{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T14:45:26Z","timestamp":1730213126097,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/cwit.2013.6621585","type":"proceedings-article","created":{"date-parts":[[2013,10,11]],"date-time":"2013-10-11T22:58:51Z","timestamp":1381532331000},"page":"17-21","source":"Crossref","is-referenced-by-count":5,"title":["On selection of optimal parameters for the WG stream cipher family"],"prefix":"10.1109","author":[{"given":"Kalikinkar","family":"Mandal","sequence":"first","affiliation":[]},{"given":"Guang","family":"Gong","sequence":"additional","affiliation":[]},{"given":"Xinxin","family":"Fan","sequence":"additional","affiliation":[]},{"given":"Mark","family":"Aagaard","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/s12095-012-0070-x"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2007.12.002"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/18.661528"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1969.1054260"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/BF02252874"},{"key":"13","first-page":"1","article-title":"WG-7: A lightweight stream cipher with good cryptographic properties","author":"luo","year":"2010","journal-title":"IEEE Global Communications Conference"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/CWIT.2013.6621585"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2158480"},{"key":"12","article-title":"Hardware implementations of multi-output welch-gong ciphers","author":"lam","year":"2011","journal-title":"Technical Report CACR 2011-01"},{"key":"21","article-title":"Chosen IV attack on stream cipher WG","author":"wu","year":"0","journal-title":"ECRYPT Stream Cipher Project Report 2005\/030"},{"key":"3","first-page":"345","article-title":"Algebraic attacks on stream ciphers with linear feedback shift registers","volume":"2656","author":"courtois","year":"2003","journal-title":"Advances in Cryptology-Eurocrypt'03"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1984.1056949"},{"key":"2","first-page":"1","article-title":"Cryptanalytic time\/Memory\/Data tradeoffs for stream ciphers","volume":"1976","author":"biryukov","year":"2000","journal-title":"Advances in Cryptology - ASIACRYPT?98"},{"journal-title":"Algebraic Coding Theory","year":"1968","author":"berlekamp","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2002.804043"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37949-9_54"},{"journal-title":"ESTREAM - The ECRYPT Stream Cipher Project","year":"0","key":"6"},{"key":"5","first-page":"278","article-title":"Cube attacks on tweakable black box polynomials","author":"dinur","year":"2009","journal-title":"Advances in Cryptology-Eurocrypt"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.ffa.2003.09.003"},{"journal-title":"Signal Design for Good Correlation For Wireless Communication Cryptography and Radar","year":"2004","author":"golomb","key":"9"},{"key":"8","article-title":"Specification of the stream cipher WG-16 based confidentiality and integrity algorithms","author":"fan","year":"2013","journal-title":"Technical Report CACR 2013-06"}],"event":{"name":"2013 13th Canadian Workshop on Information Theory (CWIT)","start":{"date-parts":[[2013,6,18]]},"location":"Toronto, ON, Canada","end":{"date-parts":[[2013,6,21]]}},"container-title":["2013 13th Canadian Workshop on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6603431\/6621577\/06621585.pdf?arnumber=6621585","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T12:52:48Z","timestamp":1490187168000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6621585\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/cwit.2013.6621585","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}