{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T12:51:57Z","timestamp":1725454317387},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540593393"},{"type":"electronic","value":"9783540492368"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1995]]},"DOI":"10.1007\/bfb0000425","type":"book-chapter","created":{"date-parts":[[2005,10,7]],"date-time":"2005-10-07T15:27:29Z","timestamp":1128698849000},"page":"65-79","source":"Crossref","is-referenced-by-count":2,"title":["A correlation attack on the binary sequence generators with time-varying output function"],"prefix":"10.1007","author":[{"given":"Miodrag J.","family":"Mihaljevi\u0107","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,9,8]]},"reference":[{"key":"6_CR1","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1109\/TC.1985.1676518","volume":"34","author":"T. Siegenthaler","year":"1985","unstructured":"T. Siegenthaler, \u201dDecrypting a class of stream ciphers using ciphertext only\u201d, IEEE Trans. Comput., vol. 34, pp. 81\u201385, Jan. 1985.","journal-title":"IEEE Trans. Comput."},{"key":"6_CR2","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1007\/BF02252874","volume":"1","author":"W. Meier","year":"1989","unstructured":"W. Meier and O. Staffelbach, \u201dFast correlation attacks on certain stream ciphers\u201d, Journal of Cryptology, vol. 1, pp. 159\u2013176, 1989.","journal-title":"Journal of Cryptology"},{"key":"6_CR3","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1007\/0-387-34799-2_32","volume":"403","author":"K.C. Zeng","year":"1990","unstructured":"K.C. Zeng and M. Huang, \u201dOn the linear syndrome algorithm in cryptanalysis with applications\u201d, Advances in Cryptology \u2014 CRYPTO '88, Lecture Notes in Computer Science, vol. 403, pp. 469\u2013478, 1990.","journal-title":"Lecture Notes in Computer Science"},{"key":"6_CR4","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1007\/3-540-47555-9_11","volume":"658","author":"M.J. Mihaljevi\u0107","year":"1993","unstructured":"M.J. Mihaljevi\u0107 and J.Dj. Goli\u0107, \u201dConvergence of a Bayesian iterative errorcorrection procedure on a noisy shift register sequence\u201d, Advances in Cryptology \u2014 EUROCRYPT '92, Lecture Notes in Computer Science, vol. 658, pp. 124\u2013137, 1993.","journal-title":"Lecture Notes in Computer Science"},{"key":"6_CR5","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/BF00196912","volume":"3","author":"J. Goli\u0107","year":"1991","unstructured":"J.Dj. Goli\u0107 and M.J. Mihaljevi\u0107, \u201dA generalized correlation attack on a class of stream ciphers based on the Levenshtein distance\u201d, Journal of Cryptology, vol. 3, pp. 201\u2013212, 1991.","journal-title":"Journal of Cryptology"},{"key":"6_CR6","first-page":"91","volume":"809","author":"J. Goli\u0107","year":"1994","unstructured":"J.Dj. Goli\u0107, \u201dOn the security of shift register based keystream generators\u201d, Fast Software Encryption, Lecture Notes in Computer Science, vol. 809, pp. 91\u2013101, 1994.","journal-title":"Lecture Notes in Computer Science"},{"key":"6_CR7","first-page":"93","volume":"12","author":"M.D. MacLaren","year":"1968","unstructured":"M.D. MacLaren and G. Marsaglia, \u201dUniform random number generators\u201d, Jour. Ass. Comput. Machnery, vol. 12, pp. 93\u201389, 1968.","journal-title":"Jour. Ass. Comput. Machnery"},{"key":"6_CR8","first-page":"17","volume":"135","author":"W.G. Chambers","year":"1988","unstructured":"W.G. Chambers, \u201dClock-controlled shift registers in binary sequence generators\u201d, IEE Proceedings, Pt. E, vol. 135, pp. 17\u201323, 1988.","journal-title":"IEE Proceedings, Pt. E"},{"key":"6_CR9","first-page":"757","volume":"11","author":"G. Marsaglia","year":"1968","unstructured":"G. Marsaglia and T.A. Bray, \u201dOne-line random number generators and their use in combinations\u201d, Comm. Ass. Comput. Machinery, vol. 11, pp. 757\u2013759, 1968.","journal-title":"Comm. Ass. Comput. Machinery"},{"key":"6_CR10","volume-title":"The art of computer programming Vol.2: Seminumerical algorithms","author":"D.E. Knuth","year":"1981","unstructured":"D.E. Knuth, The art of computer programming Vol.2: Seminumerical algorithms. Reading, MA: Addison-Wesley, 1981."},{"key":"6_CR11","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1080\/0161-118591859834","volume":"9","author":"C.T. Retter","year":"1985","unstructured":"C.T. Retter, \u201dA key-search attack on MacLaren-Marsaglia system\u201d, Cryptologia, vol. 9, pp. 114\u2013130, 1985.","journal-title":"Cryptologia"},{"key":"6_CR12","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1109\/18.50390","volume":"36","author":"J. Goli\u0107","year":"1990","unstructured":"J.Dj. Goli\u0107 and M.J. Mihaljevi\u0107, \u201dMinimal linear equivalent analysis of a variable memory binary sequences generator\u201d, IEEE Trans. Inform. Theory, vol. 36, pp. 190\u2013192, 1990.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"6_CR13","unstructured":"P.R. Geffe, \u201dHow to protect data with ciphers that are really hard to break\u201d, Electronics, pp. 99\u2013101, Jan. 1973."},{"key":"6_CR14","doi-asserted-by":"crossref","first-page":"160","DOI":"10.1007\/3-540-46416-6_14","volume":"547","author":"J. Goli\u0107","year":"1991","unstructured":"J.Dj. Goli\u0107, \u201dThe number of output sequences of a binary sequence generator\u201d, Advances in Cryptology \u2014 EUROCRYPT '91, Lecture Notes in Computer Science, vol. 547, pp. 160\u2013167, 1991.","journal-title":"Lecture Notes in Computer Science"},{"issue":"No.11","key":"6_CR15","doi-asserted-by":"crossref","first-page":"850","DOI":"10.1049\/el:19940573","volume":"30","author":"R. Menicocci","year":"1994","unstructured":"R. Menicocci, \u201dIntrinsic weakness of variable-memory keystream generators\u201d, Electronics Letters, vol. 30, No. 11, pp. 850\u2013851, 1994.","journal-title":"Electronics Letters"},{"key":"6_CR16","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1007\/3-540-39466-4_13","volume":"149","author":"S.M. Jennings","year":"1982","unstructured":"S.M. Jennings, \u201dMultiplexed sequences: Some properties of the minimum polynomial\u201d, Proc. Workshop on Cryptography, Lecture Notes in Computer Science, vol. 149, pp. 189\u2013206, 1982.","journal-title":"Lecture Notes in Computer Science"},{"key":"6_CR17","volume-title":"Time warps, string edits and macromolecules: The theory and practice of sequence comparison","author":"D. Sankoff","year":"1983","unstructured":"D.Sankoff and J.B.Kruskal, Time warps, string edits and macromolecules: The theory and practice of sequence comparison. Reading, MA: Addison-Wesley, 1983."},{"key":"6_CR18","first-page":"707","volume":"10","author":"A. Levenshtein","year":"1966","unstructured":"A.Levenshtein, \u201dBinary codes capable of correcting deletions, insertions, and reversals\u201d, Sov. Phy. Dokl., vol. 10, pp. 707\u2013710, 1966.","journal-title":"Sov. Phy. Dokl."},{"key":"6_CR19","volume-title":"Pattern recognition: A statistical approach","author":"P.A. Devijver","year":"1982","unstructured":"P.A. Devijver and J. Kittler, Pattern recognition: A statistical approach. London: Prentice Hall, 1982."},{"key":"6_CR20","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1007\/3-540-38424-3_3","volume":"537","author":"K.C. Zeng","year":"1991","unstructured":"K.C. Zeng, C.H. Yang, and T.R.N. Rao, \u201dOn the linear consistency test (LCT) in cryptanalysis and its applications\u201d, Advances in Cryptology \u2014 CRYPTO '90, Lecture Notes in Computer Science, vol. 537, pp. 34\u201347, 1991.","journal-title":"Lecture Notes in Computer Science"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 ASIACRYPT'94"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0000425","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,3]],"date-time":"2019-02-03T23:09:07Z","timestamp":1549235347000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0000425"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995]]},"ISBN":["9783540593393","9783540492368"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/bfb0000425","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1995]]}}}