{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T08:42:44Z","timestamp":1648888964288},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2009,9,18]],"date-time":"2009-09-18T00:00:00Z","timestamp":1253232000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2010,4]]},"DOI":"10.1007\/s12095-009-0013-3","type":"journal-article","created":{"date-parts":[[2009,9,17]],"date-time":"2009-09-17T17:58:02Z","timestamp":1253210282000},"page":"1-17","source":"Crossref","is-referenced-by-count":0,"title":["On the structural weakness of the GGHN stream cipher"],"prefix":"10.1007","volume":"2","author":[{"given":"Aleksandar","family":"Kircanski","sequence":"first","affiliation":[]},{"given":"Amr M.","family":"Youssef","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,9,18]]},"reference":[{"key":"13_CR1","series-title":"LNCS","first-page":"125","volume-title":"Security Protocols, 5th International Workshop","author":"R Anderson","year":"1997","unstructured":"Anderson, R., Kuhn, M.: Low cost attacks on tamper resistant devices. In: Security Protocols, 5th International Workshop. LNCS, vol. 1361, pp. 125\u2013136. Springer, New York (1997)"},{"key":"13_CR2","series-title":"LNCS","first-page":"513","volume-title":"CRYPTO\u201997","author":"E Biham","year":"1997","unstructured":"Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: CRYPTO\u201997. LNCS, vol. 1294, pp. 513\u2013525. Springer, New York (1997)"},{"key":"13_CR3","series-title":"LNCS","first-page":"37","volume-title":"Eurocrypt\u201997","author":"D Boneh","year":"1997","unstructured":"Boneh, D., Demillo, R.A., Lipton, R.J.: On the importance of checking cryptographic protocols for faults. In: Eurocrypt\u201997. LNCS, vol. 1233, pp. 37\u201351. Springer, New York (1997)"},{"key":"13_CR4","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1007\/11502760_24","volume-title":"Fast Software Encryption 2005","author":"E Biham","year":"2005","unstructured":"Biham, E., Granboulan, L., Nguyen, P.Q.: Impossible fault analysis of RC4 and differential fault analysis of RC4. In: Fast Software Encryption 2005. LNCS, vol. 3557, pp. 359\u2013367. Springer, New York (2005)"},{"key":"13_CR5","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1007\/978-3-540-45203-4_23","volume-title":"Applied Cryptography and Network Security 2003","author":"P Dusart","year":"2003","unstructured":"Dusart, P., Letourneux, G., Vivolo, O.: Differential fault analysis on AES. In: Applied Cryptography and Network Security 2003. LNCS, vol. 2846, pp. 293\u2013306. Springer, New York (2003)"},{"key":"13_CR6","series-title":"LNCS","first-page":"66","volume-title":"Fast Software Encryption 2000","author":"SR Fluhrer","year":"2000","unstructured":"Fluhrer, S.R., McGrew, D.A.: Statistical analysis of the alleged RC4 keystream generator. In: Fast Software Encryption 2000. LNCS, vol. 1978, pp. 66\u201371. Springer, New York (2000)"},{"key":"13_CR7","series-title":"LNCS","first-page":"1","volume-title":"Selected Areas in Cryptography 2001","author":"SR Fluhrer","year":"2001","unstructured":"Fluhrer, S.R., Mantin, I., Shamir, A.: Weaknesses in the key scheduling algorithm of RC4. In: Selected Areas in Cryptography 2001. LNCS, vol. 2259, pp. 1\u201324. Springer, New York (2001)"},{"key":"13_CR8","series-title":"LNCS","first-page":"226","volume-title":"EUROCRYPT 1997","author":"JD Goli\u0107","year":"1997","unstructured":"Goli\u0107, J.D.: Linear statistical weakness of alleged RC4 keystream generator. In: EUROCRYPT 1997. LNCS, vol. 1233, pp. 226\u2013238. Springer, New York (1997)"},{"key":"13_CR9","series-title":"LNCS","first-page":"162","volume-title":"Proc. of Information Security and Cryptology 2005","author":"G Gong","year":"2005","unstructured":"Gong, G., Gupta, K.C., Hell, M., Nawaz, Y.: Towards a general RC4-like keystream generator. In: Proc. of Information Security and Cryptology 2005. LNCS, vol. 3822, pp. 162\u2013174 Springer, New York (2005)"},{"key":"13_CR10","unstructured":"Hawkes, P., Rose, G.G.: On the applicability of distinguishing attacks against stream ciphers. In: Proc. of the Third NESSIE Workshop (2002)"},{"key":"13_CR11","series-title":"LNCS","first-page":"240","volume-title":"CHES 2004","author":"J Hoch","year":"2004","unstructured":"Hoch, J., Shamir, A.: Fault analysis of stream ciphers. In: CHES 2004. LNCS, vol. 3156, pp. 240\u2013253. Springer, New York (2004)"},{"key":"13_CR12","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"327","DOI":"10.1007\/3-540-49649-1_26","volume-title":"ASIACRYPT\u201998","author":"LR Knudsen","year":"1998","unstructured":"Knudsen, L.R., Meier, W., Prenel, B., Rijmen, V., Verdoolaege, S.: Analysis methods for (Alleged) RC4. In: ASIACRYPT\u201998. LNCS, vol. 1514, pp. 327\u2013341. Springer, New York (1998)"},{"key":"13_CR13","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"CRYPTO\u2019 99","author":"P Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: CRYPTO\u2019 99. LNCS, vol. 1666, pp. 388\u2013397. Springer, New York (1999)"},{"key":"13_CR14","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"CRYPTO \u201996","author":"P Kocher","year":"1996","unstructured":"Kocher, P.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: CRYPTO \u201996. LNCS, vol. 1109, pp. 104\u2013113. Springer, New York (1996)"},{"key":"13_CR15","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1145\/321250.321257","volume":"15","author":"MD MacLaren","year":"1965","unstructured":"MacLaren, M.D., Marsaglia, G.: Uniform random number generation. J. ACM 15, 83\u201389 (1965)","journal-title":"J. ACM"},{"key":"13_CR16","series-title":"LNCS","first-page":"152","volume-title":"Fast Software Encryption 2001","author":"I Mantin","year":"2001","unstructured":"Mantin, I., Shamir, A.: A practical attack on broadcast RC4. In: Fast Software Encryption 2001. LNCS, vol. 2355, pp. 152\u2013164. Springer, New York (2001)"},{"key":"13_CR17","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"491","DOI":"10.1007\/11426639_29","volume-title":"EUROCRYPT \u20192005","author":"I Mantin","year":"2005","unstructured":"Mantin, I.: Predicting and distinguishing attacks on RC4 keystream generator. In: EUROCRYPT \u20192005. LNCS, vol. 3494, pp. 491\u2013506. Springer, New York (2005)"},{"key":"13_CR18","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"342","DOI":"10.1007\/11502760_23","volume-title":"Fast Software Encryption 2005","author":"A Maximov","year":"2005","unstructured":"Maximov, A.: Two linear distinguishing attacks on VMPC and RC4A and weakness of RC4 family of stream ciphers. In: Fast Software Encryption 2005. LNCS, vol. 3357, pp. 342\u2013358. Springer, New York (2005)"},{"key":"13_CR19","series-title":"LNCS","first-page":"40","volume-title":"CRYPTO\u201908","author":"A Maximov","year":"2008","unstructured":"Maximov, A., Khovratovich, D.: New state recovery attack on RC4. In: CRYPTO\u201908. LNCS, vol. 5365, pp. 40\u201352. Springer, New York (2008)"},{"key":"13_CR20","doi-asserted-by":"crossref","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Cryptographic Research","author":"AJ Menezes","year":"1996","unstructured":"Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptographic Research. CRC, Boca Raton (1996)"},{"key":"13_CR21","series-title":"LNCS","first-page":"304","volume-title":"CRYPTO\u2019 02","author":"I Mironov","year":"2002","unstructured":"Mironov, I.: Not (So) random shuffle RC4. In: CRYPTO\u2019 02. LNCS, vol. 2442, pp. 304\u2013319. Springer, New York (2002)"},{"key":"13_CR22","unstructured":"Nawaz, Y., Gupta, K.C., Gong, G.: A 32-bit RC4-like keystream generator. Technical Report CACR 2005-21, Center for Applied Cryptographic Research, University of Waterloo. http:\/\/www.cacr.math.uwaterloo.ca\/tech_reports.html (2005) (Also available at Cryptology ePrint Archive, 2005-175, http:\/\/eprint.iacr.org\/2005\/175 )"},{"key":"13_CR23","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1007\/978-3-540-25937-4_16","volume-title":"Fast Software Encryption 2004","author":"S Paul","year":"2004","unstructured":"Paul, S., Preneel, B.: A new weakness in RC4 keystream generator and an approach to improve the security of the cipher. In: Fast Software Encryption 2004. LNCS, vol.\u00a03017, pp.\u00a0245\u2013259. Springer, New York (2004)"},{"key":"13_CR24","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1007\/11935230_5","volume-title":"ASIACRYPT 2006","author":"S Paul","year":"2006","unstructured":"Paul, S., Preenel, B.: On the (In)security of stream ciphers based on arrays and modular addition. In: ASIACRYPT 2006. LNCS, vol. 4284, pp. 69\u201383. Springer, New York (2006)"},{"key":"13_CR25","series-title":"LNCS","first-page":"2","volume-title":"CHES 2003","author":"SP Skorobogatov","year":"2003","unstructured":"Skorobogatov, S.P., Anderson, R.J.: Optical fault induction attacks. In: CHES 2003. LNCS, vol. 2523, pp. 2\u201312. Springer, New York (2003)"},{"key":"13_CR26","doi-asserted-by":"crossref","unstructured":"Tsunoo, Y., Saito, T., Kubo, H., Suzaki, T.: A distinguishing attack on a fast software-implemented RC4-like stream cipher. IEEE Trans. Inf. Theory 53(9) (2007)","DOI":"10.1109\/TIT.2007.903136"},{"key":"13_CR27","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"344","DOI":"10.1007\/978-3-540-77360-3_22","volume-title":"Selected Areas in Cryptography 2007","author":"S Vaudenay","year":"2007","unstructured":"Vaudenay, S., Vuagnoux, M.: Passive-only key recovery attacks on RC4. In: Selected Areas in Cryptography 2007. LNCS, vol. 4876, pp. 344\u2013359. Springer, New York (2007)"},{"key":"13_CR28","series-title":"LNCS","first-page":"210","volume-title":"Proc. of Fast Software Encryption, FSE 2004","author":"B Zoltak","year":"2004","unstructured":"Zoltak, B.: VMPC one-way function and stream cipher. In: Proc. of Fast Software Encryption, FSE 2004. LNCS, vol. 3017, pp. 210\u2013225. Springer, New York (2004)"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-009-0013-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12095-009-0013-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-009-0013-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,22]],"date-time":"2020-05-22T08:59:25Z","timestamp":1590137965000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12095-009-0013-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,9,18]]},"references-count":28,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2010,4]]}},"alternative-id":["13"],"URL":"https:\/\/doi.org\/10.1007\/s12095-009-0013-3","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"value":"1936-2447","type":"print"},{"value":"1936-2455","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,9,18]]}}}