{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T16:31:20Z","timestamp":1648657880936},"reference-count":23,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[2001,1,1]],"date-time":"2001-01-01T00:00:00Z","timestamp":978307200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers &amp; Security"],"published-print":{"date-parts":[[2001,1]]},"DOI":"10.1016\/s0167-4048(01)01025-2","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T17:17:04Z","timestamp":1027617424000},"page":"79-89","source":"Crossref","is-referenced-by-count":0,"title":["How to Construct Cryptographic Primitives from Stream Ciphers"],"prefix":"10.1016","volume":"20","author":[{"given":"Jovan Dj.","family":"Goli\u0107","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0167-4048(01)01025-2_BIB1","doi-asserted-by":"crossref","unstructured":"R.J. Anderson and E. Biham, \u201cTwo practical and provably secure block ciphers: BEAR and LION\u201d, Fast Software Encryption \u2014 Cambridge '96, Lecture Notes in Computer Science, vol. 1039, D. Gollmann ed., Springer-Verlag, pp. 113\u2013120, 1996.","DOI":"10.1007\/3-540-60865-6_48"},{"key":"10.1016\/S0167-4048(01)01025-2_BIB2","doi-asserted-by":"crossref","unstructured":"M. Bellare, J. Kilian, and P. Rogaway, \u201cThe security of cipher block chaining\u201d, Advances in Cryptology \u2014 CRYPTO '94, Lecture Notes in Computer Science, vol. 839, Y. G. Desmedt ed., Springer-Verlag, pp. 341\u2013358, 1994.","DOI":"10.1007\/3-540-48658-5_32"},{"key":"10.1016\/S0167-4048(01)01025-2_BIB3","doi-asserted-by":"crossref","unstructured":"M. Bellare, A. Desai, E. Jokipii, and P. Rogaway, \u201cA concrete security treatment of symmetric encryption: analysis of the DES modes of operation\u201d, Proc. of the 38. Annual Symposium on the Foundations of Computer Science \u2014 FOCS '97, IEEE Press, 1997.","DOI":"10.1109\/SFCS.1997.646128"},{"key":"10.1016\/S0167-4048(01)01025-2_BIB4","doi-asserted-by":"crossref","unstructured":"E. Biham and A. Shamir, \u201cDifferential cryptanalysis of DES-like cryptosystems\u201d, Journal of Cryptology, vol. 4(1), pp. 3\u201372, 1991.","DOI":"10.1007\/BF00630563"},{"key":"10.1016\/S0167-4048(01)01025-2_BIB5","doi-asserted-by":"crossref","unstructured":"E. Biham and P. C. Kocher, \u201cA known plaintext attack on the PKZIP stream cipher\u201d, Fast Software Encryption \u2014 Leuven '94, Lecture Notes in Computer Science, vol. 1008, B. Preneel ed., Springer-Verlag, pp. 144\u2013153, 1995.","DOI":"10.1007\/3-540-60590-8_12"},{"key":"10.1016\/S0167-4048(01)01025-2_BIB6","doi-asserted-by":"crossref","unstructured":"J. Daemen, R. Govaerts, and J. Vandewalle, \u201cResynchronization weakness in synchronous stream ciphers\u201d, Advances in Cryptology \u2014 EUROCRYPT '93, Lecture Notes in Computer Science, vol. 765, T. Helleseth ed., Springer-Verlag, pp. 159\u2013167, 1994.","DOI":"10.1007\/3-540-48285-7_14"},{"key":"10.1016\/S0167-4048(01)01025-2_BIB7","doi-asserted-by":"crossref","unstructured":"J. Dj. Golic\u0308, \u201cOn the security of shift register based keystream generators\u201d, Fast Software Encryption \u2014 Cambridge '93, Lecture Notes in Computer Science, vol. 809, R. J. Anderson ed., Springer-Verlag, pp. 90\u2013100, 1994.","DOI":"10.1007\/3-540-58108-1_12"},{"key":"10.1016\/S0167-4048(01)01025-2_BIB8","doi-asserted-by":"crossref","unstructured":"J. Dj. Golic\u0308, \u201cOn the security of nonlinear filter generators\u201d, Fast Software Encryption \u2014 Cambridge '96, Lecture Notes in Computer Science, vol. 1039, D. Gollmann ed., Springer-Verlag, pp. 173\u2013188, 1996.","DOI":"10.1007\/3-540-60865-6_52"},{"key":"10.1016\/S0167-4048(01)01025-2_BIB9","doi-asserted-by":"crossref","unstructured":"J. Dj. Golic\u0308, \u201cLinear models for keystream generators\u201d, IEEE Trans. Computers, vol. C\u201345, pp. 41\u201349, Jan. 1996.","DOI":"10.1109\/12.481485"},{"key":"10.1016\/S0167-4048(01)01025-2_BIB10","unstructured":"J. Dj. Golic\u0308, \u201cRecent advances in stream cipher cryptanalysis\u201d, Publications de l'Institut Mathematique, vol. 64(78), pp. 183\u2013204, 1998."},{"key":"10.1016\/S0167-4048(01)01025-2_BIB11","unstructured":"M. Gysin, \u201cA one-key cryptosystem based on a finite nonlinear automaton, Cryptography\u201d: Policy and Algorithms \u2014 Brisbane '95, Lecture Notes in Computer Science, vol. 1029, E. Dawson and J. Golic\u0308 eds., Springer-Verlag, pp. 165\u2013173, 1996."},{"key":"10.1016\/S0167-4048(01)01025-2_BIB12","doi-asserted-by":"crossref","unstructured":"T. Johansson, \u201cA shift register construction of unconditionally secure authentication codes\u201d, Designs, Codes and Cryptography, vol. 4, pp. 69\u201381, 1994.","DOI":"10.1007\/BF01388561"},{"key":"10.1016\/S0167-4048(01)01025-2_BIB13","doi-asserted-by":"crossref","unstructured":"A. Klapper and M. Goresky, \u201cCryptanalysis based on 2-adic rational approximation\u201d, Advances in Cryptology \u2014 CRYPTO '95, Lecture Notes in Computer Science, vol. 963, D. Coppersmith ed., Springer-Verlag, pp. 262\u2013273, 1995.","DOI":"10.1007\/3-540-44750-4_21"},{"key":"10.1016\/S0167-4048(01)01025-2_BIB14","doi-asserted-by":"crossref","unstructured":"H. Krawczyk, \u201cLFSR-based hashing and authentication\u201d, Advances in Cryptology \u2014 CRYPTO '94, Lecture Notes in Computer Science, vol. 839, Y. G. Desmedt ed., Springer-Verlag, pp. 129\u2013139, 1994.","DOI":"10.1007\/3-540-48658-5_15"},{"key":"10.1016\/S0167-4048(01)01025-2_BIB15","doi-asserted-by":"crossref","unstructured":"X. Lai and R. A. Rueppel, \u201cA fast cryptographic checksum algorithm based on stream ciphers\u201d, Advances in Cryptology \u2014 AUSCRYPT '92, Lecture Notes in Computer Science, vol. 718, J. Seberry and Y. Zheng eds., Springer-Verlag, pp. 339\u2013348, 1993.","DOI":"10.1007\/3-540-57220-1_73"},{"key":"10.1016\/S0167-4048(01)01025-2_BIB16","doi-asserted-by":"crossref","unstructured":"S. Lucks, \u201cFaster LubyRackoff ciphers\u201d, Fast Software Encryption \u2014 Cambridge '96, Lecture Notes in Computer Science, vol. 1039, D. Gollmann ed., Springer-Verlag, pp. 189\u2013203, 1996.","DOI":"10.1007\/3-540-60865-6_53"},{"key":"10.1016\/S0167-4048(01)01025-2_BIB17","doi-asserted-by":"crossref","unstructured":"M. Matsui, \u201cLinear cryptanalysis method for DES cipher\u201d, Advances in Cryptology \u2014 EUROCRYPT '93, Lecture Notes in Computer Science, vol. 765, T. Helleseth ed., Springer-Verlag, pp. 386\u2013397, 1994.","DOI":"10.1007\/3-540-48285-7_33"},{"key":"10.1016\/S0167-4048(01)01025-2_BIB18","doi-asserted-by":"crossref","unstructured":"U. M. Maurer and J. L. Massey, \u201cCascade ciphers: the importance of being first\u201d, Journal of Cryptology, vol. 6(1), pp. 55\u201361, 1993.","DOI":"10.1007\/BF02620231"},{"key":"10.1016\/S0167-4048(01)01025-2_BIB19","unstructured":"A. Menezes, P. van Oorschot, and S. Vanstone, Handbook of Applied Cryptography. New York, CRC Press, 1997."},{"key":"10.1016\/S0167-4048(01)01025-2_BIB20","doi-asserted-by":"crossref","unstructured":"B. Preneel, R. Govaerts, and J. Vandewalle, \u201cHash functions based on block ciphers: a synthetic approach\u201d2, Advances in Cryptology \u2014 CRYPTO '93, Lecture Notes in Computer Science, vol. 773, D. G. Stinson ed., Springer-Verlag, pp. 368\u2013378, 1994.","DOI":"10.1007\/3-540-48329-2_31"},{"key":"10.1016\/S0167-4048(01)01025-2_BIB21","unstructured":"R. A. Rueppel, \u201cStream ciphers\u201d, Contemporary Cryptology: The Science of Information Integrity, G. Simmons ed., pp. 65\u2013134. New York: IEEE Press, 1991."},{"key":"10.1016\/S0167-4048(01)01025-2_BIB22","unstructured":"B. Schneier, Applied Cryptography. New York: Wiley, 1996."},{"key":"10.1016\/S0167-4048(01)01025-2_BIB23","doi-asserted-by":"crossref","unstructured":"R. Taylor, \u201cAn integrity check value algorithm for stream ciphers\u201d, Advances in Cryptology \u2014 CRYPTO '93, Lecture Notes in Computer Science, vol. 773, D. G. Stinson ed., Springer-Verlag, pp. 40\u201348, 1994.","DOI":"10.1007\/3-540-48329-2_4"}],"container-title":["Computers &amp; Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404801010252?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404801010252?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,1,13]],"date-time":"2020-01-13T03:20:10Z","timestamp":1578885610000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404801010252"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001,1]]},"references-count":23,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2001,1]]}},"alternative-id":["S0167404801010252"],"URL":"https:\/\/doi.org\/10.1016\/s0167-4048(01)01025-2","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[2001,1]]}}}