{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,12,19]],"date-time":"2023-12-19T09:47:36Z","timestamp":1702979256350},"reference-count":14,"publisher":"Springer Science and Business Media LLC","issue":"3-4","license":[{"start":{"date-parts":[[2012,8,19]],"date-time":"2012-08-19T00:00:00Z","timestamp":1345334400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2012,12]]},"DOI":"10.1007\/s12095-012-0068-4","type":"journal-article","created":{"date-parts":[[2012,8,17]],"date-time":"2012-08-17T22:57:05Z","timestamp":1345244225000},"page":"217-232","source":"Crossref","is-referenced-by-count":19,"title":["Applying cube attacks to stream ciphers in realistic scenarios"],"prefix":"10.1007","volume":"4","author":[{"given":"Itai","family":"Dinur","sequence":"first","affiliation":[]},{"given":"Adi","family":"Shamir","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,8,19]]},"reference":[{"key":"68_CR1","doi-asserted-by":"crossref","unstructured":"Aumasson, J.-P., Dinur, I., Meier, W., Shamir, A.: Cube testers and key recovery attacks on reduced-round MD6 and trivium. In: Dunkelman, O. (ed.) FSE. Lecture Notes in Computer Science, vol.\u00a05665, pp.\u00a01\u201322. Springer (2009)","DOI":"10.1007\/978-3-642-03317-9_1"},{"key":"68_CR2","doi-asserted-by":"crossref","unstructured":"Blum, M., Luby, M., Rubinfeld, R.: Self-testing\/correcting with applications to numerical problems. In: STOC, pp.\u00a073\u201383. ACM (1990)","DOI":"10.1145\/100216.100225"},{"key":"68_CR3","doi-asserted-by":"crossref","unstructured":"Courtois, N., Klimov, A., Patarin, J., Shamir, A.: Efficient algorithms for solving overdefined systems of multivariate polynomial equations. In: Preneel, B. (ed.) EUROCRYPT. Lecture Notes in Computer Science, vol.\u00a01807, pp.\u00a0392\u2013407. Springer (2000)","DOI":"10.1007\/3-540-45539-6_27"},{"key":"68_CR4","doi-asserted-by":"crossref","unstructured":"De Canni\u00e8re, C., Preneel, B.: Trivium. In: New Stream Cipher Designs. LNCS, vol. 4986, pp.\u00a084\u201397. Springer (2008)","DOI":"10.1007\/978-3-540-68351-3_18"},{"key":"68_CR5","doi-asserted-by":"crossref","unstructured":"Dinur, I., Shamir, A.: Cube attacks on tweakable black box polynomials. In: Joux, A. (ed.) EUROCRYPT. Lecture Notes in Computer Science, vol. 5479, pp.\u00a0278\u2013299. Springer (2009)","DOI":"10.1007\/978-3-642-01001-9_16"},{"key":"68_CR6","doi-asserted-by":"crossref","unstructured":"Dinur, I., Shamir, A.: Generic analysis of small cryptographic leaks. In: Breveglieri, L., Joye, M., Koren, I., Naccache, D., Verbauwhede, I. (eds.) FDTC, IEEE Computer Society, pp.\u00a039\u201348 (2010)","DOI":"10.1109\/FDTC.2010.11"},{"key":"68_CR7","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1145\/780506.780516","volume-title":"Proceedings of the 2002 International Symposium on Symbolic and Algebraic Computation, ISSAC \u201902","author":"JC Faug\u00e8re","year":"2002","unstructured":"Faug\u00e8re, J.C.: A new efficient algorithm for computing Gr\u00f8\u201dbner bases without reduction to zero (F5). In: Proceedings of the 2002 International Symposium on Symbolic and Algebraic Computation, ISSAC \u201902, pp.\u00a075\u201383. ACM, New York, NY, USA (2002)"},{"key":"68_CR8","doi-asserted-by":"crossref","unstructured":"Gaborit, P., Ruatta, O.: Efficient erasure list-decoding of Reed-Muller codes. In: 2006 IEEE International Symposium on Information Theory, pp.\u00a0148\u2013152 (2006)","DOI":"10.1109\/ISIT.2006.261692"},{"issue":"3","key":"68_CR9","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1007\/s004930070011","volume":"20","author":"O Goldreich","year":"2000","unstructured":"Goldreich, O., Goldwasser, S., Lehman, E., Ron, D., Samorodnitsky, A.: Testing monotonicity. Combinatorica 20(3), 301\u2013337 (2000)","journal-title":"Combinatorica"},{"issue":"5","key":"68_CR10","doi-asserted-by":"crossref","first-page":"1988","DOI":"10.1137\/080715548","volume":"39","author":"T Kaufman","year":"2010","unstructured":"Kaufman, T., Litsyn, S., Xie, N.: Breaking the epsilon-soundness bound of the linearity test over GF(2). SIAM J. Comput. 39(5), 1988\u20132003 (2010)","journal-title":"SIAM J. Comput."},{"key":"68_CR11","doi-asserted-by":"crossref","unstructured":"Lai, X.: Higher order derivatives and differential cryptanalysis. In: \u201cSymposium on Communication, Coding and Cryptography\u201d in honor of James L. Massey on the Occasion of his 60\u2019th Birthday, pp.\u00a0227\u2013233 (1994)","DOI":"10.1007\/978-1-4615-2694-0_23"},{"issue":"2","key":"68_CR12","doi-asserted-by":"crossref","first-page":"569","DOI":"10.1109\/18.910575","volume":"47","author":"M Luby","year":"2001","unstructured":"Luby, M., Mitzenmacher, M., Shokrollahi, M.A., Spielman, D.A.: Efficient erasure correcting codes. IEEE Trans. Inf. Theory 47(2), 569\u2013584 (2001)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"4","key":"68_CR13","first-page":"38","volume":"4","author":"IS Reed","year":"1954","unstructured":"Reed, I.S.: A class of multiple-error-correcting codes and the decoding scheme. IEEE Trans. Inf. Theory 4(4), 38\u201349 (1954)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"68_CR14","unstructured":"Vielhaber, M.: Breaking ONE.FIVIUM by AIDA an Algebraic IV Differential Attack. Cryptology ePrint Archive, Report 2007\/413 (2007)"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-012-0068-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12095-012-0068-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-012-0068-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,2]],"date-time":"2019-07-02T19:20:48Z","timestamp":1562095248000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12095-012-0068-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,8,19]]},"references-count":14,"journal-issue":{"issue":"3-4","published-print":{"date-parts":[[2012,12]]}},"alternative-id":["68"],"URL":"https:\/\/doi.org\/10.1007\/s12095-012-0068-4","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"value":"1936-2447","type":"print"},{"value":"1936-2455","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,8,19]]}}}