{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:22:31Z","timestamp":1740122551519,"version":"3.37.3"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2022,1,21]],"date-time":"2022-01-21T00:00:00Z","timestamp":1642723200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,21]],"date-time":"2022-01-21T00:00:00Z","timestamp":1642723200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2022,3]]},"DOI":"10.1007\/s10623-021-00984-3","type":"journal-article","created":{"date-parts":[[2022,1,21]],"date-time":"2022-01-21T00:04:20Z","timestamp":1642723460000},"page":"489-521","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A state bit recovery algorithm with TMDTO attack on Lizard and Grain-128a"],"prefix":"10.1007","volume":"90","author":[{"given":"Deepak Kumar","family":"Dalai","sequence":"first","affiliation":[]},{"given":"Santu","family":"Pal","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6821-920X","authenticated-orcid":false,"given":"Santanu","family":"Sarkar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,21]]},"reference":[{"issue":"1","key":"984_CR1","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1504\/IJWMC.2011.044106","volume":"5","author":"M \u00c5gren","year":"2011","unstructured":"\u00c5gren M., Hell M., Johansson T., Meier W.: Grain-128a: a new version of Grain-128 with optional authentication. IJWMC 5(1), 48\u201359 (2011).","journal-title":"IJWMC"},{"key":"984_CR2","doi-asserted-by":"crossref","unstructured":"Babbage S.: A space\/time tradeoff in exhaustive search attacks on stream ciphers. In: European Convention on Security and Detection, vol. 408. IEE Conference Publication (1995).","DOI":"10.1049\/cp:19950490"},{"key":"984_CR3","doi-asserted-by":"crossref","unstructured":"Banik S., Maitra S., Sarkar S.: A differential fault attack on Grain-128a using macs. In: Second International Conference, SPACE 2012, vol. 7644 of Lecture Notes in Computer Science, pp. 111\u2013125. Springer (2012).","DOI":"10.1007\/978-3-642-34416-9_8"},{"key":"984_CR4","doi-asserted-by":"crossref","unstructured":"Banik S., Maitra S., Sarkar S., Turan M.S.: A chosen IV related key attack on Grain-128a. In: 18th Australasian Conference, ACISP 2013, vol. 7959 of Lecture Notes in Computer Science, pp. 13\u201326. Springer (2013).","DOI":"10.1007\/978-3-642-39059-3_2"},{"issue":"4","key":"984_CR5","doi-asserted-by":"publisher","first-page":"82","DOI":"10.46586\/tosc.v2017.i4.82-98","volume":"2017","author":"S Banik","year":"2017","unstructured":"Banik S., Isobe T., Cui T., Guo J.: Some cryptanalytic results on Lizard. IACR Trans. Symmetric Cryptol. 2017(4), 82\u201398 (2017).","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"984_CR6","doi-asserted-by":"crossref","unstructured":"Biryukov A., Shamir A.: Cryptanalytic time\/memory\/data tradeoffs for stream ciphers. In: Advances in Cryptology\u2014ASIACRYPT 2000, vol. 1976 in Lecture Notes in Computer Science, pp. 1\u201313. Springer (2000).","DOI":"10.1007\/3-540-44448-3_1"},{"key":"984_CR7","doi-asserted-by":"crossref","unstructured":"Biryukov A., Shamir A., Wagner D.: Real time cryptanalysis of A5\/1 on a pc. In: Fast Software Encryption\u2013FSE 2000, vol. 1978 in Lecture Notes in Computer Science, pp. 1\u201318. Springer (2001).","DOI":"10.1007\/3-540-44706-7_1"},{"key":"984_CR8","unstructured":"Bj\u00f8rstad T.E.: Cryptanalysis of Grain using time\/memory\/data tradeoffs. (2008). http:\/\/www.ecrypt.eu.org\/stream."},{"key":"984_CR9","doi-asserted-by":"crossref","unstructured":"Dalai D.K., Pal S.: Recovering internal states of Grain-v1. In: Information Security Practice and Experience\u2014ISPEC 2019, vol. 11879 in Lecture Notes in Computer Science, pp. 325\u2013337. Springer (2019).","DOI":"10.1007\/978-3-030-34339-2_18"},{"key":"984_CR10","doi-asserted-by":"crossref","unstructured":"Ding L., Jin C., Guan J., Qi C.: New treatment of the BSW sampling and its applications to stream ciphers. In: Progress in Cryptology\u2014AFRICACRYPT 2014, vol. 8469 in Lecture Notes in Computer Science, pp. 136\u2013146. Springer (2014).","DOI":"10.1007\/978-3-319-06734-6_9"},{"issue":"11","key":"984_CR11","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1109\/CC.2016.7781728","volume":"13","author":"L Ding","year":"2016","unstructured":"Ding L., Jin C., Guan J., Zhang S., Li J., Wang H., Zhao W.: New state recovery attacks on the Grain-v1 stream cipher. China Commun. 13(11), 180\u2013188 (2016).","journal-title":"China Commun."},{"issue":"5","key":"984_CR12","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1016\/j.ipl.2008.01.011","volume":"107","author":"O Dunkelman","year":"2008","unstructured":"Dunkelman O., Nathan K.: Treatment of the initial value in time-memory-data tradeoff attacks on stream ciphers. Inf. Process. Lett. 107(5), 133\u2013137 (2008).","journal-title":"Inf. Process. Lett."},{"key":"984_CR13","unstructured":"eSTREAM: Stream cipher project for ecrypt (2005). http:\/\/www.ecrypt.eu.org\/stream\/."},{"key":"984_CR14","doi-asserted-by":"crossref","unstructured":"Goli\u0107 J.D.: Cryptanalysis of alleged A5 stream cipher. In: Advances in Cryptology\u2014EUROCRYPT 1997, vol. 1233 in Lecture Notes in Computer Science, pp. 239\u2013255. Springer (1997).","DOI":"10.1007\/3-540-69053-0_17"},{"issue":"1","key":"984_CR15","doi-asserted-by":"publisher","first-page":"45","DOI":"10.46586\/tosc.v2017.i1.45-79","volume":"2017","author":"M Hamann","year":"2017","unstructured":"Hamann M., Krause M., Meier W.: LIZARD\u2013a lightweight stream cipher for power-constrained devices. IACR Trans. Symmetric Cryptol. 2017(1), 45\u201379 (2017).","journal-title":"IACR Trans. Symmetric Cryptol."},{"issue":"1","key":"984_CR16","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1504\/IJWMC.2007.013798","volume":"2","author":"M Hell","year":"2007","unstructured":"Hell M., Johansson T., Meier W.: Grain: a stream cipher for constrained environments. Int. J. Wirel. Mob. Comput. 2(1), 86\u201393 (2007).","journal-title":"Int. J. Wirel. Mob. Comput."},{"issue":"4","key":"984_CR17","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1109\/TIT.1980.1056220","volume":"26","author":"M Hellman","year":"1980","unstructured":"Hellman M.: A cryptanalytic time-memory trade-off. IEEE Trans. Inf. Theory 26(4), 401\u2013406 (1980).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"984_CR18","doi-asserted-by":"crossref","unstructured":"Jiao L., Zhang B., Wang M.: Two generic methods of analyzing stream ciphers. In: International Conference on Information Security\u2014ISC 2015, vol. 9290 in Lecture Notes in Computer Science, pp. 379\u2013396. Springer (2015).","DOI":"10.1007\/978-3-319-23318-5_21"},{"key":"984_CR19","doi-asserted-by":"crossref","unstructured":"Lehmann M., Meier W.: Conditional differential cryptanalysis of Grain-128a. In: Cryptology and Network Security, 11th International Conference, CANS 2012. Proceedings, vol. 7712, pp. 1\u201311. Springer (2012).","DOI":"10.1007\/978-3-642-35404-5_1"},{"issue":"5","key":"984_CR20","doi-asserted-by":"publisher","first-page":"733","DOI":"10.1109\/TC.2017.2773062","volume":"67","author":"S Maitra","year":"2018","unstructured":"Maitra S., Sinha N., Siddhanti A., Anand R., Gangopadhyay S.: A TMDTO attack against Lizard. IEEE Trans. Comput. 67(5), 733\u2013739 (2018).","journal-title":"IEEE Trans. Comput."},{"key":"984_CR21","unstructured":"Mihaljevi\u0107 M., Sinha N., Gangopadhyay S., Maitra S., Paul G., Matsuura K.: An improved cryptanalysis of lightweight stream cipher Grain-v1. In: Cryptacus: Workshop and MC Meeting (2017)."},{"key":"984_CR22","unstructured":"Seidlov\u00e1 M.: Time-memory tradeoff attacks. Bachelor thesis, Charles University, Prague (2012). https:\/\/is.cuni.cz\/webapps\/zzp\/download\/130069388."},{"key":"984_CR23","doi-asserted-by":"crossref","unstructured":"Todo Y., Isobe T., Meier W., Aoki K., Zhang B.: Fast correlation attack revisited\u2014cryptanalysis on full Grain-128a,Grain-128, and Grain-v1. In: Advances in Cryptology\u2014CRYPTO 2018, vol.10992 of Lecture Notes in Computer Science, pp. 129\u2013159. Springer (2018).","DOI":"10.1007\/978-3-319-96881-0_5"},{"key":"984_CR24","doi-asserted-by":"crossref","unstructured":"van\u00a0den Broek F., Poll E.: A comparison of time-memory trade-off attacks on stream ciphers. In: Progress in Cryptology\u2014AFRICACRYPT 2013, vol. 7918 in Lecture Notes in Computer Science, pp. 406\u2013423. Springer (2013).","DOI":"10.1007\/978-3-642-38553-7_24"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-021-00984-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10623-021-00984-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-021-00984-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,7]],"date-time":"2022-03-07T10:07:54Z","timestamp":1646647674000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10623-021-00984-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,21]]},"references-count":24,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,3]]}},"alternative-id":["984"],"URL":"https:\/\/doi.org\/10.1007\/s10623-021-00984-3","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"type":"print","value":"0925-1022"},{"type":"electronic","value":"1573-7586"}],"subject":[],"published":{"date-parts":[[2022,1,21]]},"assertion":[{"value":"20 November 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 September 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 November 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 January 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}