{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:14:23Z","timestamp":1761675263195},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540593393"},{"type":"electronic","value":"9783540492368"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1995]]},"DOI":"10.1007\/bfb0000427","type":"book-chapter","created":{"date-parts":[[2005,10,7]],"date-time":"2005-10-07T15:27:29Z","timestamp":1128698849000},"page":"91-103","source":"Crossref","is-referenced-by-count":23,"title":["Intrinsic statistical weakness of keystream generators"],"prefix":"10.1007","author":[{"given":"Jovan Dj.","family":"Goli\u0107","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,9,8]]},"reference":[{"issue":"3","key":"8_CR1","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1080\/0161-119091864977","volume":"14","author":"R. J. Anderson","year":"1990","unstructured":"R. J. Anderson, \u201dSolving a class of stream ciphers,\u201d Cryptologia, 14(3):285\u2013288, 1990.","journal-title":"Cryptologia"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"W. G. Chambers and D. Gollmann, \u201dLock-in effect in cascades of clock-controlled shift registers,\u201d Advances in Cryptology \u2014 EUROCRYPT '88, Lecture Notes in Computer Science, vol. 330, C. G. G\u00fcnther ed., Springer-Verlag, pp. 331\u2013342, 1988.","DOI":"10.1007\/3-540-45961-8_31"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"D. Coppersmith, H. Krawczyk, and Y. Mansour, \u201dThe shrinking generator,\u201d Advances in Cryptology \u2014 CRYPTO '93, Lecture Notes in Computer Science, vol. 773, D. R. Stinson ed., Springer-Verlag, pp. 22\u201339, 1994.","DOI":"10.1007\/3-540-48329-2_3"},{"key":"8_CR4","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1109\/TIT.1962.1057683","volume":"8","author":"R. G. Gallager","year":"1962","unstructured":"R. G. Gallager, \u201dLow-density parity-check codes,\u201d IRE Trans. Inform. Theory, 8:21\u201328, Jan. 1962.","journal-title":"IRE Trans. Inform. Theory"},{"key":"8_CR5","doi-asserted-by":"crossref","first-page":"1077","DOI":"10.1109\/18.21235","volume":"34","author":"J. D. Goli\u0107","year":"1988","unstructured":"J. Dj. Goli\u0107 and M. V. \u017divkovi\u0107, \u201dOn the linear complexity of nonuniformly decimated PN-sequences,\u201d IEEE Trans. Inform. Theory, 34:1077\u20131079, Sep. 1988.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"8_CR6","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1109\/18.50390","volume":"36","author":"J. D. Goli\u0107","year":"1990","unstructured":"J. Dj. Goli\u0107 and M. J. Mihaljevi\u0107, \u201dMinimal linear equivalent analysis of a variablememory binary sequence generator,\u201d IEEE Trans. Inform. Theory, 36:190\u2013192, Jan. 1990.","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"3","key":"8_CR7","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/BF00196912","volume":"3","author":"J. D. Goli\u0107","year":"1991","unstructured":"J. Dj. Goli\u0107 and M. J. Mihaljevi\u0107, \u201dA generalized correlation attack on a class of stream ciphers based on the Levenshtein distance,\u201d Journal of Cryptology, 3(3):201\u2013212, 1991.","journal-title":"Journal of Cryptology"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"J. Dj. Goli\u0107, \u201dCorrelation via linear sequential circuit approximation of combiners with memory,\u201d Advances in Cryptology \u2014 EUROCRYPT '92, Lecture Notes in Computer Science, vol. 658, R. A Rueppel ed., Springer-Verlag, pp. 113\u2013123, 1993.","DOI":"10.1007\/3-540-47555-9_10"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"J. Dj. Goli\u0107 and S. V. Petrovi\u0107, \u201dA generalized correlation attack with a probabilistic constrained edit distance,\u201d Advances in Cryptology \u2014 EUROCRYPT '92, Lecture Notes in Computer Science, vol. 658, R. A. Rueppel ed., Springer-Verlag, pp. 472\u2013476, 1992.","DOI":"10.1007\/3-540-47555-9_42"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"J. Dj. Goli\u0107, \u201dOn the security of shift register based keystream generators,\u201d Fast Software Encryption '93, Lecture Notes of Computer Science, vol. 809, R. J. Anderson ed., Springer-Verlag, pp. 90\u2013100, 1994.","DOI":"10.1007\/3-540-58108-1_12"},{"issue":"4","key":"8_CR11","doi-asserted-by":"crossref","first-page":"525","DOI":"10.1109\/49.17716","volume":"7","author":"D. Gollmann","year":"1989","unstructured":"D. Gollmann and W. G. Chambers, \u201dClock controlled shift registers: a review,\u201d IEEE J. Sci. Ar. Commun., 7(4):525\u2013533, 1989.","journal-title":"IEEE J. Sci. Ar. Commun."},{"key":"8_CR12","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1145\/321250.321257","volume":"12","author":"M. D. MacLaren","year":"1965","unstructured":"M. D. MacLaren and G. Marsaglia, \u201dUniform random number generators,\u201d J. Ass. Comput. Machinery, 12:83\u201389, 1965.","journal-title":"J. Ass. Comput. Machinery"},{"key":"8_CR13","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1109\/TIT.1969.1054260","volume":"15","author":"J. L. Massey","year":"1969","unstructured":"J. L. Massey, \u201dShift register sequences and BCH decoding,\u201d IEEE Trans. Inform. Theory, 15:122\u2013127, 1969.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"8_CR14","unstructured":"J. L. Massey and R. A. Rueppel, \u201dMethod of, and apparatus for, transforming a digital sequence into an encoded form\u201d U. S. Patent, No. 4,797,922, 1989."},{"issue":"3","key":"8_CR15","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1007\/BF02252874","volume":"1","author":"W. Meier","year":"1989","unstructured":"W. Meier and O. Staffelbach, \u201dFast correlation attacks on certain stream ciphers,\u201d Journal of Cryptology, 1(3):159\u2013176, 1989.","journal-title":"Journal of Cryptology"},{"key":"8_CR16","volume-title":"Short Gollmann cascade generators may be insecure","author":"R. Menicocci","year":"1993","unstructured":"R. Menicocci, \u201dShort Gollmann cascade generators may be insecure,\u201d Abstracts of the Fourth IMA Conference on Coding and Cryptography, Cirencester, 1993, to appear in the Proceedings, Oxford University Press."},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"M. J. Mihaljevi\u0107, \u201dAn approach to the initial state reconstruction of a clockcontrolled shift register based on a novel distance measure,\u201d Advances in Cryptology \u2014 AUSCRYPT '92, Lecture Notes in Computer Science, vol. 718, J. Seberry and Y. Zheng eds., Springer-Verlag, pp. 349\u2013356, 1993.","DOI":"10.1007\/3-540-57220-1_74"},{"key":"8_CR18","first-page":"65","volume-title":"Contemporary Cryptology: The Science of Information Integrity","author":"R. A. Rueppel","year":"1991","unstructured":"R. A. Rueppel, \u201dStream ciphers,\u201d in Contemporary Cryptology: The Science of Information Integrity, G. Simmons ed., pp. 65\u2013134. New York: IEEE Press, 1991."},{"key":"8_CR19","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1109\/TC.1985.1676518","volume":"34","author":"T. Siegenthaler","year":"1985","unstructured":"T. Siegenthaler, \u201dDecrypting a class of stream ciphers using ciphertext only,\u201d IEEE Trans. Comput., 34:81\u201385, Jan. 1985.","journal-title":"IEEE Trans. Comput."},{"key":"8_CR20","doi-asserted-by":"crossref","unstructured":"K. C. Zeng, C. H. Yang, and T. R. N. Rao, \u201dOn the linear consistency test (LCT) in cryptanalysis and its applications,\u201d Advances in Cryptology \u2014 CRYPTO '89, Lecture Notes in Computer Science, vol. 218, G. Brassard ed., Springer-Verlag, pp. 164\u2013174, 1990.","DOI":"10.1007\/0-387-34805-0_16"},{"key":"8_CR21","doi-asserted-by":"crossref","first-page":"1488","DOI":"10.1109\/18.133275","volume":"37","author":"M. V. \u017divkovi\u0107","year":"1991","unstructured":"M. V. \u017divkovi\u0107, \u201dAn algorithm for the initial state reconstruction of the clockcontrolled shift register,\u201d IEEE Trans. Inform. Theory, 37:1488\u20131490, Sep. 1991.","journal-title":"IEEE Trans. Inform. Theory"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 ASIACRYPT'94"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0000427","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,10]],"date-time":"2020-04-10T06:18:12Z","timestamp":1586499492000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0000427"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995]]},"ISBN":["9783540593393","9783540492368"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/bfb0000427","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1995]]}}}