{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T08:39:40Z","timestamp":1771576780760,"version":"3.50.1"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2015,12,7]],"date-time":"2015-12-07T00:00:00Z","timestamp":1449446400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001729","name":"Stiftelsen f\u00f6r\u00a0Strategisk Forskning","doi-asserted-by":"publisher","award":["SM12-0005"],"award-info":[{"award-number":["SM12-0005"]}],"id":[{"id":"10.13039\/501100001729","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001729","name":"Stiftelsen f\u00f6r\u00a0Strategisk Forskning","doi-asserted-by":"publisher","award":["SM12-0025"],"award-info":[{"award-number":["SM12-0025"]}],"id":[{"id":"10.13039\/501100001729","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2017,3]]},"DOI":"10.1007\/s12095-015-0173-2","type":"journal-article","created":{"date-parts":[[2015,12,8]],"date-time":"2015-12-08T11:57:36Z","timestamp":1449575856000},"page":"273-289","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":50,"title":["Espresso: A stream cipher for 5G wireless communication systems"],"prefix":"10.1007","volume":"9","author":[{"given":"Elena","family":"Dubrova","sequence":"first","affiliation":[]},{"given":"Martin","family":"Hell","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,7]]},"reference":[{"key":"173_CR1","doi-asserted-by":"crossref","unstructured":"Olsson, M., Cavdar, C., Frenger, P., Tombaz, S., Sabella, D., Jantti, R.: 5green: Towards green 5g mobile networks. In: Int. Conf. on Wireless and Mobile Computing, Networking and Communications, pp 212\u2013216 (2013)","DOI":"10.1109\/WiMOB.2013.6673363"},{"key":"173_CR2","unstructured":"Ericsson White Paper: 5G radio access, June 2013. http:\/\/www.ericsson.com\/res\/docs\/whitepapers\/wp-5g.pdf"},{"key":"173_CR3","first-page":"179","volume":"4986","author":"M Hell","year":"2008","unstructured":"Hell, M., Johansson, T., Maximov, A., Meier, W.: The Grain family of stream ciphers, New Stream Cipher Designs: The eSTREAM Finalists. LNCS 4986, 179\u2013190 (2008)","journal-title":"LNCS"},{"key":"173_CR4","first-page":"244","volume":"4986","author":"C Canni\u00e8re","year":"2008","unstructured":"Canni\u00e8re, C., Preneel, B.: Trivium, New Stream Cipher Designs: The eSTREAM Finalists. LNCS 4986, 244\u2013266 (2008)","journal-title":"LNCS"},{"key":"173_CR5","doi-asserted-by":"crossref","unstructured":"Lidl, R., Niederreiter, H.: Introduction to Finite Fields and their Applications. Cambridge Univ. Press (1994)","DOI":"10.1017\/CBO9781139172769"},{"key":"173_CR6","doi-asserted-by":"crossref","first-page":"5263","DOI":"10.1109\/TIT.2009.2030467","volume":"55","author":"E Dubrova","year":"2009","unstructured":"Dubrova, E.: A transformation from the Fibonacci to the Galois NLFSRs. IEEE Trans. Inf. Theory 55, 5263\u20135271 (2009)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"173_CR7","volume-title":"Applied cryptography (2nd ed.): protocols, algorithms, and source code in C","author":"B Schneier","year":"1995","unstructured":"Schneier, B.: Applied cryptography (2nd ed.): protocols, algorithms, and source code in C. John Wiley & Sons, Inc., NY (1995)"},{"key":"173_CR8","unstructured":"Daemen, J., Rijmen, V.: AES proposal: Rijndael. National Institute of Standards and Technology (2003)"},{"key":"173_CR9","unstructured":"Robshaw, M.: Stream ciphers, Tech. Rep. TR - 701 (1994)"},{"key":"173_CR10","doi-asserted-by":"crossref","unstructured":"De Canni\u00e8re, C., Dunkelman, O., zevi\u0107, M.K.: KATAN and KTANTAN\u2014 a family of small and efficient hardware-oriented block ciphers. In: Cryptographic Hardware and Embedded Systems\u2014CHES 2009, vol. 5747, pp 272\u2013288. Springer (2009)","DOI":"10.1007\/978-3-642-04138-9_20"},{"key":"173_CR11","doi-asserted-by":"crossref","unstructured":"Guo, J., Peyrin, T., Poschmann, A., Robshaw, M.: The led block cipher. In: Preneel, B., Takagi, T. (eds.) Cryptographic Hardware and Embedded Systems, CHES 2011. vol. 6917 of Lecture Notes in Computer Science, 326\u2013341, Springer Berlin \/ Heidelberg (2011)","DOI":"10.1007\/978-3-642-23951-9_22"},{"key":"173_CR12","doi-asserted-by":"crossref","unstructured":"Gong, Z., Nikova, S., Law, Y.: Klein: A new family of lightweight block ciphers. In: Juels, A., Paar, C. (eds.) RFID. Security and Privacy. vol. 7055 of Lecture Notes in Computer Science, 1\u201318, Springer Berlin Heidelberg (2012)","DOI":"10.1007\/978-3-642-25286-0_1"},{"key":"173_CR13","doi-asserted-by":"crossref","unstructured":"Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y., Vikkelsoe, C.: PRESENT: An Ultra-Lightweight Block Cipher. In: Cryptographic Hardware and Embedded Systems\u2014CHES 2007, vol. 4727 of Lecture Notes in Computer Science, 450\u2013466, Springer Berlin Heidelberg (2007)","DOI":"10.1007\/978-3-540-74735-2_31"},{"key":"173_CR14","doi-asserted-by":"crossref","unstructured":"Shibutani, K., Isobe, T., Hiwatari, H., Mitsuda, A., Akishita, T., Shirai, T.: Piccolo: An ultra-lightweight blockcipher. In: Preneel, B., Takagi, T. (eds.) Cryptographic Hardware and Embedded Systems - CHES 2011. vol. 6917 of Lecture Notes in Computer Science, 342\u2013357, Springer (2011)","DOI":"10.1007\/978-3-642-23951-9_23"},{"key":"173_CR15","doi-asserted-by":"crossref","unstructured":"Suzaki, T., Minematsu, K., Morioka, S., Kobayashi, E.: TWINE: A lightweight block cipher for multiple platforms. In: Knudsen, L., Wu, H. (eds.) Selected Areas in Cryptography\u2014SAC 2012. vol. 7707 of Lecture Notes in Computer Science, pp. 339\u2013354, Springer Berlin Heidelberg (2013)","DOI":"10.1007\/978-3-642-35999-6_22"},{"key":"173_CR16","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1109\/JSAC.2005.861395","volume":"24","author":"A Juels","year":"2006","unstructured":"Juels, A.: RFID security and privacy: a research survey. IEEE J. Sel. Areas Commun. 24, 381\u2013394 (2006)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"173_CR17","doi-asserted-by":"crossref","unstructured":"Borghoff, J., Canteaut, A., Gneysu, T., Kavun, E., Knezevic, M., Knudsen, L., Leander, G., Nikov, V., Paar, C., Rechberger, C., Rombouts, P., Thomsen, S., Yaln, T.: Prince a low-latency block cipher for pervasive computing applications. In: Wang, X., Sako, K. (eds.) Advances in Cryptology ASIACRYPT 2012. vol. 7658 of Lecture Notes in Computer Science, pp. 208\u2013225, Springer Berlin Heidelberg (2012)","DOI":"10.1007\/978-3-642-34961-4_14"},{"key":"173_CR18","doi-asserted-by":"crossref","unstructured":"Biham, E., Dunkelman, O.: Cryptanalysis of the A5\/1 GSM stream cipher. In: INDOCRYPT \u201900: Proceedings of the First International Conference on Progress in Cryptology, (London, UK), pp 43\u201351. Springer-Verlag (2000)","DOI":"10.1007\/3-540-44495-5_5"},{"key":"173_CR19","unstructured":"Tews, E., Weinmann, R.-P., Pyshkin, A.: Breaking 104-bit wep in under a minute. Cryptology ePrint Archive, Report 2007\/120 (2007). http:\/\/eprint.iacr.org\/"},{"key":"173_CR20","unstructured":"Golomb, S.: Shift Register Sequences. Aegean Park Press (1982)"},{"key":"173_CR21","doi-asserted-by":"crossref","unstructured":"Golic, J.: On the security of nonlinear filter generators. In: Gollmann, D. (ed.) Fast Software Encryption. vol. 1039 of Lecture Notes in Computer Science, pp. 173\u2013188, Springer Berlin \/ Heidelberg (1996)","DOI":"10.1007\/3-540-60865-6_52"},{"key":"173_CR22","doi-asserted-by":"crossref","unstructured":"Braeken, A., Lano, J.: On the (im)possibility of practical and secure nonlinear filters and combiners. In: Proceedings of the 12th international conference on Selected Areas in Cryptography, SAC\u201905, (Berlin, Heidelberg), pp 159\u2013174. Springer-Verlag (2006)","DOI":"10.1007\/11693383_11"},{"key":"173_CR23","doi-asserted-by":"crossref","unstructured":"Cusick, T.W., Sta\u030cnica\u030c, P.: Cryptographic Boolean functions and applications. San Diego, CA, USA: Academic Press (2009)","DOI":"10.1016\/B978-0-12-374890-4.00009-4"},{"issue":"59","key":"173_CR24","doi-asserted-by":"crossref","first-page":"703","DOI":"10.1109\/TIT.2012.2214204","volume":"1","author":"E Dubrova","year":"2013","unstructured":"Dubrova, E.: A scalable method for constructing Galois NLFSRs with period 2 n \u22121 using cross-join pairs. IEEE Trans. Inf. Theory 1(59), 703\u2013709 (2013)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"173_CR25","unstructured":"Dubrova, E.: A method for generating full cycles by a composition of NLFSRs, Design, Codes and Cryptography (2012)"},{"key":"173_CR26","doi-asserted-by":"crossref","unstructured":"Berbain, C., Gilbert, H., Maximov, A.: Cryptanalysis of Grain. In: Robshaw, M. (ed.) Fast Software Encryption 2006. vol. 4047 of Lecture Notes in Computer Science, pp. 15\u201329, Springer (2006)","DOI":"10.1007\/11799313_2"},{"key":"173_CR27","doi-asserted-by":"crossref","unstructured":"Wagner, D.: A generalized birthday problem. In: Yung, M. (ed.) Advances in Cryptology\u2014CRYPTO 2002. vol. 2442 of Lecture Notes in Computer Science, pp. 288\u2013303, Springer (2002)","DOI":"10.1007\/3-540-45708-9_19"},{"issue":"21","key":"173_CR28","doi-asserted-by":"crossref","first-page":"1981","DOI":"10.1049\/el:19961338","volume":"32","author":"JD Goli\u0107","year":"1996","unstructured":"Goli\u0107, J.D.: Computation of low-weight parity check polynomials. Electron. Lett. 32(21), 1981\u20131982 (1996)","journal-title":"Electron. Lett."},{"key":"173_CR29","doi-asserted-by":"crossref","unstructured":"Courtois, N., Meier, W.: Algebraic attacks on stream ciphers with linear feedback. In: Biham, E. (ed.) Advances in Cryptology\u2014EUROCRYPT 2003. vol. 2656 of Lecture Notes in Computer Science, pp. 345\u2013359, Springer (2003)","DOI":"10.1007\/3-540-39200-9_21"},{"key":"173_CR30","doi-asserted-by":"crossref","unstructured":"Armknecht, F., Krause, M.: Algebraic attacks on combiners with memory. In: Boneh, D. (ed.) Advances in Cryptology\u2014CRYPTO 2003. vol. 2729 of Lecture Notes in Computer Science, pp. 162\u2013176, Springer (2003)","DOI":"10.1007\/978-3-540-45146-4_10"},{"key":"173_CR31","doi-asserted-by":"crossref","unstructured":"Courtois, N., Klimov, A., Patarin, J., Shamir, A.: Efficient algorithms for solving overdefined systems of multivariate polynomial equations. In: Preneel, B. (ed.) Advances in Cryptology\u2014EUROCRYPT 2003. vol. 1807 of Lecture Notes in Computer Science, pp. 392\u2013407, Springer (2000)","DOI":"10.1007\/3-540-45539-6_27"},{"key":"173_CR32","doi-asserted-by":"crossref","unstructured":"Courtois, N., Pieprzyk, J.: Cryptanalysis of block ciphers with overdefined systems of equations. In: Zheng, Y. (ed.) Advances in Cryptology\u2014ASIACRYPT 2002. vol. 2501 of Lecture Notes in Computer Science, pp. 267\u2013287, Springer (2002)","DOI":"10.1007\/3-540-36178-2_17"},{"key":"173_CR33","doi-asserted-by":"crossref","unstructured":"Faug\u00e9re, J.-C., Joux, A.: Algebraic cryptanalysis of Hidden Field Equation (HFE) cryptosystems using Gr\u00f6bner bases. In: Boneh, D. (ed.) Advances in Cryptology\u2014CRYPTO 2003. vol. 2729 of Lecture Notes in Computer Science, pp. 44\u201360, Springer (2003)","DOI":"10.1007\/978-3-540-45146-4_3"},{"key":"173_CR34","doi-asserted-by":"crossref","unstructured":"Meier, W., Pasalic, E., Carlet, C.: Algebraic attacks and decomposition of Boolean functions. In: Advances in Cryptology\u2014EUROCRYPT 2004. vol. 3027 of Lecture Notes in Computer Science, pp. 474\u2013491, Springer (2004)","DOI":"10.1007\/978-3-540-24676-3_28"},{"key":"173_CR35","doi-asserted-by":"crossref","unstructured":"Goli\u0107, J.: Cryptanalysis of alleged A5 stream cipher. In: Fumy, W. (ed.) Advances in Cryptology\u2014EUROCRYPT 1997. vol. 1233 of Lecture Notes in Computer Science, pp. 239\u2013255, Springer (1997)","DOI":"10.1007\/3-540-69053-0_17"},{"key":"173_CR36","doi-asserted-by":"crossref","unstructured":"Babbage, S.: A space\/time tradeoff in exhaustive search attacks on stream ciphers. In: European Convention on Security and Detection, no. 408 in IEE Conference Publication (1995)","DOI":"10.1049\/cp:19950490"},{"key":"173_CR37","doi-asserted-by":"crossref","unstructured":"Biryukov, A., Shamir, A.: Cryptanalytic time\/memory\/data tradeoffs for stream ciphers. In: Okamoto, T. (ed.) Advances in Cryptology\u2014ASIACRYPT 2000. vol. 1976 of Lecture Notes in Computer Science, pp. 1\u201313, Springer (2000)","DOI":"10.1007\/3-540-44448-3_1"},{"key":"173_CR38","doi-asserted-by":"crossref","unstructured":"Hong, J., Sarkar, P.: New applications of time memory data tradeoffs. In: Roy, B. (ed.) Advances in Cryptology\u2014ASIACRYPT 2005. vol. 3788 of Lecture Notes in Computer Science, pp. 353\u2013372, Springer (2005)","DOI":"10.1007\/11593447_19"},{"key":"173_CR39","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1109\/TIT.1980.1056220","volume":"IT-26","author":"M Hellman","year":"1980","unstructured":"Hellman, M.: A cryptanalytic time-memory trade-off. IEEE Trans. Inf. Theory IT-26, 401\u2013406 (1980)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"2","key":"173_CR40","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1049\/iet-ifs.2011.0107","volume":"6","author":"MJ Mihaljevic","year":"2012","unstructured":"Mihaljevic, M.J., Gangopadhyay, S., Paul, G., Imai, H.: Internal state recovery of Grain-v1 employing normality order of the filter function. IET Inf. Secur. 6(2), 55\u201364 (2012)","journal-title":"IET Inf. Secur."},{"issue":"2","key":"173_CR41","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1007\/s10998-012-4631-8","volume":"65","author":"MJ Mihaljevic","year":"2012","unstructured":"Mihaljevic, M.J., Gangopadhyay, S., Paul, G., Imai, H.: Generic cryptographic weakness of k-normal Boolean functions in certain stream ciphers and cryptanalysis of Grain-128. Period. Math. Hung. 65(2), 205\u2013227 (2012)","journal-title":"Period. Math. Hung."},{"key":"173_CR42","unstructured":"Bernstein, D.J.: Understanding brute force. eSTREAM, ECRYPT Stream Cipher Project, Report 2005\/036 (2005). http:\/\/www.ecrypt.eu.org\/stream"},{"key":"173_CR43","doi-asserted-by":"crossref","unstructured":"Dinur, I., Shamir, A.: Cube Attacks on Tweakable Black Box Polynomials. In: Joux, A. (ed.) Advances in Cryptology\u2014EUROCRYPT 2009. vol. 5479 of Lecture Notes in Computer Science, pp. 278\u2013299, Springer (2009)","DOI":"10.1007\/978-3-642-01001-9_16"},{"key":"173_CR44","unstructured":"Vielhaber, M.: Breaking ONE.FIVIUM by AIDA an Algebraic IV Differential attack. Available at: http:\/\/eprint.iacr.org\/2007\/413\/ (2007)"},{"key":"173_CR45","unstructured":"Saarinen, M.-J.O.: Chosen-IV statistical attacks on eStream stream ciphers, Proc. Stream Ciphers Revisited (SASC\u201906) (2006)"},{"key":"173_CR46","doi-asserted-by":"crossref","unstructured":"Stankovski, P.: Greedy distinguishers and nonrandomness detectors. In: Gong, G., Gupta, K.C. (eds.) Progress in Cryptology\u2014INDOCRYPT 2010. vol. 6498 of Lecture Notes in Computer Science, pp. 210\u2013226, Springer (2010)","DOI":"10.1007\/978-3-642-17401-8_16"},{"key":"173_CR47","unstructured":"Biham, E., Dunkelman, O.: Differential cryptanalysis in stream ciphers. Cryptology ePrint Archive, Report 2007\/218 (2007). http:\/\/eprint.iacr.org\/"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-015-0173-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12095-015-0173-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-015-0173-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-015-0173-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,2]],"date-time":"2019-09-02T03:20:55Z","timestamp":1567394455000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12095-015-0173-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12,7]]},"references-count":47,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017,3]]}},"alternative-id":["173"],"URL":"https:\/\/doi.org\/10.1007\/s12095-015-0173-2","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"value":"1936-2447","type":"print"},{"value":"1936-2455","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,12,7]]}}}