{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T08:37:00Z","timestamp":1648543020273},"reference-count":6,"publisher":"Elsevier BV","issue":"12","license":[{"start":{"date-parts":[[2002,12,1]],"date-time":"2002-12-01T00:00:00Z","timestamp":1038700800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Signal Processing"],"published-print":{"date-parts":[[2002,12]]},"DOI":"10.1016\/s0165-1684(02)00356-0","type":"journal-article","created":{"date-parts":[[2002,10,21]],"date-time":"2002-10-21T16:08:24Z","timestamp":1035216504000},"page":"2025-2028","source":"Crossref","is-referenced-by-count":2,"title":["Cryptanalysis of a summation generator with 2-bit memory"],"prefix":"10.1016","volume":"82","author":[{"given":"Jorge Carlos","family":"Mex-Perera","sequence":"first","affiliation":[]},{"given":"Simon J","family":"Shepherd","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0165-1684(02)00356-0_BIB1","doi-asserted-by":"crossref","unstructured":"E. Dawson, Cryptanalysis of summation generator, in: J. Seberry, Y. Zheng (Eds.), Advances in Cryptology\u2014AUSCRYPT\u201992, Lecture Notes in Computer Science, Vol. LNCS 718, Springer, Berlin, 1993, pp. 209\u2013215.","DOI":"10.1007\/3-540-57220-1_63"},{"issue":"1","key":"10.1016\/S0165-1684(02)00356-0_BIB2","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1080\/0161-119491882757","article-title":"Divide and conquer attacks on certain classes of stream ciphers","volume":"18","author":"Dawson","year":"1994","journal-title":"Cryptologia"},{"key":"10.1016\/S0165-1684(02)00356-0_BIB3","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1007\/s001459910009","article-title":"Fast correlation attacks on the summation generator","volume":"13","author":"Golic","year":"2000","journal-title":"J. Cryptol."},{"issue":"1","key":"10.1016\/S0165-1684(02)00356-0_BIB4","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1016\/S0165-1684(99)00123-1","article-title":"On an improved summation generator with 2-bit memory","volume":"80","author":"Lee","year":"2000","journal-title":"Signal Processing"},{"key":"10.1016\/S0165-1684(02)00356-0_BIB5","doi-asserted-by":"crossref","unstructured":"R. Rueppel, Correlation immunity and the summation generator, in: H.C. Williams (Ed.), Advances in Cryptology\u2014CRYPTO\u201985, Lecture Notes in Computer Science, Springer, Berlin, 1986, pp. 260\u2013272.","DOI":"10.1007\/3-540-39799-X_20"},{"issue":"1","key":"10.1016\/S0165-1684(02)00356-0_BIB6","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1109\/TC.1985.1676518","article-title":"Decrypting a class of stream ciphers using ciphertext only","volume":"C-34","author":"Siegenthaler","year":"1985","journal-title":"IEEE Trans. Comput."}],"container-title":["Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0165168402003560?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0165168402003560?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,9]],"date-time":"2019-04-09T08:23:13Z","timestamp":1554798193000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0165168402003560"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,12]]},"references-count":6,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2002,12]]}},"alternative-id":["S0165168402003560"],"URL":"https:\/\/doi.org\/10.1016\/s0165-1684(02)00356-0","relation":{},"ISSN":["0165-1684"],"issn-type":[{"value":"0165-1684","type":"print"}],"subject":[],"published":{"date-parts":[[2002,12]]}}}