{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T07:13:58Z","timestamp":1758266038616},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"1-2","license":[{"start":{"date-parts":[[2009,5,7]],"date-time":"2009-05-07T00:00:00Z","timestamp":1241654400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computing"],"published-print":{"date-parts":[[2009,6]]},"DOI":"10.1007\/s00607-009-0035-x","type":"journal-article","created":{"date-parts":[[2009,5,6]],"date-time":"2009-05-06T10:37:46Z","timestamp":1241606266000},"page":"153-168","source":"Crossref","is-referenced-by-count":26,"title":["An approach for stream ciphers design based on joint computing over random and secret data"],"prefix":"10.1007","volume":"85","author":[{"given":"Miodrag J.","family":"Mihaljevi\u0107","sequence":"first","affiliation":[]},{"given":"Hideki","family":"Imai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,5,7]]},"reference":[{"key":"35_CR1","doi-asserted-by":"crossref","first-page":"184","DOI":"10.1007\/978-3-540-73458-1_15","volume":"4586","author":"J-P Aumasson","year":"2007","unstructured":"Aumasson J-P, Finiasz M, Meier W, Vaudenay S (2007) TCHo: a hardware-oriented trapdoor cipher. ACISP 2007. Lect Notes Comput Sci 4586: 184\u2013199","journal-title":"Lect Notes Comput Sci"},{"key":"35_CR2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/3-540-44448-3_1","volume":"1976","author":"A Biryukov","year":"2000","unstructured":"Biryukov A, Shamir A (2000) Cryptanalytic time\/memory\/data tradeoffs for stream ciphers. ASIACRYPT 2000. Lect Notes Comput Sci 1976: 1\u201313","journal-title":"Lect Notes Comput Sci"},{"key":"35_CR3","doi-asserted-by":"crossref","first-page":"278","DOI":"10.1007\/3-540-48329-2_24","volume":"773","author":"A Blum","year":"1994","unstructured":"Blum A, Furst M, Kearns M, Lipton R (1994) Cryptographic primitives based on hard learning problems, CRYPTO 1993. Lect Notes Comput Sci 773: 278\u2013291","journal-title":"Lect Notes Comput Sci"},{"key":"35_CR4","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1007\/11941378_5","volume":"4329","author":"M Fossorier","year":"2006","unstructured":"Fossorier M, Mihaljevi\u0107 MJ, Imai H, Cui Y, Matsuura K (2006) An algorithm for solving the LPN problem and its application to security evaluation of the HB protocols for RFID. Authentication INDOCRYPT 2006. Lect Notes Comput Sci 4329: 48\u201362","journal-title":"Lect Notes Comput Sci"},{"key":"35_CR5","doi-asserted-by":"crossref","first-page":"4728","DOI":"10.1109\/TIT.2007.909164","volume":"53","author":"M Fossorier","year":"2007","unstructured":"Fossorier M, Mihaljevi\u0107 MJ, Imai H (2007) Modeling block encoding approaches for fast correlation attack. IEEE Trans Inform Theory 53: 4728\u20134737","journal-title":"IEEE Trans Inform Theory"},{"key":"35_CR6","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1007\/978-3-540-78967-3_21","volume":"4965","author":"H Gilbert","year":"2008","unstructured":"Gilbert H, Robshaw MJB, Seurin Y (2008) HB#: increasing the security and efficiency of HB+. EUROCRYPT2008. Lect Notes Comput Sci 4965: 361\u2013378","journal-title":"Lect Notes Comput Sci"},{"key":"35_CR7","doi-asserted-by":"crossref","first-page":"679","DOI":"10.1007\/978-3-540-70583-3_55","volume":"5126","author":"H Gilbert","year":"2008","unstructured":"Gilbert H, Robshaw MJB, Seurin Y (2008) How to Encrypt with the LPN Problem. ICALP 2008. Lect Notes Comput Sci 5126: 679\u2013690","journal-title":"Lect Notes Comput Sci"},{"key":"35_CR8","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1109\/TIT.1980.1056220","volume":"26","author":"ME Hellman","year":"1980","unstructured":"Hellman ME (1980) A cryptanalytic time-memory trade-off. IEEE Trans Inform Theory 26: 401\u2013406","journal-title":"IEEE Trans Inform Theory"},{"key":"35_CR9","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1007\/3-540-45682-1_4","volume":"2248","author":"N Hopper","year":"2001","unstructured":"Hopper N, Blum M (2001) Secure human identification protocols. ASIACRYPT 2001. Lect Notes Comput Sci 2248: 52\u201366","journal-title":"Lect Notes Comput Sci"},{"key":"35_CR10","doi-asserted-by":"crossref","first-page":"382","DOI":"10.1007\/3-540-46885-4_38","volume":"434","author":"HN Jendal","year":"1990","unstructured":"Jendal HN, Kuhn YJB, Massey JL (1990) An information-theoretic treatment of homophonic substitution. EUROCRYPT\u201989. Lect Notes Comput Sci 434: 382\u2013394","journal-title":"Lect Notes Comput Sci"},{"key":"35_CR11","unstructured":"Kara O, Erguler I (2008) A new approach to keystream based cryptosystems. SASC 2008. Workshop Record, pp 205\u2013221"},{"key":"35_CR12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-540-77272-9_1","volume":"4887","author":"J Katz","year":"2007","unstructured":"Katz J (2007) Efficient cryptographic protocols based on the hardness of learning parity with noise. Cryptography and coding 2007. Lect Notes Comput Sci 4887: 1\u201315","journal-title":"Lect Notes Comput Sci"},{"issue":"44","key":"35_CR13","first-page":"114","volume":"42","author":"RJ McEliece","year":"1978","unstructured":"McEliece RJ (1978) A public key cryptosystem based on algebraic coding theory. DSN Prog Rep 42(44): 114\u2013116","journal-title":"DSN Prog Rep"},{"key":"35_CR14","doi-asserted-by":"crossref","unstructured":"Mihaljevi\u0107 MJ (2007) Generic framework for secure Yuen 2000 quantum-encryption employing the wire-tap channel approach. Phys Rev A 75:052334-1-5","DOI":"10.1103\/PhysRevA.75.052334"},{"key":"35_CR15","doi-asserted-by":"crossref","first-page":"988","DOI":"10.1109\/LCOMM.2007.071029","volume":"11","author":"MJ Mihaljevi\u0107","year":"2007","unstructured":"Mihaljevi\u0107 MJ, Fossorier M, Imai H (2007) Security evaluation of certain broadcast encryption schemes employing a generalized time-memory-data trade-off. IEEE Commun Lett 11: 988\u2013990","journal-title":"IEEE Commun Lett"},{"key":"35_CR16","doi-asserted-by":"crossref","unstructured":"Rivest R, Sherman T (1983) Randomized encryption techniques. In: Advances in cryptology: proceedings of CRYPTO \u201982, Plemum, New York, pp 145\u2013163","DOI":"10.1007\/978-1-4757-0602-4_14"},{"key":"35_CR17","doi-asserted-by":"crossref","first-page":"2083","DOI":"10.1109\/18.782143","volume":"45","author":"B Ryabko","year":"1999","unstructured":"Ryabko B, Fionov A (1999) Efficient homophonic coding. IEEE Tran Inform Theory 45: 2083\u20132094","journal-title":"IEEE Tran Inform Theory"},{"key":"35_CR18","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1080\/0161-118291856948","volume":"6","author":"NJA Sloane","year":"1982","unstructured":"Sloane NJA (1982) Error-correcting codes and cryptography\u2013part I. Cryptologia 6: 128\u2013153","journal-title":"Cryptologia"},{"key":"35_CR19","doi-asserted-by":"crossref","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","volume":"54","author":"AD Wyner","year":"1975","unstructured":"Wyner AD (1975) The wire-tap channel. Bell Syst Tech J 54: 1355\u20131387","journal-title":"Bell Syst Tech J"},{"key":"35_CR20","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1109\/TIT.1980.1056136","volume":"26","author":"M Willett","year":"1980","unstructured":"Willett M (1980) Deliberate noise in a modern cryptographic system. IEEE Trans Inform Theory 26: 102\u2013104","journal-title":"IEEE Trans Inform Theory"}],"container-title":["Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-009-0035-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00607-009-0035-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-009-0035-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T10:30:21Z","timestamp":1559125821000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00607-009-0035-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,5,7]]},"references-count":20,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2009,6]]}},"alternative-id":["35"],"URL":"https:\/\/doi.org\/10.1007\/s00607-009-0035-x","relation":{},"ISSN":["0010-485X","1436-5057"],"issn-type":[{"value":"0010-485X","type":"print"},{"value":"1436-5057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,5,7]]}}}