{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,2,3]],"date-time":"2024-02-03T07:58:52Z","timestamp":1706947132692},"reference-count":8,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2013,8,28]],"date-time":"2013-08-28T00:00:00Z","timestamp":1377648000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1007\/s12095-013-0089-7","type":"journal-article","created":{"date-parts":[[2013,8,27]],"date-time":"2013-08-27T07:22:49Z","timestamp":1377588169000},"page":"277-289","source":"Crossref","is-referenced-by-count":5,"title":["Resilience to distinguishing attacks on WG-7 cipher and their generalizations"],"prefix":"10.1007","volume":"5","author":[{"given":"Guang","family":"Gong","sequence":"first","affiliation":[]},{"given":"Mark","family":"Aagaard","sequence":"additional","affiliation":[]},{"given":"Xinxin","family":"Fan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,8,28]]},"reference":[{"key":"89_CR1","doi-asserted-by":"crossref","unstructured":"Golomb, S., Gong, G.: Signal Design for Good Correlation. Cambridge University Press (2005)","DOI":"10.1017\/CBO9780511546907"},{"issue":"11","key":"89_CR2","doi-asserted-by":"crossref","first-page":"2837","DOI":"10.1109\/TIT.2002.804043","volume":"48","author":"G Gong","year":"2002","unstructured":"Gong, G., Youssef, A.: Cryptographic properties of the Welch-Gong transformation sequence generators. IEEE Trans. Inf. Theory 48(11), 2837\u20132846 (2002)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"89_CR3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/0166-218X(93)90155-H","volume":"46","author":"A Klapper","year":"1993","unstructured":"Klapper, A., Chan, A.H., Goresky, M.: Cross-correlations of linearly and quadratically related geometric sequences and GMW sequences. Discret. Appl. Math. 46(1), 1\u201320 (1993)","journal-title":"Discret. Appl. Math."},{"key":"89_CR4","doi-asserted-by":"crossref","unstructured":"Lidl, R., Niederreiter, H.: Finite Fields. Cambridge University Press (1997)","DOI":"10.1017\/CBO9780511525926"},{"key":"89_CR5","doi-asserted-by":"crossref","unstructured":"Luo, Y., Chai, Q., Gong, G., Lai, X.: A lightweight stream cipher WG-7 for RFID encryption and authentication. In: The Proceedings of Global Telecommunications Conference (GLOBECOM 2010), pp. 1\u20136 (2010)","DOI":"10.1109\/GLOCOM.2010.5684215"},{"key":"89_CR6","series-title":"LNCS","first-page":"152","volume-title":"The 8th International Workshop on Fast Software Encryption\u2014FSE\u201901.","author":"I Mantin","year":"2001","unstructured":"Mantin, I., Shamir, A.: A practical attack on broadcast RC4. In: Matsui, M. (ed.) The 8th International Workshop on Fast Software Encryption\u2014FSE\u201901. LNCS, vol.\u00a02355, pp.\u00a0152\u2013164. Springer-Verlag, Berlin, Germany (2001)"},{"issue":"7","key":"89_CR7","doi-asserted-by":"crossref","first-page":"1903","DOI":"10.1016\/j.ins.2007.12.002","volume":"178","author":"Y Nawaz","year":"2008","unstructured":"Nawaz, Y., Gong, G.: WG: a family of stream ciphers with designed randomness properties. Inf. Sci. 178(7), 1903\u20131916 (2008)","journal-title":"Inf. Sci."},{"issue":"3\u20134","key":"89_CR8","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1007\/s12095-012-0070-x","volume":"4","author":"M Orumiehchiha","year":"2012","unstructured":"Orumiehchiha, M., Pieprzyk, J., Steinfeld, R.: Cryptanalysis of WG-7: A Lightweight Stream Cipher. Cryptogr. Commun. 4(3\u20134), 277\u2013285 (2012)","journal-title":"Cryptogr. Commun."}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-013-0089-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12095-013-0089-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-013-0089-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,22]],"date-time":"2019-07-22T04:11:47Z","timestamp":1563768707000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12095-013-0089-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8,28]]},"references-count":8,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2013,12]]}},"alternative-id":["89"],"URL":"https:\/\/doi.org\/10.1007\/s12095-013-0089-7","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"value":"1936-2447","type":"print"},{"value":"1936-2455","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,8,28]]}}}