{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,8,23]],"date-time":"2022-08-23T15:26:51Z","timestamp":1661268411384},"reference-count":18,"publisher":"Oxford University Press (OUP)","issue":"8","license":[{"start":{"date-parts":[[2018,5,26]],"date-time":"2018-05-26T00:00:00Z","timestamp":1527292800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/about_us\/legal\/notices"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,8,1]]},"DOI":"10.1093\/comjnl\/bxy053","type":"journal-article","created":{"date-parts":[[2018,5,3]],"date-time":"2018-05-03T23:12:44Z","timestamp":1525389164000},"page":"1180-1201","source":"Crossref","is-referenced-by-count":1,"title":["A Secure Self-Synchronized Stream Cipher"],"prefix":"10.1093","volume":"61","author":[{"given":"Amir","family":"Daneshgar","sequence":"first","affiliation":[{"name":"Department of Mathematical Sciences, Sharif University of Technology, Tehran, Iran"}]},{"given":"Fahimeh","family":"Mohebbipoor","sequence":"additional","affiliation":[{"name":"Faculty of Mathematics and Computer Science, Kharazmi University, Tehran, Iran"}]}],"member":"286","published-online":{"date-parts":[[2018,5,26]]},"reference":[{"key":"key\n\t\t\t\t20180724122910_bxy053C1","author":"Preneel","year":"2008"},{"key":"key\n\t\t\t\t20180724122910_bxy053C2","volume-title":"New Stream Cipher Designs: The eSTREAM Finalists","author":"Daemen","year":"2008"},{"key":"key\n\t\t\t\t20180724122910_bxy053C3","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1007\/978-3-540-89754-5_2","volume-title":"Progress in Cryptology\u2014INDOCRYPT 2008, Lecture Notes in Computer Science","author":"Khazaei","year":"2008"},{"key":"key\n\t\t\t\t20180724122910_bxy053C4","author":"Bellare","year":"1997"},{"key":"key\n\t\t\t\t20180724122910_bxy053C5","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1007\/3-540-45708-9_2","volume-title":"Advances in Cryptology\u2014CRYPTO 2002, Lecture Notes in Computer Science","author":"Joux","year":"2002"},{"key":"key\n\t\t\t\t20180724122910_bxy053C6","author":"Bellare","year":"2002"},{"key":"key\n\t\t\t\t20180724122910_bxy053C7","author":"Bellare","year":"2005"},{"key":"key\n\t\t\t\t20180724122910_bxy053C8","first-page":"212","volume-title":"Selected Areas in Cryptography, Lecture Notes in Computer Science","author":"Fouque","year":"2005"},{"key":"key\n\t\t\t\t20180724122910_bxy053C9","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1007\/978-3-540-24654-1_11","volume-title":"Selected Areas in Cryptography, Lecture Notes in Computer Science","author":"Fouque","year":"2004"},{"key":"key\n\t\t\t\t20180724122910_bxy053C10","doi-asserted-by":"crossref","first-page":"1239","DOI":"10.1109\/TIT.2009.2039083","article-title":"On the security of blockwise secure modes of operation beyond the birthday bound","volume":"56","author":"Joux","year":"2010","journal-title":"IEEE Trans. Inf. Theory"},{"key":"key\n\t\t\t\t20180724122910_bxy053C11","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1007\/s12095-011-0046-2","article-title":"Towards a spectral approach for the design of self-synchronizing stream ciphers","volume":"3","author":"Parriaux","year":"2011","journal-title":"Cryptogr. Commun."},{"key":"key\n\t\t\t\t20180724122910_bxy053C12","first-page":"68","article-title":"Designing self-synchronizing switched linear systems: an application to communications","volume":"7","author":"Parriaux","year":"2013","journal-title":"Nonlin. Anal.: Hybrid Syst."},{"key":"key\n\t\t\t\t20180724122910_bxy053C13","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1007\/s10623-016-0185-8","article-title":"Security proof of the canonical form of self-synchronizing stream ciphers","volume":"82","author":"Dravie","year":"2017","journal-title":"Designs Codes Cryptogr."},{"key":"key\n\t\t\t\t20180724122910_bxy053C14","doi-asserted-by":"crossref","first-page":"615","DOI":"10.1109\/TAC.2008.2009589","article-title":"Flatness of switched linear discrete-time systems","volume":"54","author":"Millerioux","year":"2009","journal-title":"IEEE Trans. Automat. Control"},{"key":"key\n\t\t\t\t20180724122910_bxy053C15","doi-asserted-by":"crossref","first-page":"362","DOI":"10.1007\/978-3-540-39887-5_26","volume-title":"Fast Software Encryption, Lecture Notes in Computer Science","author":"Fouque","year":"2003"},{"key":"key\n\t\t\t\t20180724122910_bxy053C16","author":"Hawkes","year":"2004"},{"key":"key\n\t\t\t\t20180724122910_bxy053C17","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1007\/978-3-540-68351-3_14","volume-title":"New Stream Cipher Designs: The eSTREAM Finalists. Lecture Notes in Computer Science","author":"Hell","year":"2008"},{"key":"key\n\t\t\t\t20180724122910_bxy053C18","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1007\/978-3-540-68351-3_9","volume-title":"New Stream Cipher Designs: The eSTREAM Finalists. Lecture Notes in Computer Science","author":"Berbain","year":"2008"}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/comjnl\/article-pdf\/61\/8\/1180\/25209189\/bxy053.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,17]],"date-time":"2019-10-17T09:20:46Z","timestamp":1571304046000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article\/61\/8\/1180\/5005423"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,26]]},"references-count":18,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2018,5,26]]},"published-print":{"date-parts":[[2018,8,1]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxy053","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"value":"0010-4620","type":"print"},{"value":"1460-2067","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2018,8]]},"published":{"date-parts":[[2018,5,26]]}}}