{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T04:17:17Z","timestamp":1746159437365,"version":"3.40.4"},"publisher-location":"New Delhi","reference-count":16,"publisher":"Springer India","isbn-type":[{"type":"print","value":"9788132217671"},{"type":"electronic","value":"9788132217688"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-81-322-1768-8_45","type":"book-chapter","created":{"date-parts":[[2014,3,4]],"date-time":"2014-03-04T00:11:09Z","timestamp":1393891869000},"page":"509-515","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Cryptanalysis of Geffe Generator Using Genetic Algorithm"],"prefix":"10.1007","author":[{"given":"Maiya","family":"Din","sequence":"first","affiliation":[]},{"given":"Ashok K.","family":"Bhateja","sequence":"additional","affiliation":[]},{"given":"Ram","family":"Ratan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,3,4]]},"reference":[{"key":"45_CR1","unstructured":"Stallings, W.: Cryptography and Network Security. Pearson, London (2012)"},{"key":"45_CR2","unstructured":"Menzes, A., Oorschot, P.V., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)"},{"issue":"1","key":"45_CR3","first-page":"99","volume":"46","author":"PR Geffe","year":"1973","unstructured":"Geffe, P.R.: How to protect data with ciphers that are really hard to break. Electronics 46(1), 99\u2013101 (1973)","journal-title":"Electronics"},{"key":"45_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-5079-4","volume-title":"Stream Ciphers","author":"A Klein","year":"2013","unstructured":"Klein, A.: Stream Ciphers. Springer, London (2013)"},{"issue":"8A","key":"45_CR5","first-page":"161","volume":"6","author":"S. Wei","year":"2006","unstructured":"Wei, S.: On generalization of Geffe generator. Int. J. Comput. Sci. Netw. Sec. 6(8A), 161\u2013165 (2006)","journal-title":"Int. J. Comput. Sci. Netw. Sec."},{"key":"45_CR6","unstructured":"Jenner, E.: Cryptanalysis of LFSR-based pseudorandom generators\u2014a survey. http:\/\/www.erikzenner.name\/docs\/2004_survey_streamcipher.pdf (2004)"},{"issue":"2","key":"45_CR7","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/BF00190805","volume":"9","author":"JD Golic","year":"1996","unstructured":"Golic, J.D.: Correlation properties of a general combiner with memory. J. Cryptol. 9(2), 111\u2013126 (1996)","journal-title":"J. Cryptol."},{"key":"45_CR8","doi-asserted-by":"crossref","unstructured":"Penzhorn, W.T., Bruwer, C.S.: New correlation attacks on stream ciphers. In: Proceedings of IEEE AFRICON 2002, pp. 203\u2013208 (2002)","DOI":"10.1109\/AFRCON.2002.1146834"},{"key":"45_CR9","doi-asserted-by":"crossref","unstructured":"Meier, W., Staffelbach, O.: Fast correlation attacks on stream ciphers. In: Advances in Cryptology\u2014EUROCRYPT \u201888, LNCS 330, pp. 301\u2013314 (1988)","DOI":"10.1007\/3-540-45961-8_28"},{"key":"45_CR10","unstructured":"Kholosha, A.: Investigations in the design and analysis of key-stream generator. http:\/\/alexandria.tue.nl\/extra2\/200410591.pdf"},{"issue":"1","key":"45_CR11","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1080\/0161-119491882757","volume":"18","author":"E Dawson","year":"1994","unstructured":"Dawson, E., Clark, A.: Divide and conqure attack on certain classes of stream ciphers. Cryptologia 18(1), 25\u201340 (1994)","journal-title":"Cryptologia"},{"key":"45_CR12","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1090\/conm\/477\/09302","volume":"477","author":"I Luengo","year":"2009","unstructured":"Luengo, I.: Linear and non-linear sequences and applications to stream ciphers. Recent Trends Crypt.\u2014Contemp. Math. 477, 21\u201346 (2009)","journal-title":"Recent Trends Crypt.\u2014Contemp. Math."},{"key":"45_CR13","unstructured":"Davis, L.: The Handbook of Genetic Algorithms. Van Nostrand Reinhold, New Jersey (1991)"},{"key":"45_CR14","doi-asserted-by":"crossref","DOI":"10.1142\/3904","volume-title":"An Introduction to Genetic Algorithms for Scientists and Engineers","author":"DA Coley","year":"1999","unstructured":"Coley, D.A.: An Introduction to Genetic Algorithms for Scientists and Engineers. World Scientific, New Jersey (1999)"},{"key":"45_CR15","unstructured":"Haupt, R.L., Haupt, S.E.: Practical Genetic Algorithms. Wiley, New Jersey (1998)"},{"key":"45_CR16","volume-title":"Genetic Algorithms in Search, Optimization and Machine Learning","author":"DE Goldberg","year":"2003","unstructured":"Goldberg, D.E.: Genetic Algorithms in Search, Optimization and Machine Learning. Addison Wesley, Boston (2003)"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the Third International Conference on Soft Computing for Problem Solving"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-81-322-1768-8_45","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T23:52:20Z","timestamp":1746143540000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-81-322-1768-8_45"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9788132217671","9788132217688"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-81-322-1768-8_45","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"4 March 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}