{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T13:16:09Z","timestamp":1725455769503},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540639275"},{"type":"electronic","value":"9783540696681"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1997]]},"DOI":"10.1007\/bfb0024464","type":"book-chapter","created":{"date-parts":[[2005,11,19]],"date-time":"2005-11-19T08:06:58Z","timestamp":1132387618000},"page":"192-198","source":"Crossref","is-referenced-by-count":0,"title":["Labyrinth: A new ultra high speed stream cipher"],"prefix":"10.1007","author":[{"given":"Bo","family":"Lin","sequence":"first","affiliation":[]},{"given":"Simon","family":"Shepherd","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,17]]},"reference":[{"key":"21_CR1","unstructured":"NBS FIPS Publication 46, Data Encryption Standard, US National Bureau of Standards, US Dept. of Commerce, January 1977."},{"key":"21_CR2","unstructured":"\u201cCRY12C102 DES CHIP\u201d, Data sheet, Lintel NV\/SA, Belgium."},{"key":"21_CR3","unstructured":"\u201cThe wench Proposal for the Cipher\u201d, Racal Internal Document No. 10-1617-01, 10 June 1988, (private communication)."},{"key":"21_CR4","unstructured":"\u201cSecure Rambutan Kernel\u201d, Marconi Electronic Devices Ltd, 1989, (private communication)."},{"key":"21_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1007\/3-540-58108-1_8","volume-title":"Proc. Cambridge Security Workshop on Fast Software Encryption","author":"P. Rogaway","year":"1994","unstructured":"P. Rogaway and D. Coppersmith, \u201cA Software-Optimised Encryption Algorithm\u201d, Proc. Cambridge Security Workshop on Fast Software Encryption, Lecture Notes in Computer Science 809, Springer Verlag, Berlin, 1994, ISBN 0-387-58108-1, 56\u201363."},{"key":"21_CR6","unstructured":"G. Marsaglia, \u201cA current view of random number generators\u201d, Keynote address in Proceedings of 16th Symposium on Computer and Statistics, Elsevier, 1985."},{"key":"21_CR7","volume-title":"\u201cThe Art of Computer Programming\u201d, Volume 3","author":"D. E. Knuth","year":"1981","unstructured":"D. E. Knuth, \u201cThe Art of Computer Programming\u201d, Volume 3, Section 6.7, Addison-Wesley, Reading, MA, 1981."},{"key":"21_CR8","first-page":"233","volume-title":"Communications Coding and Signal Processing","author":"S. N. Blackler","year":"1997","unstructured":"S. N. Blackler and S. J. Shepherd, \u201cCharacterization of Non-linearity in Block Ciphers\u201d, selected paper in Communications Coding and Signal Processing, eds. Honary, Darnell and Farrell, John Wiley & Sons, Chichester, 1997, ISBN 0-47197821-3, 233\u2013247."},{"key":"21_CR9","unstructured":"S. J. Shepherd and S. K. Barton, \u201cOn the Decomposition of Mixed Shift Register Sequences\u201d, to appear."},{"issue":"1","key":"21_CR10","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1109\/TC.1985.1676518","volume":"34","author":"T. Siegenthaler","year":"1985","unstructured":"T. Siegenthaler, \u201cDecrypting a Class of Stream Ciphers Using Ciphertext Only\u201d, IEEE Transactions on Computers, 34 (1), January 1985, 81\u201385.","journal-title":"IEEE Transactions on Computers"},{"key":"21_CR11","doi-asserted-by":"crossref","unstructured":"R. Rueppel, \u201cDesign and Analysis of Stream Ciphers\u201d, Springer Verlag, 1986, ISBN 0-387-16870-2.","DOI":"10.1007\/978-3-642-82865-2"},{"issue":"1","key":"21_CR12","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/12.481485","volume":"45","author":"J. Golic","year":"1996","unstructured":"J. Golic, \u201cLinear Models for Keystream Generators\u201d, IEEE Transactions on Computers, 45 (1), January 1996, 41\u201349.","journal-title":"IEEE Transactions on Computers"},{"key":"21_CR13","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/TIT.1969.1054260","volume":"15","author":"J. L. Massey","year":"1969","unstructured":"J. L. Massey, \u201cShift Register Synthesis and BCH Decoding\u201d, IEEE Transactions on Information Theory, 15, January 1969, 122\u2013127.","journal-title":"IEEE Transactions on Information Theory"}],"container-title":["Lecture Notes in Computer Science","Crytography and Coding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0024464","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,4]],"date-time":"2019-02-04T23:49:27Z","timestamp":1549324167000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0024464"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997]]},"ISBN":["9783540639275","9783540696681"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/bfb0024464","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1997]]}}}