{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T16:25:31Z","timestamp":1725899131276},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642385186"},{"type":"electronic","value":"9783642385193"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38519-3_19","type":"book-chapter","created":{"date-parts":[[2013,5,2]],"date-time":"2013-05-02T07:59:28Z","timestamp":1367481568000},"page":"294-310","source":"Crossref","is-referenced-by-count":0,"title":["An Improved Time-Memory-Data Trade-Off Attack against Irregularly Clocked and Filtered Keystream Generators"],"prefix":"10.1007","author":[{"given":"Lin","family":"Jiao","sequence":"first","affiliation":[]},{"given":"Mingsheng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yongqiang","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/11596219_15","volume-title":"Progress in Cryptology - INDOCRYPT 2005","author":"G. Avoine","year":"2005","unstructured":"Avoine, G., Junod, P., Oechslin, P.: Time-memory trade-offs: False alarm detection using checkpoints. In: Maitra, S., Veni Madhavan, C.E., Venkatesan, R. (eds.) INDOCRYPT 2005. LNCS, vol.\u00a03797, pp. 183\u2013196. Springer, Heidelberg (2005)"},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"Babbage, S.: Improved exhaustive search attacks on stream ciphers. In: European Convention on Security and Detection 1995, IEE Conference Publication, pp. 161\u2013166 (1995)","DOI":"10.1049\/cp:19950490"},{"key":"19_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44448-3_1","volume-title":"Advances in Cryptology - ASIACRYPT 2000","author":"A. Biryukov","year":"2000","unstructured":"Biryukov, A., Shamir, A.: Cryptanalytic time\/memory\/data tradeoffs for stream ciphers. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol.\u00a01976, pp. 1\u201313. Springer, Heidelberg (2000)"},{"key":"19_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/3-540-44706-7_13","volume-title":"Fast Software Encryption","author":"V.V. Chepyzhov","year":"2001","unstructured":"Chepyzhov, V.V., Johansson, T., Smeets, B.: A simple algorithm for fast correlation attacks on stream ciphers. In: Schneier, B. (ed.) FSE 2000. LNCS, vol.\u00a01978, pp. 181\u2013195. Springer, Heidelberg (2001)"},{"key":"19_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/978-3-540-45146-4_11","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"N.T. Courtois","year":"2003","unstructured":"Courtois, N.T.: Fast algebraic attacks on stream ciphers with linear feedback. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 176\u2013194. Springer, Heidelberg (2003)"},{"key":"19_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1007\/3-540-39200-9_21","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"N.T. Courtois","year":"2003","unstructured":"Courtois, N.T., Meier, W.: Algebraic attacks on stream ciphers with linear feedback. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656, pp. 345\u2013359. Springer, Heidelberg (2003)"},{"issue":"2","key":"19_CR7","first-page":"342","volume":"9","author":"F.E. Grubbs","year":"1967","unstructured":"Grubbs, F.E.: An introduction to probability theory and its applications. Technometrics\u00a09(2), 342 (1967)","journal-title":"Technometrics"},{"key":"19_CR8","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1109\/TIT.1980.1056220","volume":"26","author":"M. Hellman","year":"1980","unstructured":"Hellman, M.: A cryptanalytic time-memory trade-off. IEEE Transactions on Information Theory\u00a026, 401\u2013406 (1980)","journal-title":"IEEE Transactions on Information Theory"},{"key":"19_CR9","doi-asserted-by":"publisher","first-page":"2173","DOI":"10.1109\/TIT.2002.800494","volume":"48","author":"T. Johansson","year":"2002","unstructured":"Johansson, T., Jonsson, F.: Theoretical analysis of a correlation attack based on convolutional codes. IEEE Transactions on Information Theory\u00a048, 2173\u20132181 (2002)","journal-title":"IEEE Transactions on Information Theory"},{"issue":"3","key":"19_CR10","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1016\/S0020-0190(01)00208-3","volume":"81","author":"F. Jonsson","year":"2002","unstructured":"Jonsson, F., Johansson, T.: A fast correlation attack on LILI-128. Information Processing Letters\u00a081(3), 127\u2013132 (2002)","journal-title":"Information Processing Letters"},{"issue":"1","key":"19_CR11","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1587\/transfun.E92.A.11","volume":"92A","author":"K. Khoo","year":"2009","unstructured":"Khoo, K., Chew, G., Gong, G., Lee, H.K.: Time-memory-data trade-off attack on stream ciphers based on Maiorana-McFarland functions. IEICE Transactions\u00a092A(1), 11\u201321 (2009)","journal-title":"IEICE Transactions"},{"key":"19_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1007\/11767480_13","volume-title":"Applied Cryptography and Network Security","author":"K. Khoo","year":"2006","unstructured":"Khoo, K., Gong, G., Lee, H.-K.: The rainbow attack on stream ciphers based on Maiorana-McFarland functions. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, vol.\u00a03989, pp. 194\u2013209. Springer, Heidelberg (2006)"},{"key":"19_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1007\/3-540-45961-8_28","volume-title":"Advances in Cryptology - EUROCRYPT 1988","author":"W. Meier","year":"1988","unstructured":"Meier, W., Staffelbach, O.: Fast correlation attacks on stream ciphers. In: G\u00fcnther, C.G. (ed.) EUROCRYPT 1988. LNCS, vol.\u00a0330, pp. 301\u2013314. Springer, Heidelberg (1988)"},{"key":"19_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/978-3-540-25937-4_8","volume-title":"Fast Software Encryption","author":"H. Molland","year":"2004","unstructured":"Molland, H.: Improved linear consistency attack on irregular clocked keystream generators. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol.\u00a03017, pp. 109\u2013126. Springer, Heidelberg (2004)"},{"key":"19_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1007\/978-3-540-28628-8_23","volume-title":"Advances in Cryptology \u2013 CRYPTO 2004","author":"H. Molland","year":"2004","unstructured":"Molland, H., Helleseth, T.: An improved correlation attack against irregular clocked and filtered keystream generators. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol.\u00a03152, pp. 373\u2013389. Springer, Heidelberg (2004)"},{"key":"19_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"617","DOI":"10.1007\/978-3-540-45146-4_36","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"P. Oechslin","year":"2003","unstructured":"Oechslin, P.: Making a faster cryptanalytic time-memory trade-off. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 617\u2013630. Springer, Heidelberg (2003)"},{"key":"19_CR17","doi-asserted-by":"publisher","first-page":"3398","DOI":"10.1109\/TIT.2009.2021316","volume":"55","author":"E. Pasalic","year":"2009","unstructured":"Pasalic, E.: On guess and determine cryptanalysis of LFSR-based stream ciphers. IEEE Transactions on Information Theory\u00a055, 3398\u20133406 (2009)","journal-title":"IEEE Transactions on Information Theory"},{"key":"19_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/3-540-45661-9_18","volume-title":"Fast Software Encryption","author":"M.-J.O. Saarinen","year":"2002","unstructured":"Saarinen, M.-J.O.: A time-memory tradeoff attack against LILI-128. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol.\u00a02365, pp. 231\u2013236. Springer, Heidelberg (2002)"},{"key":"19_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1007\/3-540-44983-3_18","volume-title":"Selected Areas in Cryptography","author":"L.R. Simpson","year":"2001","unstructured":"Simpson, L.R., Dawson, E., Goli\u0107, J.D., Millan, W.L.: LILI keystream generator. In: Stinson, D.R., Tavares, S. (eds.) SAC 2000. LNCS, vol.\u00a02012, pp. 248\u2013261. Springer, Heidelberg (2001)"},{"key":"19_CR20","doi-asserted-by":"publisher","first-page":"4312","DOI":"10.1109\/TIT.2005.859285","volume":"51","author":"Y. Tsunoo","year":"2005","unstructured":"Tsunoo, Y., Saito, T., Shigeri, M., Kubo, H., Minematsu, K.: Shorter bit sequence is enough to break stream cipher LILI-128. IEEE Transactions on Information Theory\u00a051, 4312\u20134319 (2005)","journal-title":"IEEE Transactions on Information Theory"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38519-3_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,12]],"date-time":"2019-05-12T19:23:44Z","timestamp":1557689024000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38519-3_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642385186","9783642385193"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38519-3_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}