{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,31]],"date-time":"2022-03-31T03:23:27Z","timestamp":1648697007336},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2007,5,1]],"date-time":"2007-05-01T00:00:00Z","timestamp":1177977600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Comput Sci Technol"],"published-print":{"date-parts":[[2007,5]]},"DOI":"10.1007\/s11390-007-9047-1","type":"journal-article","created":{"date-parts":[[2007,5,31]],"date-time":"2007-05-31T01:29:01Z","timestamp":1180574941000},"page":"469-475","source":"Crossref","is-referenced-by-count":0,"title":["Cryptanalysis of Achterbahn-Version 1 and -Version 2"],"prefix":"10.1007","volume":"22","author":[{"given":"Xiao-Li","family":"Huang","sequence":"first","affiliation":[]},{"given":"Chuan-Kun","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2007,5,30]]},"reference":[{"key":"9047_CR1","volume-title":"Cryptography: An Introduction","author":"N Smart","year":"2004","unstructured":"Smart N. Cryptography: An Introduction. Boston: Mcgraw-Hill College, 2004."},{"key":"9047_CR2","volume-title":"Applied Cryptography: Protocols, Algorithms, and Source Code in C","author":"B Schneier","year":"1996","unstructured":"Schneier B. Applied Cryptography: Protocols, Algorithms, and Source Code in C. 2nd Edition, New York: John Wiley and Sons, 1996.","edition":"2"},{"key":"9047_CR3","unstructured":"Bluetooth. Bluetooth Specification. 2003, http:\/\/www.bluetooth.org ."},{"key":"9047_CR4","doi-asserted-by":"crossref","unstructured":"Goli\u0107 J D, Bagini V, Morgari G. Linear cryptanalysis of bluetooth stream cipher. In Proc. Advances in Cryptology (EUROCRYPT\u201902), Lecture Notes in Computer Science 2332, Amsterdam, Netherlands, Berlin: Springer-Verlag, 2002, pp.238\u2013255.","DOI":"10.1007\/3-540-46035-7_16"},{"key":"9047_CR5","unstructured":"NESSIE. New European schemes for signatures, integrity, and encryption. http:\/\/www.nessie.eu.org\/nessie\/ ."},{"key":"9047_CR6","doi-asserted-by":"crossref","unstructured":"Courtois N. Higher order correlation attacks, XL algorithm and cryptanalysis of toyocrypt. In Proc. Information Security and Cryptology (ICISC\u201902), Seoul, Korea, Lecture Notes in Computer Science 2587, Berlin: Springer, 2002, pp.182\u2013199.","DOI":"10.1007\/3-540-36552-4_13"},{"key":"9047_CR7","doi-asserted-by":"crossref","unstructured":"Courtois N, Meier W. Algebraic attacks on stream ciphers with linear feedback. In Proc. Advances in Cryptology (EUROCRYPT\u201903), Warsaw, Poland, Lecture Notes in Computer Science 2656, Berlin: Springer, 2003, pp.345\u2013359.","DOI":"10.1007\/3-540-39200-9_21"},{"key":"9047_CR8","doi-asserted-by":"crossref","unstructured":"Courtois N. Fast algebraic attack on stream ciphers with linear feedback. In Proc. Advances in Cryptology (CRYPTO\u201903), California, USA, Lecture Notes in Computer Science 2729, Berlin: Springer, 2003, pp.176\u2013194.","DOI":"10.1007\/978-3-540-45146-4_11"},{"key":"9047_CR9","unstructured":"eSTREAM. The ECRYPT Stream Cipher Project. http:\/\/www.ecrypt.eu.org\/stream\/ ."},{"key":"9047_CR10","unstructured":"Gammel B M, G\u00f6ttfert R, Kniffler O. The achterbahn stream cipher. eSTREAM, the ECRYPT Stream Cipher Project, Report 2005\/002, 2005, http:\/\/www.ecrypt.eu.org\/stream\/ ."},{"key":"9047_CR11","unstructured":"Gammel B M, G\u00f6ttfert R, Kniffler O. Improved Boolean combining functions for Achterbahn. eSTREAM, the ECRYPT Stream Cipher Project, Report 2005\/072, 2005, http:\/\/www.ecrypt.eu.org\/stream\/ ."},{"key":"9047_CR12","unstructured":"Gammel B M, G\u00f6ttfert R, Kniffler O. Status of Achterbahn and tweaks. Workshop on the State of the Art of Stream Ciphers (SASC\u201906), Leuven, Belgium, Feb. 2006. http:\/\/www.ecrypt.eu.org\/stvl\/sasc2006\/ ."},{"key":"9047_CR13","unstructured":"Johansson T, Meier W, Muller F. Cryptanalysis of Achterbahn. eSTREAM, the ECRYPT Stream Cipher Project, Report 2005\/064, 2005, http:\/\/www.ecrypt.eu.org\/stream\/ ."},{"key":"9047_CR14","doi-asserted-by":"crossref","unstructured":"Johansson T, Meier W, Muller F. Cryptanalysis of Achterbahn. In Proc. Fast Software Encryption (FSE\u201906), Graz, Austria, Preprint, 2006.","DOI":"10.1007\/11799313_1"},{"key":"9047_CR15","unstructured":"Hell M, Johansson T. Cryptanalysis of Achterbahn-Version 2. eSTREAM, the ECRYPT Stream Cipher Project, Report 2006\/042, 2006, http:\/\/www.ecrypt.eu.org\/stream\/ ."},{"key":"9047_CR16","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1109\/TC.1985.1676518","volume":"C-34","author":"T Siegenthaler","year":"1985","unstructured":"Siegenthaler T. Decrypting a class of stream ciphers using ciphertext only. IEEE Trans. Computers, 1985, C-34: 81\u201385.","journal-title":"IEEE Trans. Computers"},{"key":"9047_CR17","doi-asserted-by":"crossref","unstructured":"Meier W, Staffelbach O. Fast correlation attacks on stream ciphers. In Proc. Advances in Cryptology (EUROCRYPT\u201988), Davos, Switzerland, Lecture Notes in Computer Science 330, Berlin: Springer, 1988, pp.301\u2013314.","DOI":"10.1007\/3-540-45961-8_28"},{"key":"9047_CR18","doi-asserted-by":"crossref","unstructured":"Englund H, Hell M, Johansson T. Correlation attacks using a new class of weak feedback polynomials. In Proc. Fast Software Encryption (FSE\u201904), Delhi, India, Lecture Notes in Computer Science 3017, Berlin: Springer, 2004, pp.127\u2013142.","DOI":"10.1007\/978-3-540-25937-4_9"},{"issue":"1","key":"9047_CR19","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/12.481485","volume":"45","author":"J D Goli\u0107","year":"1996","unstructured":"Goli\u0107 J D. Linear models for keystream generators. IEEE Trans. Computers, 1996, 45(1): 41\u201349.","journal-title":"IEEE Trans. Computers"},{"issue":"3","key":"9047_CR20","first-page":"1153","volume":"52","author":"J D Goli\u0107","year":"2006","unstructured":"Goli\u0107 J D, Menicocci R. Statistical distinguishers for irregularly decimated linear recurring sequences. IEEE Trans. Computers, 2006, 52(3): 1153\u20131159.","journal-title":"IEEE Trans. Computers"},{"key":"9047_CR21","doi-asserted-by":"crossref","unstructured":"Goli\u0107 J D. Intrinsic statistical weakness of keystream generators. In Proc. Advances in Cryptology (ASIACRYPT\u201994), Wollongong, Australia, Lecture Notes in Computer Science 917, Berlin: Springer, 1995, pp.91\u2013103.","DOI":"10.1007\/BFb0000427"},{"key":"9047_CR22","doi-asserted-by":"crossref","unstructured":"Goli\u0107 J D. Towards fast correlation attacks on irregularly clocked shift registers. In Proc. Advances in Cryptology (EUROCRYPT\u201995), Saint-Malo, France, Lecture Notes in Computer Science 921, Berlin: Springer, 1995, pp.248\u2013262.","DOI":"10.1007\/3-540-49264-X_20"},{"key":"9047_CR23","doi-asserted-by":"crossref","unstructured":"Englund H, Johansson T. A new distinguisher for clock controlled stream ciphers. In Proc. Fast Software Encryption (FSE\u201905), Paris, France, Lecture Notes in Computer Science 3557, Berlin: Springer, 2005, pp.181\u2013195.","DOI":"10.1007\/11502760_12"},{"key":"9047_CR24","doi-asserted-by":"crossref","unstructured":"Goli\u0107 J D. On the security of nonlinear filter generators. In Proc. Fast Software Encryption (FSE\u201996), Cambridge, United Kingdom, Lecture Notes in Computer Science 1039, Berlin: Springer, 1996, pp.173\u2013188.","DOI":"10.1007\/3-540-60865-6_52"},{"key":"9047_CR25","doi-asserted-by":"crossref","unstructured":"Goli\u0107 J D, Clark A, Dawson E. Inversion attack and branching. In Proc. Information Security and Privacy: 4th Australasian Conference (ACISP\u201999), Wollongong, Australia, Lecture Notes in Computer Science 1587, Berlin: Springer, 1999, pp.88\u2013102.","DOI":"10.1007\/3-540-48970-3_8"}],"container-title":["Journal of Computer Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-007-9047-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11390-007-9047-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-007-9047-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T10:32:38Z","timestamp":1559385158000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11390-007-9047-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,5]]},"references-count":25,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2007,5]]}},"alternative-id":["9047"],"URL":"https:\/\/doi.org\/10.1007\/s11390-007-9047-1","relation":{},"ISSN":["1000-9000","1860-4749"],"issn-type":[{"value":"1000-9000","type":"print"},{"value":"1860-4749","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,5]]}}}