{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T15:55:57Z","timestamp":1725465357888},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,1]]},"DOI":"10.1109\/comswa.2008.4554420","type":"proceedings-article","created":{"date-parts":[[2008,7,3]],"date-time":"2008-07-03T15:19:59Z","timestamp":1215098399000},"page":"260-265","source":"Crossref","is-referenced-by-count":3,"title":["From stream to provably secure block ciphers based on pseudorandom matrix transformations"],"prefix":"10.1109","author":[{"given":"Yassin M. Y.","family":"Hasan","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-60865-6_48"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35083-7_13"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-60865-6_53"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48519-8_13"},{"key":"ref14","article-title":"PATFC: a novel pseudorandom affine transformation Feistel cipher","author":"hasan","year":"2005","journal-title":"Proc IEEE ISSPIT"},{"year":"0","key":"ref15"},{"journal-title":"The WG stream cipher ECRYPT Project","year":"2005","author":"nawaz","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-25937-4_15"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/11599548_14"},{"key":"ref19","first-page":"491","article-title":"Predicting and distinguishing attacks on RC4 key stream generator","author":"mantin","year":"2005","journal-title":"Proc EUROCRYPT LNCS 3494 Springer"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.1997.596784"},{"article-title":"Applied Cryptography: Protocols, Algorithms, and Source Code in C","year":"1996","author":"schneier","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/S0747-7171(08)80013-2"},{"journal-title":"Handbook of Applied Cryptography","year":"2001","author":"menezes","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_24"},{"key":"ref5","article-title":"Randomness testing of the advanced encryption finalist candidates","author":"soto","year":"1999","journal-title":"Computer Security Div National Institute of Standards and Technology-NIST IR 6390"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1137\/0217022"},{"key":"ref7","first-page":"544","article-title":"The security of many-pound Luby-Rackoff pseudorandom permutations","author":"maurer","year":"2003","journal-title":"Proc EUROCRYPT"},{"key":"ref2","article-title":"Cryptanalysis of block ciphers: A survey. Technical Report CG-2003\/2","author":"standaert","year":"2003","journal-title":"Crypto Group Catholic University of Louvain (UCL) Belgium"},{"key":"ref9","first-page":"239","article-title":"A simplified and generalized treatment of Luby-Rackoff pseudorandom permutation generators","author":"maurer","year":"1992","journal-title":"Proc EUROCRYPT LNCS 658 Springer"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30598-9_1"},{"key":"ref20","article-title":"Cryptanalysis of RC4 in different usage Modes","author":"mantin","year":"2005","journal-title":"Proc ASIACRYPT'05 DecA-8"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45146-4_11"},{"key":"ref21","article-title":"Impossible and differential fault analysis of RC4","author":"biham","year":"2005","journal-title":"Proc FSE LNCS Springer"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0053450"},{"key":"ref23","first-page":"181","article-title":"A simple algorithm for fast correlation attacks on stream ciphers","author":"chepyzhov","year":"2000","journal-title":"Proc FSE LNCS 1978 Springer"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0052343"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0052332"}],"event":{"name":"Middleware and Workshops (COMSWARE '08)","start":{"date-parts":[[2008,1,6]]},"location":"Bangalore, India","end":{"date-parts":[[2008,1,10]]}},"container-title":["2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE '08)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4545865\/4554360\/04554420.pdf?arnumber=4554420","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T20:51:23Z","timestamp":1489697483000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4554420\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,1]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/comswa.2008.4554420","relation":{},"subject":[],"published":{"date-parts":[[2008,1]]}}}