{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T20:50:42Z","timestamp":1772830242931,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783662439326","type":"print"},{"value":"9783662439333","type":"electronic"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-43933-3_27","type":"book-chapter","created":{"date-parts":[[2014,7,7]],"date-time":"2014-07-07T05:23:03Z","timestamp":1404710583000},"page":"518-538","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Near Collision Attack on the Grain v1 Stream Cipher"],"prefix":"10.1007","author":[{"given":"Bin","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Zhenqi","family":"Li","sequence":"additional","affiliation":[]},{"given":"Dengguo","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Dongdai","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,7,8]]},"reference":[{"key":"27_CR1","doi-asserted-by":"crossref","unstructured":"Afzal, M., Masood, A.: Algebraic cryptanalysis of A NLFSR based stream cipher. In: The 3rd International conference on Information and Communication Technologies: From Theory to Applications, ICTTA 2008, pp. 1\u20136 (2008)","DOI":"10.1109\/ICTTA.2008.4530286"},{"key":"27_CR2","unstructured":"Aumasson, J.-P., Dinur, I., Henzen, L., Meier, W., Shamir, A.: Efficient FPGA implementations of high-dimensional cube testers on the stream cipher Grain-128, In: Special Purpose Hardware for Attacking Cryptographic Systems-SHARCS\u201909 (2009)"},{"key":"27_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/11799313_2","volume-title":"Fast Software Encryption","author":"C Berbain","year":"2006","unstructured":"Berbain, C., Gilbert, H., Maximov, A.: Cryptanalysis of Grain. In: Robshaw, M. (ed.) FSE 2006. LNCS, vol. 4047, pp. 15\u201329. Springer, Heidelberg (2006)"},{"key":"27_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1007\/978-3-642-04159-4_12","volume-title":"Selected Areas in Cryptography","author":"C Berbain","year":"2009","unstructured":"Berbain, C., Gilbert, H., Joux, A.: Algebraic and correlation attacks against linearly filtered non linear feedback shift registers. In: Avanzi, R.M., Keliher, L., Sica, F. (eds.) SAC 2008. LNCS, vol. 5381, pp. 184\u2013198. Springer, Heidelberg (2009)"},{"key":"27_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44448-3_1","volume-title":"Advances in Cryptology - ASIACRYPT 2000","author":"A Biryukov","year":"2000","unstructured":"Biryukov, A., Shamir, A.: Cryptanalytic time\/memory\/data tradeoffs for stream ciphers. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, p. 1. Springer, Heidelberg (2000)"},{"key":"27_CR6","unstructured":"Bjorstad, TE.: Cryptanalysis of Grain using Time\/Memory\/Data Tradeoffs (2006). http:\/\/www.ecrypt.eu.org\/"},{"key":"27_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1007\/978-3-540-68164-9_19","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2008","author":"C De Canni\u00e8re","year":"2008","unstructured":"De Canni\u00e8re, C., K\u00fc\u00e7\u00fck, \u00d6., Preneel, B.: Analysis of Grain\u2019s initialization algorithm. In: Vaudenay, S. (ed.) AFRICACRYPT 2008. LNCS, vol. 5023, pp. 276\u2013289. Springer, Heidelberg (2008)"},{"key":"27_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/978-3-642-25385-0_18","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2011","author":"I Dinur","year":"2011","unstructured":"Dinur, I., G\u00fcneysu, T., Paar, C., Shamir, A., Zimmermann, R.: An experimentally verified attack on full Grain-128 using dedicated reconfigurable hardware. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 327\u2013343. Springer, Heidelberg (2011)"},{"key":"27_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/978-3-642-21702-9_10","volume-title":"Fast Software Encryption","author":"I Dinur","year":"2011","unstructured":"Dinur, I., Shamir, A.: Breaking Grain-128 with dynamic cube attacks. In: Joux, A. (ed.) FSE 2011. LNCS, vol. 6733, pp. 167\u2013187. Springer, Heidelberg (2011)"},{"key":"27_CR10","unstructured":"http:\/\/www.ecrypt.eu.org\/stream\/e2-grain.html"},{"key":"27_CR11","unstructured":"Magma Computational Algebra System. http:\/\/magma.maths.usyd.edu.au\/"},{"key":"27_CR12","unstructured":"Grain-v1 Software Implementation using C. http:\/\/www.ecrypt.eu.org\/stream\/e2-grain.html\/"},{"issue":"1","key":"27_CR13","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1504\/IJWMC.2007.013798","volume":"2","author":"M Hell","year":"2007","unstructured":"Hell, M., Johansson, T., Meier, W.: Grain: a stream cipher for constrained environments. Int. J. Wirel. Mob. Comput. (IJWMC) 2(1), 86\u201393 (2007)","journal-title":"Int. J. Wirel. Mob. Comput. (IJWMC)"},{"key":"27_CR14","doi-asserted-by":"crossref","unstructured":"Hell, M., Johansson, T., Maximov, A., Meier, W.: A stream cipher proposal: Grain-128. In: IEEE International Symposium on Information Theory-ISIT\u20192006, pp. 1614\u20131618 (2006)","DOI":"10.1109\/ISIT.2006.261549"},{"issue":"1","key":"27_CR15","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1504\/IJWMC.2011.044106","volume":"5","author":"M Agren","year":"2011","unstructured":"Agren, M., Hell, M., Johansson, T., Meier, W.: Grain-128a: a new version of Grain-128 with optional authentication. Int. J. Wirel. Mob. Comput. (IJWMC) 5(1), 48\u201359 (2011)","journal-title":"Int. J. Wirel. Mob. Comput. (IJWMC)"},{"key":"27_CR16","unstructured":"Khazaei, S., Hassanzadeh, M., Kiaei., M.: Distinguishing attack on Grain. ECRYPT Stream Cipher Project Report 2005\/071 (2005). http:\/\/www.ecrypt.eu.org\/stream"},{"key":"27_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1007\/978-3-540-70500-0_24","volume-title":"Information Security and Privacy","author":"Y Lee","year":"2008","unstructured":"Lee, Y., Jeong, K., Sung, J., Hong, S.H.: Related-key chosen IV attacks on Grain-v1 and Grain-128. In: Mu, Y., Susilo, W., Seberry, J. (eds.) ACISP 2008. LNCS, vol. 5107, pp. 321\u2013335. Springer, Heidelberg (2008)"},{"key":"27_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1007\/978-3-642-17401-8_16","volume-title":"Progress in Cryptology - INDOCRYPT 2010","author":"P Stankovski","year":"2010","unstructured":"Stankovski, P.: Greedy distinguishers and nonrandomness detectors. In: Gong, G., Gupta, K.C. (eds.) INDOCRYPT 2010. LNCS, vol. 6498, pp. 210\u2013226. Springer, Heidelberg (2010)"},{"key":"27_CR19","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1007\/BF02165411","volume":"13","author":"V Strassen","year":"1969","unstructured":"Strassen, V.: Gaussian elimination is not optimal. Nume. Math. 13, 354\u2013356 (1969)","journal-title":"Nume. Math."},{"key":"27_CR20","unstructured":"Zhang, H., Wang, X.: Cryptanalysis of stream cipher Grain family, Cryptology ePrint Archive, Report 2009\/109 (2009). http:\/\/eprint.iacr.org\/"}],"container-title":["Lecture Notes in Computer Science","Fast Software Encryption"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-43933-3_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,1]],"date-time":"2021-09-01T00:48:12Z","timestamp":1630457292000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-43933-3_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662439326","9783662439333"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-43933-3_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"8 July 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}