{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T16:15:46Z","timestamp":1775060146387,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642349300","type":"print"},{"value":"9783642349317","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34931-7_13","type":"book-chapter","created":{"date-parts":[[2012,12,5]],"date-time":"2012-12-05T17:24:04Z","timestamp":1354728244000},"page":"209-224","source":"Crossref","is-referenced-by-count":2,"title":["Cryptanalysis of Pseudo-random Generators Based on Vectorial FCSRs"],"prefix":"10.1007","author":[{"given":"Thierry P.","family":"Berger","sequence":"first","affiliation":[]},{"given":"Marine","family":"Minier","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1007\/978-3-642-17955-6_6","volume-title":"Information Security Applications","author":"B. Allailou","year":"2011","unstructured":"Allailou, B., Marjane, A., Mokrane, A.: Design of a Novel Pseudo-Random Generator Based on Vectorial FCSRs. In: Chung, Y., Yung, M. (eds.) WISA 2010. LNCS, vol.\u00a06513, pp. 76\u201391. Springer, Heidelberg (2011)"},{"issue":"12","key":"13_CR2","doi-asserted-by":"publisher","first-page":"8095","DOI":"10.1109\/TIT.2011.2164234","volume":"57","author":"F. Arnault","year":"2011","unstructured":"Arnault, F., Berger, T.P., Pousse, B., Minier, M.: Revisiting LFSRs for cryptographic applications. IEEE Transactions on Information Theory\u00a057(12), 8095\u20138113 (2011)","journal-title":"IEEE Transactions on Information Theory"},{"issue":"2","key":"13_CR3","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/s12095-010-0041-z","volume":"3","author":"F. Arnault","year":"2011","unstructured":"Arnault, F., Berger, T.P., Pousse, B.: A matrix approach for FCSR automata. Cryptography and Communications\u00a03(2), 109\u2013139 (2011)","journal-title":"Cryptography and Communications"},{"key":"13_CR4","unstructured":"Arnault, F., Berger, T.P., Lauradoux, C.: The F-FCSR primitive specification and supporting documentation. In: ECRYPT - Network of Excellence in Cryptology, Call for stream Cipher Primitives (2005), \n                    \n                      http:\/\/www.ecrypt.eu.org\/stream\/"},{"key":"13_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/11502760_6","volume-title":"Fast Software Encryption","author":"F. Arnault","year":"2005","unstructured":"Arnault, F., Berger, T.P.: F-FCSR: Design of a New Class of Stream Ciphers. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol.\u00a03557, pp. 83\u201397. Springer, Heidelberg (2005)"},{"key":"13_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1007\/978-3-540-77026-8_26","volume-title":"Progress in Cryptology \u2013 INDOCRYPT 2007","author":"F. Arnault","year":"2007","unstructured":"Arnault, F., Berger, T.P., Lauradoux, C., Minier, M.: X-FCSR \u2013 A New Software Oriented Stream Cipher Based Upon FCSRs. In: Srinathan, K., Rangan, C.P., Yung, M. (eds.) INDOCRYPT 2007. LNCS, vol.\u00a04859, pp. 341\u2013350. Springer, Heidelberg (2007)"},{"key":"13_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1007\/978-3-540-68351-3_13","volume-title":"New Stream Cipher Designs","author":"F. Arnault","year":"2008","unstructured":"Arnault, F., Berger, T., Lauradoux, C.: F-FCSR Stream Ciphers. In: Robshaw, M., Billet, O. (eds.) New Stream Cipher Designs. LNCS, vol.\u00a04986, pp. 170\u2013178. Springer, Heidelberg (2008)"},{"key":"13_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1007\/978-3-642-05445-7_27","volume-title":"Selected Areas in Cryptography","author":"F. Arnault","year":"2009","unstructured":"Arnault, F., Berger, T., Lauradoux, C., Minier, M., Pousse, B.: A New Approach for FCSRs. In: Jacobson Jr., M.J., Rijmen, V., Safavi-Naini, R. (eds.) SAC 2009. LNCS, vol.\u00a05867, pp. 433\u2013448. Springer, Heidelberg (2009)"},{"issue":"2","key":"13_CR9","doi-asserted-by":"publisher","first-page":"836","DOI":"10.1109\/TIT.2007.913244","volume":"54","author":"F. Arnault","year":"2008","unstructured":"Arnault, F., Berger, T.P., Minier, M.: Some Results on FCSR Automata With Applications to the Security of FCSR-Based Pseudorandom Generators. IEEE Transactions on Information Theory\u00a054(2), 836\u2013840 (2008)","journal-title":"IEEE Transactions on Information Theory"},{"key":"13_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/978-3-642-10628-6_8","volume-title":"Progress in Cryptology - INDOCRYPT 2009","author":"T.P. Berger","year":"2009","unstructured":"Berger, T.P., Minier, M., Pousse, B.: Software Oriented Stream Ciphers Based upon FCSRs in Diversified Mode. In: Roy, B., Sendrier, N. (eds.) INDOCRYPT 2009. LNCS, vol.\u00a05922, pp. 119\u2013135. Springer, Heidelberg (2009)"},{"key":"13_CR11","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/S0304-3975(99)00066-3","volume":"226","author":"A. Klapper","year":"1999","unstructured":"Klapper, A., Xu, J.: Algebraic Feedback Shift Registers. Theoretical Computer Science\u00a0226, 61\u201393 (1999)","journal-title":"Theoretical Computer Science"},{"issue":"11","key":"13_CR12","doi-asserted-by":"publisher","first-page":"2826","DOI":"10.1109\/TIT.2002.804048","volume":"48","author":"M. Goresky","year":"2002","unstructured":"Goresky, M., Klapper, A.: Fibonacci and Galois representations of feedback-with-carry shift registers. IEEE Transactions on Information Theory\u00a048(11), 2826\u20132836 (2002)","journal-title":"IEEE Transactions on Information Theory"},{"key":"13_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1007\/978-3-540-89255-7_34","volume-title":"Advances in Cryptology - ASIACRYPT 2008","author":"M. Hell","year":"2008","unstructured":"Hell, M., Johansson, T.: Breaking the F-FCSR-H Stream Cipher in Real Time. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol.\u00a05350, pp. 557\u2013569. Springer, Heidelberg (2008)"},{"key":"13_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1007\/3-540-58108-1_21","volume-title":"Fast Software Encryption","author":"A. Klapper","year":"1994","unstructured":"Klapper, A., Goresky, M.: 2-Adic Shift Registers. In: Anderson, R. (ed.) FSE 1993. LNCS, vol.\u00a0809, pp. 174\u2013178. Springer, Heidelberg (1994)"},{"key":"13_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1007\/978-3-642-15874-2_20","volume-title":"Sequences and Their Applications \u2013 SETA 2010","author":"A. Marjane","year":"2010","unstructured":"Marjane, A., Allailou, B.: Vectorial Conception of FCSR. In: Carlet, C., Pott, A. (eds.) SETA 2010. LNCS, vol.\u00a06338, pp. 240\u2013252. Springer, Heidelberg (2010)"},{"key":"13_CR16","unstructured":"eSTREAM, ECRYPT Stream Cipher Project, \n                    \n                      http:\/\/www.ecrypt.eu.org\/stream"},{"issue":"501","key":"13_CR17","doi-asserted-by":"publisher","first-page":"460","DOI":"10.2307\/3620776","volume":"84","author":"J.R. Silvester","year":"2000","unstructured":"Silvester, J.R.: Determinants of Blocks Matrices. The Mathematical Gazette\u00a084(501), 460\u2013467 (2000)","journal-title":"The Mathematical Gazette"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology - INDOCRYPT 2012"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34931-7_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T09:07:47Z","timestamp":1620119267000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34931-7_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642349300","9783642349317"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34931-7_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}