{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:45:18Z","timestamp":1725489918879},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642330643"},{"type":"electronic","value":"9783642330650"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33065-0_8","type":"book-chapter","created":{"date-parts":[[2012,9,3]],"date-time":"2012-09-03T21:37:18Z","timestamp":1346708238000},"page":"72-79","source":"Crossref","is-referenced-by-count":0,"title":["Determining Quality of S-Boxes Using Pseudo Random Sequences Generated from Stream Ciphers"],"prefix":"10.1007","author":[{"given":"Anh P.","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"Thuc D.","family":"Nguyen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/11780656_3","volume-title":"Information Security and Privacy","author":"J.Y. Cho","year":"2006","unstructured":"Cho, J.Y., Pieprzyk, J.: Distinguishing Attack on SOBER-128 with Linear Masking. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, vol.\u00a04058, pp. 29\u201339. Springer, Heidelberg (2006)"},{"key":"8_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1007\/3-540-45708-9_33","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"D. Coppersmith","year":"2002","unstructured":"Coppersmith, D., Halevi, S., Jutla, C.S.: Cryptanalysis of Stream Ciphers with Linear Masking. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.\u00a02442, pp. 515\u2013532. Springer, Heidelberg (2002)"},{"key":"8_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1007\/3-540-45661-9_16","volume-title":"Fast Software Encryption","author":"P. Ekdahl","year":"2002","unstructured":"Ekdahl, P., Johansson, T.: Distinguishing Attacks on SOBER-t16 and t32. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol.\u00a02365, pp. 210\u2013224. Springer, Heidelberg (2002)"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Tran, B.N., Nguyen, T.D., Tran, T.D.: A New S-Box Structure to Increase Complexity of Algebraic Expression for Block Cipher Cryptosystems. In: 2009 International Conference on Computer Technology and Development (2009)","DOI":"10.1109\/ICCTD.2009.235"},{"key":"8_CR5","unstructured":"Cui, L., Cao, Y.: A new S-box structure named Affine-Power-Affine. International Journal of Innovative Computing, Information and Control, 751\u2013759 (June 2007)"},{"key":"8_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-36492-7_5","volume-title":"Selected Areas in Cryptography","author":"P. Ekdahl","year":"2003","unstructured":"Ekdahl, P., Johansson, T.: A New Version of the Stream Cipher SNOW. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol.\u00a02595, pp. 47\u201361. Springer, Heidelberg (2003)"},{"key":"8_CR7","unstructured":"Dichtl, M.: Statistical Test Results for the NESSIE Submission SOBER-t32. NESSIE Document NES\/DOC\/SAG\/WP3\/016\/2"},{"key":"8_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1007\/3-540-45661-9_16","volume-title":"Fast Software Encryption","author":"P. Ekdahl","year":"2002","unstructured":"Ekdahl, P., Johansson, T.: Distinguishing Attacks on SOBER-t16 and t32. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol.\u00a02365, pp. 210\u2013224. Springer, Heidelberg (2002)"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Watanabe, D., et al.: A Distinguishing Attack of SNOW 2.0 with Linear Masking Method. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol.\u00a03006, pp. 222\u2013233. Springer, Heidelberg (2004)","DOI":"10.1007\/978-3-540-24654-1_16"},{"key":"8_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/11799313_10","volume-title":"Fast Software Encryption","author":"K. Nyberg","year":"2006","unstructured":"Nyberg, K., Wall\u00e9n, J.: Improved Linear Distinguishers for SNOW 2.0. In: Robshaw, M. (ed.) FSE 2006. LNCS, vol.\u00a04047, pp. 144\u2013162. Springer, Heidelberg (2006)"},{"key":"8_CR11","unstructured":"Rukhin, A., et al.: A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. NIST, Special Publication 800-22"},{"key":"8_CR12","unstructured":"Hawkes, P., Rose, G.G.: Primitive specification and supporting documentation for SOBER-t32 submission to NESSIE. In: Procedding of First Open NESSIE Workshop (2000)"},{"key":"8_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"M. Matsui","year":"1994","unstructured":"Matsui, M.: Linear Cryptanalysis Method for DES Cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 386\u2013397. Springer, Heidelberg (1994)"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33065-0_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T11:54:07Z","timestamp":1620129247000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33065-0_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642330643","9783642330650"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33065-0_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}