{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,11]],"date-time":"2025-04-11T05:28:12Z","timestamp":1744349292074},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540618720"},{"type":"electronic","value":"9783540707073"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1996]]},"DOI":"10.1007\/bfb0034861","type":"book-chapter","created":{"date-parts":[[2005,12,11]],"date-time":"2005-12-11T02:32:03Z","timestamp":1134268323000},"page":"360-367","source":"Crossref","is-referenced-by-count":12,"title":["Conditional correlation attack on nonlinear filter generators"],"prefix":"10.1007","author":[{"given":"Sangjin","family":"Lee","sequence":"first","affiliation":[]},{"given":"Seongtaek","family":"Chee","sequence":"additional","affiliation":[]},{"given":"Sangjoon","family":"Park","sequence":"additional","affiliation":[]},{"given":"Sungmo","family":"Park","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,26]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"R. Anderson, \u201cSearching for the Optimum Correlation Attack\u201d, Fast Software Encryption \u2014 Leuven'94, LNCS 1008, Springer-Verlag, pp. 137\u2013143, 1995.","key":"32_CR1","DOI":"10.1007\/3-540-60590-8_11"},{"doi-asserted-by":"crossref","unstructured":"S. Chee, S. Lee, and K. Kim, \u201cSemi-bent Functions\u201d, Advances in Cryptology \u2014 ASIACRYPT'94, LNCS 914, Springer-Verlag, pp. 107\u2013118, 1995.","key":"32_CR2","DOI":"10.1007\/BFb0000428"},{"doi-asserted-by":"crossref","unstructured":"R. Forr\u00e9, \u201cA Fast Correlation Attack on Nonlinearly Feedforward Filtered Shift-Register Sequences\u201d, Advances in Cryptology \u2014 EUROCRYPT'89, LNCS 434, Springer-Verlag, pp. 586\u2013595, 1990.","key":"32_CR3","DOI":"10.1007\/3-540-46885-4_56"},{"doi-asserted-by":"crossref","unstructured":"J. Dj. Golic, \u201cOn Security of Nonlinear Filter Generators\u201d, Fast Software Encryption \u2014 Cambridge'96, LNCS 1039, Springer-Verlag, pp. 173\u2013188, 1996.","key":"32_CR4","DOI":"10.1007\/3-540-60865-6_52"},{"doi-asserted-by":"crossref","unstructured":"G. L. Mayhew, \u201cA Low Cost, High Speed Encryption System and Method\u201d, Proc. of the 1994 IEEE Computer Society Symposium on Research and Security and Privacy, pp. 147\u2013154, 1994.","key":"32_CR5","DOI":"10.1109\/RISP.1994.296585"},{"doi-asserted-by":"crossref","unstructured":"W. Meier and O. Staffelbach, \u201cFast Correlation Attacks on Stream Ciphers\u201d, Advances in Cryptology \u2014 EUROCRYPT'88, LNCS 330, Springer-Verlag, pp. 301\u2013314, 1989.","key":"32_CR6","DOI":"10.1007\/BF02252874"},{"doi-asserted-by":"crossref","unstructured":"S. Park, S. Lee, and S.-C. Goh, \u201cOn the Security of the Gollmann Cascades\u201d, Advances in Cryptology \u2014 CRYPTO'95, LNCS 963, Springer-Verlag, pp. 148\u2013156, 1995.","key":"32_CR7","DOI":"10.1007\/3-540-44750-4_12"},{"doi-asserted-by":"crossref","unstructured":"R. A. Rueppel, Analysis and Design of Stream Ciphers, Springer-Verlag, 1986.","key":"32_CR8","DOI":"10.1007\/978-3-642-82865-2"},{"unstructured":"R. A. Rueppel, \u201cStream ciphers\u201d, in Contemporary Cryptography: the Science of Information Integrity, ch. 2, pp. 65\u2013134, IEEE Press, 1992.","key":"32_CR9"},{"doi-asserted-by":"crossref","unstructured":"J. Seberry, X.-M. Zhang, and Y. Zheng, \u201cOn Constructions and Nonlinearity of Correlation immune Functions\u201d, Advances in Cryptology \u2014 EUROCRYPT'93, LNCS 765, Springer-Verlag, pp. 181\u2013199, 1994.","key":"32_CR10","DOI":"10.1007\/3-540-48285-7_16"},{"doi-asserted-by":"crossref","unstructured":"T. Siegenthaler, \u201cCryptanalysts Representation of Nonlinearly Filtered ML-Sequences\u201d, Advances in Cryptology \u2014 EUROGRYPT'85, LNCS 219, Springer-Verlag, pp. 103\u2013110, 1986.","key":"32_CR11","DOI":"10.1007\/3-540-39805-8_12"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 ASIACRYPT '96"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0034861","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,11]],"date-time":"2020-04-11T09:51:22Z","timestamp":1586598682000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0034861"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1996]]},"ISBN":["9783540618720","9783540707073"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/bfb0034861","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1996]]}}}