{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T08:15:38Z","timestamp":1774685738545,"version":"3.50.1"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,12]]},"DOI":"10.1109\/glocom.2010.5684215","type":"proceedings-article","created":{"date-parts":[[2011,1,10]],"date-time":"2011-01-10T21:19:12Z","timestamp":1294694352000},"page":"1-6","source":"Crossref","is-referenced-by-count":40,"title":["A Lightweight Stream Cipher WG-7 for RFID Encryption and Authentication"],"prefix":"10.1109","author":[{"given":"Yiyuan","family":"Luo","sequence":"first","affiliation":[]},{"given":"Qi","family":"Chai","sequence":"additional","affiliation":[]},{"given":"Guang","family":"Gong","sequence":"additional","affiliation":[]},{"given":"Xuejia","family":"Lai","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2002.804043"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"427","DOI":"10.1007\/11545262_31","article-title":"AES on FPGA from the Fastest to the Smallest","volume":"3659","author":"good","year":"2005","journal-title":"Lecture Notes in Computer Science"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1007\/978-3-540-25937-4_19","article-title":"Related key differential attacks on 27 rounds of XTEA and full-round GOST","volume":"3017","author":"ko","year":"2004","journal-title":"Lecture Notes in Computer Science Fast Software Encryption"},{"key":"ref13","article-title":"Hardware Implementation of MOWG","author":"lam","year":"0"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"474","DOI":"10.1007\/978-3-540-24676-3_28","article-title":"Algebraic attacks and decomposition of boolean functions","volume":"3027","author":"meier","year":"2004","journal-title":"Advances in Cryptology-EUROCRYPT'04 Lecture Notes in Computer Science"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77360-3_3"},{"key":"ref16","article-title":"Software implementation of eSTREAM profile I ciphers on embedded 8-bit AVR microcontrollers","author":"meiser","year":"2007","journal-title":"The State of the Art of Stream Ciphers Workshop Record"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2007.12.002"},{"key":"ref18","author":"otte","year":"2009"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2007.894690"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1007\/3-540-39200-9_21","article-title":"Algebraic attacks on stream ciphers with lienar feedback","volume":"2656","author":"courtois","year":"2003","journal-title":"Advances in Cryptology-Eurocrypt'03 Lecture Notes in Computer Science"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1007\/978-3-540-45146-4_11","article-title":"Fast algebraic attacks on stream ciphers with linear feedback","volume":"2729","author":"courtois","year":"2003","journal-title":"Advances in Cryptology CRYPTO 89 Lecture Notes in Computer Science"},{"key":"ref6","article-title":"Hummingbird: ultra-lightweight cryptography for resource-constrained devices","author":"engels","year":"2010","journal-title":"Proceedings of the 14th International Conference on Financial Cryptography and Data Security-FC 2010"},{"key":"ref5","first-page":"278c299","article-title":"Cube attacks on tweakable black box polynomials","volume":"5479","author":"dinur","year":"2009","journal-title":"Advances in Cryptology-Eurocrypt'09 Lecture Notes in Computer Science"},{"key":"ref8","first-page":"838","article-title":"Lightweight implementation of Hummingbird cryptographic algorithm on 4-Bit Microcontrollers","author":"fan","year":"2009","journal-title":"1st International Workshop on RFID Security and Cryptography 2009 (RISC'09)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2007.178"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/3-540-44706-7_13","article-title":"A simple algorithm for fast correlation attacks on stream ciphers","volume":"1978","author":"chepyzhov","year":"2001","journal-title":"Lecture Notes in Computer Science Fast Software Encryption"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/3-540-44448-3_1","article-title":"Cryptanalytic time\/memory\/data tradeoffs for stream ciphers","volume":"1976","author":"biryukov","year":"2000","journal-title":"Lecture Notes in Computer Science-Advance in Cryptology AsiaCrypt"},{"key":"ref9","article-title":"Fast Linear Subspace Attacks on Stream Ciphers","author":"gong","year":"0","journal-title":"CACR Tech Rep"},{"key":"ref20","first-page":"264","article-title":"Attacking the filter generator over GF(2m), Arithmetic of Finite Fields","volume":"4547","author":"ronjom","year":"2007","journal-title":"First International Work-shop WAIFA 2007"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1984.1056949"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77404-4_20"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/RFID.2009.4911182"},{"key":"ref23","article-title":"Hardware\/software codesign for stream ciphers","author":"schaumont","year":"2007","journal-title":"submitted to ESTREAM Project"}],"event":{"name":"GLOBECOM 2010 - 2010 IEEE Global Communications Conference","location":"Miami, FL, USA","start":{"date-parts":[[2010,12,6]]},"end":{"date-parts":[[2010,12,10]]}},"container-title":["2010 IEEE Global Telecommunications Conference GLOBECOM 2010"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5682081\/5683069\/05684215.pdf?arnumber=5684215","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T18:13:04Z","timestamp":1497895984000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5684215\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,12]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/glocom.2010.5684215","relation":{},"subject":[],"published":{"date-parts":[[2010,12]]}}}