{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T04:54:46Z","timestamp":1725771286140},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642545245"},{"type":"electronic","value":"9783642545252"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-54525-2_19","type":"book-chapter","created":{"date-parts":[[2014,2,7]],"date-time":"2014-02-07T09:26:22Z","timestamp":1391765182000},"page":"211-222","source":"Crossref","is-referenced-by-count":0,"title":["A New Variant of Algebraic Attack"],"prefix":"10.1007","author":[{"given":"Dibyendu","family":"Roy","sequence":"first","affiliation":[]},{"given":"Pratish","family":"Datta","sequence":"additional","affiliation":[]},{"given":"Sourav","family":"Mukhopadhyay","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/978-3-540-25937-4_5","volume-title":"Fast Software Encryption","author":"F. Armknecht","year":"2004","unstructured":"Armknecht, F.: Improving fast algebraic attacks. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol.\u00a03017, pp. 65\u201382. Springer, Heidelberg (2004)"},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"Cid, C., Kiyomoto, S., Kurihara, J.: The rakaposhi stream cipher. Information and Communications Security, 32\u201346 (2009)","DOI":"10.1007\/978-3-642-11145-7_5"},{"key":"19_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/978-3-540-45146-4_11","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"N.T. Courtois","year":"2003","unstructured":"Courtois, N.T.: Fast algebraic attacks on stream ciphers with linear feedback. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 176\u2013194. Springer, Heidelberg (2003)"},{"key":"19_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1007\/3-540-45539-6_27","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"N.T. Courtois","year":"2000","unstructured":"Courtois, N.T., Klimov, A.B., Patarin, J., Shamir, A.: Efficient algorithms for solving overdefined systems of multivariate polynomial equations. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 392\u2013407. Springer, Heidelberg (2000)"},{"key":"19_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1007\/3-540-39200-9_21","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"N. Courtois","year":"2003","unstructured":"Courtois, N., Meier, W.: Algebraic attacks on stream ciphers with linear feedback. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656, pp. 345\u2013359. Springer, Heidelberg (2003)"},{"key":"19_CR6","doi-asserted-by":"crossref","unstructured":"Courtois, N., O\u2019Neil, S., Quisquater, J.J.: Practical algebraic attacks on the hitag2 stream cipher. In: Information Security, pp. 167\u2013176 (2009)","DOI":"10.1007\/978-3-642-04474-8_14"},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"Crama, Y., Hammer, P.L.: Boolean models and methods in mathematics. In: Computer Science and Engineering (2010)","DOI":"10.1017\/CBO9780511780448"},{"key":"19_CR8","doi-asserted-by":"crossref","unstructured":"Cusick, T.W., St\u0103nic\u0103, P.: Cryptographic Boolean functions and applications. Academic Press (2009)","DOI":"10.1016\/B978-0-12-374890-4.00009-4"},{"key":"19_CR9","unstructured":"Dawson, E., Clark, A., Golic, J., Millan, W., Penna, L., Simpson, L.: The lili-128 keystream generator. In: Proceedings of first NESSIE Workshop (2000)"},{"issue":"1-3","key":"19_CR10","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/S0022-4049(99)00005-5","volume":"139","author":"J.C. Faugre","year":"1999","unstructured":"Faugre, J.C.: A new efficient algorithm for computing Gr\u00f6bner bases (F4). Journal of Pure and Applied Algebra\u00a0139(1-3), 61\u201388 (1999), \n                    \n                      http:\/\/www-salsa.lip6.fr\/~jcf\/Papers\/F99a.pdf","journal-title":"Journal of Pure and Applied Algebra"},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"Faugre, J.C.: A new efficient algorithm for computing Gr\u00f6bner bases without reduction to zero (F5). In: International Symposium on Symbolic and Algebraic Computation, pp. 75\u201383 (2002), \n                    \n                      http:\/\/www-salsa.lip6.fr\/~jcf\/Papers\/F02a.pdf","DOI":"10.1145\/780506.780516"},{"key":"19_CR12","unstructured":"Segers, A.: Algebraic attacks from a gr\u00f6bner basis perspective. Master\u2019s Thesis (2004)"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Computer Networks and Distributed Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-54525-2_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T02:20:36Z","timestamp":1558837236000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-54525-2_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642545245","9783642545252"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-54525-2_19","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]}}}