{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:02:59Z","timestamp":1729616579573,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1109\/isit.2005.1523698","type":"proceedings-article","created":{"date-parts":[[2006,10,11]],"date-time":"2006-10-11T11:51:59Z","timestamp":1160567519000},"page":"2012-2015","source":"Crossref","is-referenced-by-count":4,"title":["A unified analysis for the fast correlation attack"],"prefix":"10.1109","author":[{"given":"M.","family":"Fossorier","sequence":"first","affiliation":[]},{"given":"M.","family":"Mihaljevic","sequence":"additional","affiliation":[]},{"given":"H.","family":"Imai","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1007\/978-3-540-24660-2_5","article-title":"A fast correlation attack via unequal error correcting LDPC codes","volume":"2964","author":"noorkami","year":"2004","journal-title":"Lecture Notes in Computer Science"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2001.935982"},{"key":"12","article-title":"A novel approach for algebraic and fast correlation attacks for cryptanalysis of certain keystream generators","author":"mihaljevic","year":"2005","journal-title":"Proc IEICE and SITA Joint Conf Information Theory"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46796-3_28"},{"key":"2","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1007\/3-540-46035-7_14","article-title":"Fast correlation attacks: An algorithmic point of view","volume":"2332","author":"chose","year":"2002","journal-title":"Lecture Notes in Computer Science"},{"key":"1","doi-asserted-by":"crossref","first-page":"573","DOI":"10.1007\/3-540-45539-6_40","article-title":"Improved fast correlation attacks using parity-check equations of weight 4 and 5","volume":"1807","author":"canteaut","year":"2000","journal-title":"Lecture Notes in Computer Science"},{"key":"10","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1007\/3-540-45473-X_17","article-title":"Fast correlation attack algorithm with list decoding and an application","volume":"2355","author":"mihaljevic?","year":"2002","journal-title":"Lecture Notes in Computer Science"},{"journal-title":"Some Results on Fast Correlation Attacks","year":"2002","author":"jonsson","key":"7"},{"key":"6","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1007\/3-540-44598-6_19","article-title":"Fast correlation attacks through reconstruction of linear polynomials","volume":"1880","author":"johansson","year":"2000","journal-title":"Lecture Notes in Computer Science"},{"key":"5","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/4347.001.0001","author":"gallager","year":"1963","journal-title":"Low-Density Parity-Check Codes"},{"key":"4","article-title":"A unified analysis on block decoding approaches for the fast correlation attack","author":"fossorier","year":"2005","journal-title":"IEEE Trans Inform Theory"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-0348-7865-4_4"},{"journal-title":"Quelques Algorithmes de Cryptanalyse du Registre Filtre","year":"2004","author":"leveiller","key":"8"}],"event":{"name":"Proceedings. International Symposium on Information Theory, 2005. ISIT 2005.","start":{"date-parts":[[2005,9,4]]},"location":"Adelaide, Australia","end":{"date-parts":[[2005,9,9]]}},"container-title":["Proceedings. International Symposium on Information Theory, 2005. ISIT 2005."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10215\/32581\/01523698.pdf?arnumber=1523698","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,21]],"date-time":"2019-04-21T12:43:45Z","timestamp":1555850625000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1523698\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/isit.2005.1523698","relation":{},"subject":[],"published":{"date-parts":[[2005]]}}}