{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T00:27:21Z","timestamp":1725755241264},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642417160"},{"type":"electronic","value":"9783642417177"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-41717-7_26","type":"book-chapter","created":{"date-parts":[[2013,11,5]],"date-time":"2013-11-05T01:40:29Z","timestamp":1383615629000},"page":"223-237","source":"Crossref","is-referenced-by-count":0,"title":["On the Origin of Yet another Channel"],"prefix":"10.1007","author":[{"given":"Petr","family":"\u0160venda","sequence":"first","affiliation":[]},{"given":"V\u00e1clav","family":"Maty\u00e1\u0161","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"26_CR1","unstructured":"Banzhaf, W., Nordin, P., Keller, R.E., Francone, F.D.: Genetic programming: An introduction: On the automatic evolution of computer programs and its applications. Morgan Kaufmann Publishers (1997)"},{"key":"26_CR2","unstructured":"Brown, R.G.: Dieharder: A random number test suite, version 3.31.1 (2004)"},{"issue":"3","key":"26_CR3","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/BF03037657","volume":"23","author":"J.C.H. Castro","year":"2005","unstructured":"Castro, J.C.H., Vi\u00f1uela, P.I.: New results on the genetic cryptanalysis of TEA and reduced-round versions of XTEA. New Gen. Comput.\u00a023(3), 233\u2013243 (2005)","journal-title":"New Gen. Comput."},{"key":"26_CR4","unstructured":"Doganaksoy, A., Ege, B., Ko\u00e7ak, O., Sulak, F.: Statistical analysis of reduced round compression functions of SHA-3 second round candidates. Technical report, Institute of Applied Mathematics, Middle East Technical University, Turkey (2010)"},{"key":"26_CR5","unstructured":"Delman, B.: Genetic algorithms in cryptography. PhD thesis, Rochester Institute of Technology (2004)"},{"key":"26_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1007\/978-3-642-01001-9_16","volume-title":"Advances in Cryptology - EUROCRYPT 2009","author":"I. Dinur","year":"2009","unstructured":"Dinur, I., Shamir, A.: Cube attacks on tweakable black box polynomials. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol.\u00a05479, pp. 278\u2013299. Springer, Heidelberg (2009)"},{"key":"26_CR7","unstructured":"ECRYPT. Ecrypt estream competition, announced November 2004 (2004)"},{"issue":"3","key":"26_CR8","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1145\/1666420.1666444","volume":"53","author":"C. Gentry","year":"2010","unstructured":"Gentry, C.: Computing arbitrary functions of encrypted data. Commun. ACM\u00a053(3), 97\u2013105 (2010)","journal-title":"Commun. ACM"},{"issue":"4","key":"26_CR9","first-page":"325","volume":"12","author":"A. Garrett","year":"2007","unstructured":"Garrett, A., Hamilton, J., Dozier, G.: A comparison of genetic algorithm techniques for the cryptanalysis of TEA. International Journal of Intelligent Control and Systems\u00a012(4), 325\u2013330 (2007)","journal-title":"International Journal of Intelligent Control and Systems"},{"key":"26_CR10","unstructured":"Galib 2.4.7, a c++ library of genetic algorithm components (2007)"},{"key":"26_CR11","unstructured":"Godbillon, S.: Bytecodeparser - java bytecode parser and emulator (2012)"},{"issue":"7","key":"26_CR12","doi-asserted-by":"publisher","first-page":"1527","DOI":"10.1162\/neco.2006.18.7.1527","volume":"18","author":"G.E. Hinton","year":"2006","unstructured":"Hinton, G.E., Osindero, S., Teh, Y.-W.: A fast learning algorithm for deep belief nets. Neural computation\u00a018(7), 1527\u20131554 (2006)","journal-title":"Neural computation"},{"issue":"1","key":"26_CR13","doi-asserted-by":"publisher","first-page":"50","DOI":"10.4236\/jsea.2010.31006","volume":"3","author":"W. Hu","year":"2010","unstructured":"Hu, W.: Cryptanalysis of TEA using quantum-inspired genetic algorithms. Journal of Software Engineering and Applications\u00a03(1), 50\u201357 (2010)","journal-title":"Journal of Software Engineering and Applications"},{"key":"26_CR14","unstructured":"Kaminsky, A.: GPU parallel statistical and cube test analysis of the SHA-3 finalist candidate hash functions. In: 15th SIAM Conference on Parallel Processing for Scientific Computing, PP 2012 (2012)"},{"key":"26_CR15","unstructured":"Kuhn, K., Thomann, O.: Eclipse ASTParser (2006)"},{"key":"26_CR16","doi-asserted-by":"crossref","first-page":"645","DOI":"10.1109\/ICNC.2008.434","volume-title":"Proceedings of the 2008 Fourth International Conference on Natural Computation, ICNC 2008","author":"L. Liu","year":"2008","unstructured":"Liu, L., Li, M., Lin, D.: Replacement strategies in steady-state multi-objective evolutionary algorithm: A comparative case study. In: Proceedings of the 2008 Fourth International Conference on Natural Computation, ICNC 2008, pp. 645\u2013649. IEEE Computer Society, Washington, DC (2008)"},{"key":"26_CR17","unstructured":"Picek, S., Golub, M.: On evolutionary computation methods in cryptography. In: MIPRO, 2011 Proceedings of the 34th International Convention, pp. 1496\u20131501 (2011)"},{"key":"26_CR18","doi-asserted-by":"publisher","first-page":"789","DOI":"10.1002\/spe.4380250705","volume":"25","author":"T.J. Parr","year":"1994","unstructured":"Parr, T.J., Quong, R.W.: ANTLR: A predicated-ll(k) parser generator. Software Practice and Experience\u00a025, 789\u2013810 (1994)","journal-title":"Software Practice and Experience"},{"key":"26_CR19","unstructured":"Rukhin, A.: A statistical test suite for the validation of random number generators and pseudo random number generators for cryptographic applications, version STS-2.1. NIST Special Publication 800-22rev1a (2010)"},{"key":"26_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/978-3-642-15874-2_27","volume-title":"Sequences and Their Applications \u2013 SETA 2010","author":"F. Sulak","year":"2010","unstructured":"Sulak, F., Do\u011fanaksoy, A., Ege, B., Ko\u00e7ak, O.: Evaluation of randomness test results for short sequences. In: Carlet, C., Pott, A. (eds.) SETA 2010. LNCS, vol.\u00a06338, pp. 309\u2013319. Springer, Heidelberg (2010)"},{"key":"26_CR21","unstructured":"NIST SHA-3. SHA-3 competition (announced November 2, 2007)"},{"key":"26_CR22","unstructured":"Soto, J.: Randomness testing of the AES candidate algorithms. In: NIST (1999)"},{"key":"26_CR23","doi-asserted-by":"crossref","unstructured":"Sekanina, L., Salajka, V., Va\u0161\u00ed\u010dek, Z.: Two-step evolution of polymorphic circuits for image multi-filtering. In: IEEE Congress on Evolutionary Computation, pp. 1\u20138 (2012)","DOI":"10.1109\/CEC.2012.6256164"},{"key":"26_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"508","DOI":"10.1007\/978-3-540-78827-0_58","volume-title":"Large-Scale Scientific Computing","author":"R. Stevanovi\u0107","year":"2008","unstructured":"Stevanovi\u0107, R., Topi\u0107, G., Skala, K., Stip\u010devi\u0107, M., Rogina, B.M.: Quantum random bit generator service for Monte Carlo and other stochastic simulations. In: Lirkov, I., Margenov, S., Wa\u015bniewski, J. (eds.) LSSC 2007. LNCS, vol.\u00a04818, pp. 508\u2013515. Springer, Heidelberg (2008)"},{"key":"26_CR25","unstructured":"Turan, M.S., Do\u01e7anaksoy, A., \u00c7alik, \u00c7.: Detailed statistical analysis of synchronous stream ciphers. In: ECRYPT Workshop on the State of the Art of Stream Ciphers, SASC 2006 (2006)"},{"key":"26_CR26","unstructured":"Ukrop, M.: Usage of evolvable circuit for statistical testing of randomness. Bachelor thesis, Masaryk University, Czech Republic (2013)"},{"key":"26_CR27","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1007\/3-540-60590-8_29","volume-title":"Fast Software Encryption","author":"D. Wheeler","year":"1995","unstructured":"Wheeler, D., Needham, R.: TEA, a tiny encryption algorithm. In: Preneel, B. (ed.) Fast Software Encryption. LNCS, vol.\u00a01008, pp. 363\u2013366. Springer, Heidelberg (1995)"},{"key":"26_CR28","first-page":"80","volume-title":"Proceedings of the 23rd Annual Symposium on Foundations of Computer Science, SFCS 1982","author":"A.C. Yao","year":"1982","unstructured":"Yao, A.C.: Theory and application of trapdoor functions. In: Proceedings of the 23rd Annual Symposium on Foundations of Computer Science, SFCS 1982, pp. 80\u201391. IEEE Computer Society, Washington, DC (1982)"}],"container-title":["Lecture Notes in Computer Science","Security Protocols XXI"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-41717-7_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,23]],"date-time":"2019-05-23T22:47:07Z","timestamp":1558651627000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-41717-7_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642417160","9783642417177"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-41717-7_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}