{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T13:12:11Z","timestamp":1723036331645},"reference-count":19,"publisher":"Oxford University Press (OUP)","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Logic Jnl IGPL"],"DOI":"10.1093\/jigpal\/jzv042","type":"journal-article","created":{"date-parts":[[2015,12,1]],"date-time":"2015-12-01T20:49:22Z","timestamp":1449002962000},"page":"jzv042","source":"Crossref","is-referenced-by-count":1,"title":["Software implementation of the SNOW 3G Generator on iOS and Android platforms"],"prefix":"10.1093","author":[{"given":"J.","family":"Molina-Gil","sequence":"first","affiliation":[]},{"given":"P.","family":"Caballero-Gil","sequence":"additional","affiliation":[]},{"given":"C.","family":"Caballero-Gil","sequence":"additional","affiliation":[]},{"given":"A.","family":"F\u00faster-Sabater","sequence":"additional","affiliation":[]}],"member":"286","published-online":{"date-parts":[[2015,11,30]]},"reference":[{"key":"2016011900421983000_jzv042v1.1","unstructured":"C. Berbain, O. Billet, A. Canteaut, N. Courtois, H. Gilbert, A. Gouget and H. Sibert. Sosemanuk, a fast software-oriented stream cipher. eSTREAM, ECRYPT Stream Cipher Project, 2006."},{"key":"2016011900421983000_jzv042v1.2","doi-asserted-by":"crossref","unstructured":"Billet O. Gilbert H. Resistance of SNOW 2.0 against Algebraic Attacks. Topics in Cryptology CT-RSA. Vol. 3376 of Lecture Notes in Computer Science, pp. 19\u201328, 2005.","DOI":"10.1007\/978-3-540-30574-3_3"},{"key":"2016011900421983000_jzv042v1.3","doi-asserted-by":"crossref","unstructured":"Biryukov A. Priemuth-Schmid D. Zhang B. Multiset collision attacks on reduced-round SNOW 3G and SNOW 3G. Applied Cryptography and Network Security, pp. 139\u2013153, 2010.","DOI":"10.1007\/978-3-642-13708-2_9"},{"key":"2016011900421983000_jzv042v1.4","unstructured":"Brumley B. Hakala, R. Nyberg K. Sovio S. Consecutive S-box Lookups: A Timing Attack on SNOW 3G, Information and Communications Security. Vol. 6476 of Lecture Notes in Computer Science , pp. 171\u2013185, 2010."},{"key":"2016011900421983000_jzv042v1.5","doi-asserted-by":"crossref","unstructured":"Coppersmith D. Halevi S. Jutla C. Cryptanalysis of Stream Ciphers with Linear Masking, CRYPTO. Vol. 2442 of Lecture Notes in Computer Science , pp. 515\u2013532, 2002.","DOI":"10.1007\/3-540-45708-9_33"},{"key":"2016011900421983000_jzv042v1.6","doi-asserted-by":"crossref","unstructured":"B. Debraize and I. M. Corbella. Fault Analysis of the Stream Cipher Snow 3G. Workshop on Fault Diagnosis and Tolerance in Cryptography, pp. 103\u2013110, 2009.","DOI":"10.1109\/FDTC.2009.33"},{"key":"2016011900421983000_jzv042v1.7","doi-asserted-by":"crossref","unstructured":"Delgado-Mohatar O. F\u00faster-Sabater A. Software implementation of linear feedback shift registers over extended fields. CISIS\/ICEUTE\/SOCO, pp. 117\u2013126, 2012.","DOI":"10.1007\/978-3-642-33018-6_12"},{"key":"2016011900421983000_jzv042v1.8","unstructured":"P. Ekdahl and T. Johansson. SNOW - a New Stream Cipher, First Open NESSIE Workshop, pp. 167\u2013168, 2000."},{"key":"2016011900421983000_jzv042v1.9","doi-asserted-by":"crossref","unstructured":"Ekdahl P. Johansson T. A New Version of the Stream Cipher SNOW. Selected Areas in Cryptography. Vol. 2595 of Lecture Notes in Computer Science, pp. 47\u201361, 2003.","DOI":"10.1007\/3-540-36492-7_5"},{"key":"2016011900421983000_jzv042v1.10","unstructured":"ETSI\/SAGE Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2. Document 2: SNOW 3G Specification, version 1.1, 2006."},{"key":"2016011900421983000_jzv042v1.11","unstructured":"ETSI\/SAGE: Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2. Document 5: Design and Evaluation Report, Version 1.1, 2006."},{"key":"2016011900421983000_jzv042v1.12","doi-asserted-by":"crossref","unstructured":"Hawkes P. Rose G. G. Guess-and-Determine Attacks on SNOW. Selected Areas in Cryptography. Vol. of 2595 Lecture Notes in Computer Science , pp. 37\u201346, 2003.","DOI":"10.1007\/3-540-36492-7_4"},{"key":"2016011900421983000_jzv042v1.13","unstructured":"ISO\/IEC 18033-4: Information technology - Security techniques - Encryption algorithms - Part 4: Stream ciphers, 2005."},{"key":"2016011900421983000_jzv042v1.14","doi-asserted-by":"publisher","DOI":"10.1007\/s10470-011-9712-8"},{"key":"2016011900421983000_jzv042v1.15","unstructured":"P. Kitsos, G. Selimis, O. Koufopavlou. High performance ASIC implementation of the SNOW 3G stream cipher. IFIP\/IEEE VLSI-SOC, pp. 13\u201315, 2008."},{"key":"2016011900421983000_jzv042v1.16","doi-asserted-by":"crossref","unstructured":"Molina-Gil J. Caballero-Gil P. Caballero-Gil C. F\u00faster-Sabater A. Analysis and implementation of the SNOW 3G generator used in 4G\/LTE systems. CISIS\/ICEUTE\/SOCO, pp. 499\u2013508, 2014.","DOI":"10.1007\/978-3-319-01854-6_51"},{"key":"2016011900421983000_jzv042v1.17","doi-asserted-by":"crossref","unstructured":"Nyberg K. Wall\u00e9n J. Improved Linear Distinguishers for SNOW 2.0. Fast Software Encryption FSE. Vol. 4047 of Lecture Notes in Computer Science , pp. 144\u2013162, 2006.","DOI":"10.1007\/11799313_10"},{"key":"2016011900421983000_jzv042v1.18","first-page":"97","volume":"3","author":"Orhanou","year":"2010","journal-title":"SNOW 3G stream cipher operation and complexity study. Contemporary Engineering Sciences-Hikari Ltd"},{"key":"2016011900421983000_jzv042v1.19","doi-asserted-by":"crossref","unstructured":"Watanabe D. Biryukov A. De Canniere C. A Distinguishing Attack of SNOW 2.0 with Linear Masking Method. Selected Areas in Cryptography SAC. Vol. 3006 of Lecture Notes in Computer Science , pp. 222\u2013233, 2004.","DOI":"10.1007\/978-3-540-24654-1_16"}],"container-title":["Logic Journal of IGPL"],"original-title":[],"language":"en","deposited":{"date-parts":[[2019,9,2]],"date-time":"2019-09-02T00:00:52Z","timestamp":1567382452000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/jigpal\/article-lookup\/doi\/10.1093\/jigpal\/jzv042"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11,30]]},"references-count":19,"alternative-id":["10.1093\/jigpal\/jzv042"],"URL":"https:\/\/doi.org\/10.1093\/jigpal\/jzv042","relation":{},"ISSN":["1367-0751","1368-9894"],"issn-type":[{"value":"1367-0751","type":"print"},{"value":"1368-9894","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,11,30]]}}}