{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T03:48:16Z","timestamp":1767066496485},"publisher-location":"Berlin, Heidelberg","reference-count":40,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642379482"},{"type":"electronic","value":"9783642379499"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-37949-9_54","type":"book-chapter","created":{"date-parts":[[2013,7,4]],"date-time":"2013-07-04T07:42:10Z","timestamp":1372923730000},"page":"617-632","source":"Crossref","is-referenced-by-count":42,"title":["WG-8: A Lightweight Stream Cipher for Resource-Constrained Smart Devices"],"prefix":"10.1007","author":[{"given":"Xinxin","family":"Fan","sequence":"first","affiliation":[]},{"given":"Kalikinkar","family":"Mandal","sequence":"additional","affiliation":[]},{"given":"Guang","family":"Gong","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"54_CR1","unstructured":"Atmel Corporation, ATmega128(L): 8-bit Atmel Microcontroller with 128 KBytes In-System Programmable Flash (2011), \n                    \n                      http:\/\/www.atmel.com\/Images\/doc2467.pdf"},{"key":"54_CR2","unstructured":"Atmel Corporation, Atmel Studio 6 \u2013 The Integrated Development Environment (2012), \n                    \n                      http:\/\/www.atmel.com\/microsite\/atmel_studio6\/"},{"key":"54_CR3","unstructured":"Babbage, S., Dodd, M.: The Stream Cipher MICKEY 2.0, ECRYPT Stream Cipher (2006), \n                    \n                      http:\/\/www.ecrypt.eu.org\/stream\/p3ciphers\/mickey\/mickey_p3.pdf"},{"key":"54_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44448-3_1","volume-title":"Advances in Cryptology - ASIACRYPT 2000","author":"A. Biryukov","year":"2000","unstructured":"Biryukov, A., Shamir, A.: Cryptanalytic Time\/Memory\/Data Tradeoffs for Stream Ciphers. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol.\u00a01976, pp. 1\u201313. Springer, Heidelberg (2000)"},{"key":"54_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1007\/978-3-540-74735-2_31","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"A. Bogdanov","year":"2007","unstructured":"Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M., Seurin, Y., Vikkelsoe, C.: PRESENT: An ultra-lightweight block cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol.\u00a04727, pp. 450\u2013466. Springer, Heidelberg (2007)"},{"key":"54_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1007\/978-3-642-04138-9_20","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2009","author":"C. Canni\u00e8re De","year":"2009","unstructured":"De Canni\u00e8re, C., Dunkelman, O., Kne\u017eevi\u0107, M.: KATAN and KTANTAN \u2014 A Family of Small and Efficient Hardware-Oriented Block Ciphers. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol.\u00a05747, pp. 272\u2013288. Springer, Heidelberg (2009)"},{"key":"54_CR7","doi-asserted-by":"crossref","unstructured":"De Canni\u00e8re, C., Preneel, B.: Trivium \u2013 A Stream Cipher Construction Inspired by Block Cipher Design Principles. ECRYPT Stream Cipher (2005), \n                    \n                      http:\/\/www.ecrypt.eu.org\/stream\/papersdir\/2006\/021.pdf","DOI":"10.1007\/11836810_13"},{"key":"54_CR8","doi-asserted-by":"crossref","DOI":"10.1201\/b12078","volume-title":"Communication System Security","author":"L. Chen","year":"2012","unstructured":"Chen, L., Gong, G.: Communication System Security. Chapman & Hall\/CRC, Boca Raton (2012)"},{"key":"54_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/3-540-44706-7_13","volume-title":"Fast Software Encryption","author":"V.V. Chepyzhov","year":"2001","unstructured":"Chepyzhov, V.V., Johansson, T., Smeets, B.: A Simple Algorithm for Fast Correlation Attacks on Stream Ciphers. In: Schneier, B. (ed.) FSE 2000. LNCS, vol.\u00a01978, pp. 181\u2013195. Springer, Heidelberg (2001)"},{"key":"54_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/978-3-540-45146-4_11","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"N.T. Courtois","year":"2003","unstructured":"Courtois, N.T.: Fast Algebraic Attacks on Stream Ciphers with Linear Feedback. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 176\u2013194. Springer, Heidelberg (2003)"},{"key":"54_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1007\/3-540-39200-9_21","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"N. Courtois","year":"2003","unstructured":"Courtois, N., Meier, W.: Algebraic Attacks on Stream Ciphers with Linear Feedback. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656, pp. 345\u2013359. Springer, Heidelberg (2003)"},{"key":"54_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1007\/978-3-642-01001-9_16","volume-title":"Advances in Cryptology - EUROCRYPT 2009","author":"I. Dinur","year":"2009","unstructured":"Dinur, I., Shamir, A.: Cube Attacks on Tweakable Black Box Polynomials. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol.\u00a05479, pp. 278\u2013299. Springer, Heidelberg (2009)"},{"key":"54_CR13","doi-asserted-by":"crossref","unstructured":"Driessen, B., Hund, R., Willems, C., Paar, C., Holz, T.: Don\u2019t Trust Satellite Phones: A Security Analysis of Two Satphone Standards. In: The 33th IEEE Symposium on Security and Privacy - S&P 2012, pp. 128\u2013142 (2012)","DOI":"10.1109\/SP.2012.18"},{"issue":"6","key":"54_CR14","doi-asserted-by":"publisher","first-page":"522","DOI":"10.1109\/MDT.2007.178","volume":"24","author":"T. Eisenbarth","year":"2007","unstructured":"Eisenbarth, T., Kumar, S., Paar, C., Poschmann, A., Uhsadel, L.: A Survey of Lightweight-Cryptography Implementations. IEEE Design & Test of Computers\u00a024(6), 522\u2013533 (2007)","journal-title":"IEEE Design & Test of Computers"},{"key":"54_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-642-14992-4_2","volume-title":"Financial Cryptography and Data Security","author":"D. Engels","year":"2010","unstructured":"Engels, D., Fan, X., Gong, G., Hu, H., Smith, E.M.: Hummingbird: Ultra-Lightweight Cryptography for Resource- Constrained Devices. In: Sion, R., Curtmola, R., Dietrich, S., Kiayias, A., Miret, J.M., Sako, K., Seb\u00e9, F. (eds.) RLCPS, WECSR, and WLC 2010. LNCS, vol.\u00a06054, pp. 3\u201318. Springer, Heidelberg (2010)"},{"key":"54_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-642-25286-0_2","volume-title":"RFID. Security and Privacy","author":"D. Engels","year":"2012","unstructured":"Engels, D., Saarinen, M.-J.O., Schweitzer, P., Smith, E.M.: The Hummingbird-2 Lightweight Authenticated Encryption Algorithm. In: Juels, A., Paar, C. (eds.) RFIDSec 2011. LNCS, vol.\u00a07055, pp. 19\u201331. Springer, Heidelberg (2012)"},{"issue":"1","key":"54_CR17","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1049\/ip-ifs:20055006","volume":"15","author":"M. Feldhofer","year":"2005","unstructured":"Feldhofer, M., Wolkerstorfer, J., Rijmen, V.: AES Implementation on a Grain of Sand. IEE Proceedings Information Security\u00a015(1), 13\u201320 (2005)","journal-title":"IEE Proceedings Information Security"},{"key":"54_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-25286-0_1","volume-title":"RFID. Security and Privacy","author":"Z. Gong","year":"2012","unstructured":"Gong, Z., Nikova, S., Law, Y.: KLEIN: A New Family of Lightweight Block Ciphers. In: Juels, A., Paar, C. (eds.) RFIDSec 2011. LNCS, vol.\u00a07055, pp. 1\u201318. Springer, Heidelberg (2012)"},{"issue":"8","key":"54_CR19","doi-asserted-by":"publisher","first-page":"5555","DOI":"10.1109\/TIT.2011.2158480","volume":"57","author":"G. Gong","year":"2011","unstructured":"Gong, G., R\u00f8njom, S., Helleseth, T., Hu, H.: Fast Discrete Fourier Spectra Attacks on Stream Ciphers. IEEE Transactions on Information Theory\u00a057(8), 5555\u20135565 (2011)","journal-title":"IEEE Transactions on Information Theory"},{"key":"54_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1007\/978-3-642-23951-9_22","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2011","author":"J. Guo","year":"2011","unstructured":"Guo, J., Peyrin, T., Poschmann, A., Robshaw, M.: The LED Block Cipher. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol.\u00a06917, pp. 326\u2013341. Springer, Heidelberg (2011)"},{"issue":"1","key":"54_CR21","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1504\/IJWMC.2007.013798","volume":"2","author":"M. Hell","year":"2007","unstructured":"Hell, M., Johansson, T., Meier, W.: Grain: A Stream Cipher for Constrained Environments. International Journal of Wireless and Mobile Computing\u00a02(1), 86\u201393 (2007)","journal-title":"International Journal of Wireless and Mobile Computing"},{"key":"54_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1007\/978-3-540-89754-5_28","volume-title":"Progress in Cryptology - INDOCRYPT 2008","author":"J.-P. Kaps","year":"2008","unstructured":"Kaps, J.-P.: Chai-tea, Cryptographic Hardware Implementations of xTEA. In: Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. LNCS, vol.\u00a05365, pp. 363\u2013375. Springer, Heidelberg (2008)"},{"key":"54_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-642-15031-9_2","volume-title":"Cryptographic Hardware and Embedded Systems, CHES 2010","author":"L. Knudsen","year":"2010","unstructured":"Knudsen, L., Leander, G., Poschmann, A., Robshaw, M.J.B.: PRINTcipher: A Block Cipher for IC-Printing. In: Mangard, S., Standaert, F.-X. (eds.) CHES 2010. LNCS, vol.\u00a06225, pp. 16\u201332. Springer, Heidelberg (2010)"},{"key":"54_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1007\/978-3-540-74619-5_13","volume-title":"Fast Software Encryption","author":"G. Leander","year":"2007","unstructured":"Leander, G., Paar, C., Poschmann, A., Schramm, K.: New Lightweight DES Variants. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol.\u00a04593, pp. 196\u2013210. Springer, Heidelberg (2007)"},{"key":"54_CR25","unstructured":"Liu, D., Yang, Y., Wang, J., Min, H.: A Mutual Authentication Protocol for RFID Using IDEA, Auto-ID Labs White Paper, WP-HARDWARE-048 (March 2009), \n                    \n                      http:\/\/www.autoidlabs.org\/uploads\/media\/AUTOIDLABS-WP-HARDWARE-048.pdf"},{"key":"54_CR26","unstructured":"Luo, Y., Chai, Q., Gong, G., Lai, X.: WG-7: A Lightweight Stream Cipher with Good Cryptographic Properties. In: IEEE Global Communications Conference \u2013 GLOBECOM 2010, pp. 1\u20136 (2010)"},{"issue":"3","key":"54_CR27","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/BF02252874","volume":"1","author":"W. Meier","year":"1989","unstructured":"Meier, W., Staffelbach, O.: Fast Correlation Attacks on Certain Stream Ciphers. Journal of Cryptology\u00a01(3), 159\u2013176 (1989)","journal-title":"Journal of Cryptology"},{"key":"54_CR28","doi-asserted-by":"crossref","unstructured":"Meiser, G., Eisenbarth, T., Lemke-Rust, K., Paar, C.: Efficient Implementation of eSTREAM Ciphers on 8-bit AVR Microcontrollers. In: International Symposium on Industrial Embedded Systems \u2013 SIES 2008, pp. 58\u201366 (2008)","DOI":"10.1109\/SIES.2008.4577681"},{"issue":"7","key":"54_CR29","doi-asserted-by":"publisher","first-page":"1903","DOI":"10.1016\/j.ins.2007.12.002","volume":"178","author":"Y. Nawaz","year":"2008","unstructured":"Nawaz, Y., Gong, G.: WG: A Family of Stream Ciphers with Designed Randomness Properties. Information Science\u00a0178(7), 1903\u20131916 (2008)","journal-title":"Information Science"},{"issue":"3-4","key":"54_CR30","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/s12095-012-0070-x","volume":"4","author":"M.A. Orumiehchiha","year":"2012","unstructured":"Orumiehchiha, M.A., Pieprzyk, J., Steinfeld, R.: Cryptanalysis of WG-7: A Lightweight Stream Cipher. Cryptography and Communications\u00a04(3-4), 277\u2013285 (2012)","journal-title":"Cryptography and Communications"},{"key":"54_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/978-3-642-13858-4_5","volume-title":"Fast Software Encryption","author":"D.A. Osvik","year":"2010","unstructured":"Osvik, D.A., Bos, J.W., Stefan, D., Canright, D.: Fast Software AES Encryption. In: Hong, S., Iwata, T. (eds.) FSE 2010. LNCS, vol.\u00a06147, pp. 75\u201393. Springer, Heidelberg (2010)"},{"key":"54_CR32","unstructured":"Otte, D.: AVR-Crypto-Lib (2012), \n                    \n                      http:\/\/www.das-labor.org\/wiki\/AVR-Crypto-Lib\/en"},{"key":"54_CR33","unstructured":"Poschmann, A.: Lightweight Cryptography \u2013 Cryptographic Engineering for a Pervasive World, Ph.D. Thesis, Department of Electrical Engineering and Information Science, Ruhr-Universit\u00e4et Bochum, Bochum, Germany (2009)"},{"issue":"5","key":"54_CR34","doi-asserted-by":"publisher","first-page":"1752","DOI":"10.1109\/TIT.2007.894690","volume":"53","author":"S. R\u00f8njom","year":"2007","unstructured":"R\u00f8njom, S., Helleseth, T.: A New Attack on the Filtering Generator. IEEE Transactions on Information Theory\u00a053(5), 1752\u20131758 (2007)","journal-title":"IEEE Transactions on Information Theory"},{"key":"54_CR35","unstructured":"Rowley Associates, CrossWorks for MSP430 (2012), \n                    \n                      http:\/\/www.rowley.co.uk\/msp430\/"},{"key":"54_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1007\/978-3-642-23951-9_23","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2011","author":"K. Shibutani","year":"2011","unstructured":"Shibutani, K., Isobe, T., Hiwatari, H., Mitsuda, A., Akishita, T., Shirai, T.: Piccolo: An Ultra-Lightweight Blockcipher. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol.\u00a06917, pp. 342\u2013357. Springer, Heidelberg (2011)"},{"issue":"1","key":"54_CR37","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1109\/TC.1985.1676518","volume":"34","author":"T. Siegenthaler","year":"1985","unstructured":"Siegenthaler, T.: Decrypting a Class of Stream Ciphers Using Ciphertext Only. IEEE Transactions on Computers\u00a034(1), 81\u201385 (1985)","journal-title":"IEEE Transactions on Computers"},{"key":"54_CR38","unstructured":"Texas Instuments Inc., MSP430F15x, MSP430F16x, MSP430F161x Mixed Signal Microcontroller (2011), \n                    \n                      http:\/\/www.ti.com\/lit\/ds\/symlink\/msp430f1611.pdf"},{"key":"54_CR39","unstructured":"Verdult, R., Garcia, F.D., Balasch, J.: Gone in 360 Seconds: Hijacking with Hitag2. In: The 21st USENIX Security Symposium - USENIX Security 2012, pp. 237\u2013252. USENIX Association (2012)"},{"key":"54_CR40","unstructured":"Wu, H., Preneel, B.: Chosen IV Attack on Stream Cipher WG, ECRYPT Stream Cipher Project Report, 2005\/045, \n                    \n                      http:\/\/cr.yp.to\/streamciphers\/wg\/045.pdf"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Quality, Reliability, Security and Robustness in Heterogeneous Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-37949-9_54","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,15]],"date-time":"2019-05-15T06:43:35Z","timestamp":1557902615000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-37949-9_54"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642379482","9783642379499"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-37949-9_54","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2013]]}}}