter","created":{"date-parts":[[2012,1,31]],"date-time":"2012-01-31T20:30:02Z","timestamp":1328041802000},"page":"365-373","source":"Crossref","is-referenced-by-count":2,"title":["Pseudorandom Generator to Strengthen Cooperation in VANETs"],"prefix":"10.1007","author":[{"given":"J.","family":"Molina-Gil","sequence":"first","affiliation":[]},{"given":"P.","family":"Caballero-Gil","sequence":"additional","affiliation":[]},{"given":"A.","family":"F\u00faster-Sabater","sequence":"additional","affiliation":[]},{"given":"C.","family":"Caballero-Gil","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"47_CR1","unstructured":"Bluetooth, Specifications of the Bluetooth system, v4.0, \n                    \n                      http:\/\/www.bluetooth.com\/"},{"key":"47_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1007\/11556985_46","volume-title":"Computer Aided Systems Theory \u2013 EUROCAST 2005","author":"P. Caballero-Gil","year":"2005","unstructured":"Caballero-Gil, P., F\u00faster-Sabater, A.: Improvement of the edit distance attack to clock-controlled LFSR-based stream ciphers. In: Moreno D\u00edaz, R., Pichler, F., Quesada Arencibia, A. (eds.) EUROCAST 2005. LNCS, vol.\u00a03643, pp. 355\u2013364. Springer, Heidelberg (2005)"},{"key":"47_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1007\/3-540-48329-2_3","volume-title":"Advances in Cryptology - CRYPTO \u201993","author":"D. Coppersmith","year":"1994","unstructured":"Coppersmith, D., Krawczyk, H., Mansour, Y.: The Shrinking Generator. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol.\u00a0773, pp. 22\u201339. Springer, Heidelberg (1994)"},{"key":"47_CR4","unstructured":"ECRYPT Stream Cipher Project, \n                    \n                      http:\/\/www.ecrypt.eu.org\/stream\/index.htm"},{"issue":"1","key":"47_CR5","first-page":"99","volume":"46","author":"P. Geffe","year":"1973","unstructured":"Geffe, P.: How to protect data with ciphers that are really hard to break. Electronics\u00a046(1), 99\u2013101 (1973)","journal-title":"Electronics"},{"issue":"4","key":"47_CR6","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1109\/49.17716","volume":"7","author":"D. Gollmann","year":"1989","unstructured":"Gollmann, D., Chambers, W.: Clock-controlled shift registers: A review. IEEE J. Selected Areas Comm.\u00a07(4), 525\u2013533 (1989)","journal-title":"IEEE J. Selected Areas Comm."},{"key":"47_CR7","volume-title":"Shift Register Sequences","author":"S.W. Golomb","year":"1982","unstructured":"Golomb, S.W.: Shift Register Sequences, revised edn. Aegean Park Press, Laguna Hills (1982)","edition":"2"},{"key":"47_CR8","doi-asserted-by":"publisher","first-page":"714","DOI":"10.1109\/TIT.2004.825256","volume":"50","author":"Y. Hu","year":"2004","unstructured":"Hu, Y., Xiao, G.: Generalized Self-Shrinking Generator. IEEE Trans. Inform. Theory\u00a050, 714\u2013719 (2004)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"47_CR9","unstructured":"Jain, U.: Online Authentication with Encryption and Anonymous Authentication in Vehicular Adhoc Networks. PhD Thesis. Indian Institute of Technology (2008)"},{"key":"47_CR10","unstructured":"Mantin, I.: Analysis of the stream cipher RC4. Master\u2019s thesis. Weizmann Institute of Science, Rehovot (2001)"},{"key":"47_CR11","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/TIT.1969.1054260","volume":"IT-15","author":"J. Massey","year":"1969","unstructured":"Massey, J.: Shift-register synthesis and BCH decoding. IEEE Transactions on Information Theory\u00a0IT-15, 122\u2013127 (1969)","journal-title":"IEEE Transactions on Information Theory"},{"key":"47_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/BFb0053436","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"W. Meier","year":"1995","unstructured":"Meier, W., Staffelbach, O.: The Self-shrinking Generator. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 205\u2013214. Springer, Heidelberg (1995)"},{"key":"47_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1007\/BFb0023298","volume-title":"Information Security and Privacy","author":"M.J. Mihaljevic","year":"1996","unstructured":"Mihaljevic, M.J.: A Faster Cryptanalysis of the Self-Shrinking Generator. In: Pieprzyk, J.P., Seberry, J. (eds.) ACISP 1996. LNCS, vol.\u00a01172, pp. 182\u20132189. Springer, Heidelberg (1996)"},{"key":"47_CR14","unstructured":"NESSIE: New european schemes for signatures, integrity, and encryption, \n                    \n                      http:\/\/www.cosic.esat.kuleuven.be\/nessie\/"},{"key":"47_CR15","unstructured":"NIST, Random Number Generation Technical Working Group, \n                    \n                      http:\/\/csrc.nist.gov\/rng\/"},{"key":"47_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-30564-4_1","volume-title":"Selected Areas in Cryptography","author":"A. Maximov","year":"2004","unstructured":"Maximov, A., Johansson, T., Babbage, S.: An improved correlation attack on A5\/1. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol.\u00a03357, pp. 1\u201318. Springer, Heidelberg (2004)"},{"key":"47_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/3-540-47719-5_4","volume-title":"Information Security and Privacy","author":"E. Zenner","year":"2001","unstructured":"Zenner, E., Krause, M., Lucks, S.: Improved cryptanalysis of the self-shrinking generator. In: Varadharajan, V., Mu, Y. (eds.) ACISP 2001. LNCS, vol.\u00a02119, pp. 21\u201335. Springer, Heidelberg (2001)"}],"container-title":["Lecture Notes in Computer Science","Computer Aided Systems Theory \u2013 EUROCAST 2011"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-27579-1_47","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,26]],"date-time":"2019-04-26T00:49:38Z","timestamp":1556239778000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-27579-1_47"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642275784","9783642275791"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-27579-1_47","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}