{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,29]],"date-time":"2026-03-29T15:13:07Z","timestamp":1774797187857,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642385186","type":"print"},{"value":"9783642385193","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38519-3_17","type":"book-chapter","created":{"date-parts":[[2013,5,2]],"date-time":"2013-05-02T07:59:28Z","timestamp":1367481568000},"page":"263-275","source":"Crossref","is-referenced-by-count":3,"title":["Fast Evaluation of T-Functions via Time-Memory Trade-Offs"],"prefix":"10.1007","author":[{"given":"Tao","family":"Shi","sequence":"first","affiliation":[]},{"given":"Vladimir","family":"Anashin","sequence":"additional","affiliation":[]},{"given":"Dongdai","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","series-title":"NATO Sci. Peace Secur. Ser. D Inf. Commun. Secur.","first-page":"33","volume-title":"Proc. Advanced Study Institute Boolean Functions in Cryptology and Information Security","author":"V. Anashin","year":"2008","unstructured":"Anashin, V.: Non-Archimedean theory of T-functions. In: Proc. Advanced Study Institute Boolean Functions in Cryptology and Information Security. NATO Sci. Peace Secur. Ser. D Inf. Commun. Secur., vol.\u00a018, pp. 33\u201357. IOS Press, Amsterdam (2008)"},{"issue":"4","key":"17_CR2","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1093\/comjnl\/bxm101","volume":"53","author":"V. Anashin","year":"2010","unstructured":"Anashin, V.: Non-Archimedean ergodic theory and pseudorandom generators. The Computer Journal\u00a053(4), 370\u2013392 (2010), doi:10.1093\/comjnl\/bxm101","journal-title":"The Computer Journal"},{"key":"17_CR3","series-title":"de Gruyter Expositions in Mathematics","doi-asserted-by":"publisher","DOI":"10.1515\/9783110203011","volume-title":"Applied Algebraic Dynamics","author":"V. Anashin","year":"2009","unstructured":"Anashin, V., Khrennikov, A.: Applied Algebraic Dynamics. de Gruyter Expositions in Mathematics, vol.\u00a049. Walter de Gruyter GmbH & Co., Berlin (2009)"},{"issue":"2","key":"17_CR4","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/BF02113290","volume":"55","author":"V.S. Anashin","year":"1994","unstructured":"Anashin, V.S.: Uniformly distributed sequences of p-adic integers. Mathematical Notes\u00a055(2), 109\u2013133 (1994)","journal-title":"Mathematical Notes"},{"issue":"4","key":"17_CR5","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.1007\/BF02355442","volume":"89","author":"V.S. Anashin","year":"1998","unstructured":"Anashin, V.S.: Uniformly distributed sequences in computer algebra, or how to constuct program generators of random numbers. J. Math. Sci.\u00a089(4), 1355\u20131390 (1998)","journal-title":"J. Math. Sci."},{"issue":"6","key":"17_CR6","first-page":"527","volume":"12","author":"V.S. Anashin","year":"2002","unstructured":"Anashin, V.S.: Uniformly distributed sequences of p-adic integers, II. Discrete Math. Appl.\u00a012(6), 527\u2013590 (2002)","journal-title":"Discrete Math. Appl."},{"issue":"3","key":"17_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1134\/S1064562411030100","volume":"83","author":"V.S. Anashin","year":"2011","unstructured":"Anashin, V.S., Khrennikov, A.Y., Yurova, E.I.: Characterization of ergodicity of p-adic dynamical systems. Doklady Mathematics\u00a083(3), 1\u20133 (2011)","journal-title":"Doklady Mathematics"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Anashin, V.S., Khrennikov, A.Y., Yurova, E.I.: T-functions revisited: New criteria for bijectivity\/transitivity. Designs, Codes and Cryptography (2012), doi:10.1007\/s10623-012-9741-z","DOI":"10.1007\/s10623-012-9741-z"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Anashin, V.: Uniformly distributed sequences over p-adic integers. In: Shparlinsky, I., van der Poorten, A.J., Zimmer, H.G. (eds.) Proceedings of the Int\u2019l Conference on Number Theoretic and Algebraic Methods in Computer Science, Moscow, June-July, 1993, pp. 1\u201318. World Scientific (1995)","DOI":"10.1142\/9789814532532"},{"key":"17_CR10","unstructured":"Anashin, V., Bogdanov, A., Kizhvatov, I.: ABC: A New Fast Flexible Stream Cipher, Version 3. Technical report, eSTREAM (2005), http:\/\/www.ecrypt.eu.org\/stream\/p2ciphers\/abc\/abc_p2.pdf"},{"key":"17_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1007\/11502760_5","volume-title":"Fast Software Encryption","author":"J. Hong","year":"2005","unstructured":"Hong, J., Lee, D.-H., Yeom, Y., Han, D.: A new class of single cycle T-functions. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol.\u00a03557, pp. 68\u201382. Springer, Heidelberg (2005)"},{"key":"17_CR12","unstructured":"Hong, J., Lee, D.H., Yeom, Y., Han, D.: T-function based stream cipher TSC-3. Technical Report 2005\/031, eSTREAM (2005), http:\/\/www.ecrypt.eu.org\/stream\/ciphers\/tsc3\/tsc3.pdf"},{"key":"17_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1007\/978-3-540-24654-1_18","volume-title":"Selected Areas in Cryptography","author":"A. Klimov","year":"2004","unstructured":"Klimov, A., Shamir, A.: Cryptographic applications of T-functions. In: Matsui, M., Zuccherato, R. (eds.) SAC 2003. LNCS, vol.\u00a03006, pp. 248\u2013261. Springer, Heidelberg (2004)"},{"key":"17_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"470","DOI":"10.1007\/3-540-36400-5_34","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"A. Klimov","year":"2003","unstructured":"Klimov, A., Shamir, A.: A new class of invertible mappings. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 470\u2013483. Springer, Heidelberg (2003)"},{"key":"17_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-25937-4_1","volume-title":"Fast Software Encryption","author":"A. Klimov","year":"2004","unstructured":"Klimov, A., Shamir, A.: New cryptographic primitives based on multiword T-functions. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol.\u00a03017, pp. 1\u201315. Springer, Heidelberg (2004)"},{"key":"17_CR16","unstructured":"Klimov, A., Shamir, A.: The TF-i family of stream ciphers. Handout distributed at: The State of the Art of Stream Ciphers - SASC (2004)"},{"key":"17_CR17","unstructured":"Klimov, A.: Applications of T-functions in Cryptography. PhD thesis, Weizmann Institute of Science (2005), http:\/\/www.wisdom.weizmann.ac.il\/~ask\/"},{"key":"17_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/11502760_2","volume-title":"Fast Software Encryption","author":"A.B. Klimov","year":"2005","unstructured":"Klimov, A.B., Shamir, A.: New applications of T-functions in block ciphers and hash functions. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol.\u00a03557, pp. 18\u201331. Springer, Heidelberg (2005)"},{"key":"17_CR19","doi-asserted-by":"crossref","unstructured":"Koblitz, N.: p-adic numbers, p-adic analysis, and zeta-functions, 2nd edn. Graduate texts in math., vol.\u00a058. Springer (1984)","DOI":"10.1007\/978-1-4612-1112-9"},{"key":"17_CR20","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1007\/s10623-007-9164-4","volume":"46","author":"N. Kolokotronis","year":"2008","unstructured":"Kolokotronis, N.: Cryptographic properties of nonlinear pseudorandom number generators. Designs, Codes and Cryptography\u00a046, 353\u2013363 (2008)","journal-title":"Designs, Codes and Cryptography"},{"key":"17_CR21","unstructured":"Kotomina, L.: Fast nonlinear congruential generators. Master\u2019s thesis, Russian State University for the Humanities, Moscow (1999) (in Russian)"},{"issue":"2","key":"17_CR22","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1515\/dma-2002-0204","volume":"12","author":"M.V. Larin","year":"2002","unstructured":"Larin, M.V.: Transitive polynomial transformations of residue class rings. Discrete Mathematics and Applications\u00a012(2), 141\u2013154 (2002)","journal-title":"Discrete Mathematics and Applications"},{"key":"17_CR23","unstructured":"Synaptic\u00a0Laboratories Limited. The VEST cryptosystem for semiconductors, http:\/\/www.vestciphers.com\/en\/index.html"},{"key":"17_CR24","unstructured":"Lin, D., Shi, T., Yang, Z.: Ergodic theory over $\\mathbb{F}_2[[{T}]]$ . Finite Fields and Appl. (2011) (in press)"},{"key":"17_CR25","unstructured":"Mahler, K.: p-adic numbers and their functions, 2nd edn. Cambridge Univ. Press (1981)"},{"key":"17_CR26","unstructured":"Maximov, A.: A new stream cipher Mir-1. Technical Report 2005\/017, eSTREAM (2005), http:\/\/www.ecrypt.eu.org\/stream"},{"key":"17_CR27","unstructured":"Moon, D., Kwon, D., Han, D., Lee, J., Ryu, G.H., Lee, D.W., Yeom, Y., Chee, S.: T-function based stream cipher TSC-4. Technical Report 2006\/024, eSTREAM (2006), http:\/\/www.ecrypt.eu.org\/stream\/papersdir\/2006\/024.pdf"},{"key":"17_CR28","unstructured":"O\u2019Neil, S., Gittins, B., Landman, H.: VEST. Technical report, eSTREAM (2006), http:\/\/www.ecrypt.eu.org\/stream\/vestp2.html"},{"key":"17_CR29","doi-asserted-by":"crossref","unstructured":"Schikhof, W.H.: Ultrametric calculus. Cambridge University Press (1984)","DOI":"10.1017\/CBO9780511623844"},{"key":"17_CR30","unstructured":"Wirt, K.-T.: ASC \u2013 A Stream Cipher with Built\u2013In MAC Functionality. Proc. World Acad. Sci. Engineering and Technology\u00a023 (2007)"},{"key":"17_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1007\/11863854_34","volume-title":"Sequences and Their Applications \u2013 SETA 2006","author":"W. Zhang","year":"2006","unstructured":"Zhang, W., Wu, C.-K.: The algebraic normal form, linear complexity and k-error linear complexity of single-cycle T-function. In: Gong, G., Helleseth, T., Song, H.-Y., Yang, K. (eds.) SETA 2006. LNCS, vol.\u00a04086, pp. 391\u2013401. Springer, Heidelberg (2006)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38519-3_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T07:58:00Z","timestamp":1745999880000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38519-3_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642385186","9783642385193"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38519-3_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013]]}}}