{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T16:35:05Z","timestamp":1725467705580},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540647324"},{"type":"electronic","value":"9783540691013"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/bfb0053728","type":"book-chapter","created":{"date-parts":[[2006,7,6]],"date-time":"2006-07-06T10:57:43Z","timestamp":1152183463000},"page":"135-146","source":"Crossref","is-referenced-by-count":18,"title":["A stream cipher based on linear feedback over GF(28)"],"prefix":"10.1007","author":[{"given":"Greg","family":"Rose","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,5,23]]},"reference":[{"key":"13_CR1","unstructured":"See Ross Anderson's posting on USENET newsgroup sci.crypt, \u201cSubject: A5 (Was: HACKING DIGITAL PHONES)\u201d, 17 Jun 1994,. Alternatively, S. B. Xu, D. K. He, and X. M. Wang, \u201cAn implementation of the GSM General Data Encryption Algorithm A5\u201d, CHINACRYPT '94, Xidian, China, 11\u201315 November 1994, pp 287\u2013291 (in Chinese). The latter appears to be based on the same information as Anderson's posting (or possibly the posting itself) as Anderson states that two of the registers have unknown polynomials, but the polynomials are the same in his posting and Xu et.al."},{"key":"13_CR2","unstructured":"W. Caelli, E Dawson, L. Nielsen, H. Gustafson, \u201cCRYPT-X Stastical Package Manual, Measuring the strength of Stream and Block Ciphers\u201d, Queensland Univeristy of Technology, 1992, ISBN 0-86856-8090."},{"key":"13_CR3","unstructured":"T. Herlestam, \u201cOn functions of Linear Shift Register Sequences\u201d, in Franz Pichler, editor, Proc. EUROCRYPT 85, LNCS 219, Springer-Verlag 1986."},{"key":"13_CR4","unstructured":"G. Marsaglia, \u201cDIEHARD\u201d, http:\/\/stat.fsu.edu\/~geo\/diehard.html"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"A. Menezes, P. Van Oorschot, S. Vanstone, \u201cHandbook of Applied Cryptography\u201d, CRC Press, 1997, Ch 6.","DOI":"10.1201\/9781439821916"},{"key":"13_CR6","unstructured":"C. Paar, Ph.D. Thesis, \u201cEfficient VLSI Architectures for Bit-Parallel Computation in Galois Fields\u201d, Institute for Experimental Mathematics, University of Essen, 1994, ISBN 3-18-332810-0."},{"key":"13_CR7","unstructured":"B. Schneier, \u201cApplied Cryptography Second Edition\u201d, Wiley 1996, pp. 369\u2013413."},{"key":"13_CR8","unstructured":"TIA\/EIA Standard IS-54B, Telecommunications Industry Association, Vienna VA., USA."}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0053728","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,19]],"date-time":"2019-04-19T17:22:45Z","timestamp":1555694565000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0053728"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540647324","9783540691013"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/bfb0053728","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1998]]}}}