{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T04:49:25Z","timestamp":1764305365051,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1109\/isit.2015.7282504","type":"proceedings-article","created":{"date-parts":[[2015,10,1]],"date-time":"2015-10-01T18:09:52Z","timestamp":1443722992000},"page":"496-500","source":"Crossref","is-referenced-by-count":14,"title":["Searching cubes for testing Boolean functions and its application to Trivium"],"prefix":"10.1109","author":[{"given":"Meicheng","family":"Liu","sequence":"first","affiliation":[]},{"given":"Dongdai","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Wenhao","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"200","article-title":"Conditional Differential Cryptanalysis of Trivium and KATAN","author":"knellwolf","year":"2011","journal-title":"Selected Areas in Cryptography"},{"key":"ref11","article-title":"Chosen-IV statistical attacks on estream stream cipher-s","author":"saarinen","year":"2006","journal-title":"ESTREAM ECRYPT Stream Cipher Project Report 2006\/013"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17401-8_16"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1080\/14786440009463897"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2012.0175"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.2307\/2983604"},{"key":"ref4","first-page":"278","article-title":"Cube Attacks on Tweakable Black Box Polynomials","author":"dinur","year":"2009","journal-title":"Eurocrypt"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1007\/978-3-540-68351-3_18","article-title":"Trivium","author":"canni\u00e8re","year":"2008","journal-title":"The ESTREAM Finalists"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77026-8_20"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21702-9_10"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-43933-3_26"},{"key":"ref7","first-page":"342","article-title":"A new statistical testing for symmetric ciphers and hash functions","author":"filiol","year":"2002","journal-title":"ICICS 2002 LNCS 2513"},{"key":"ref2","article-title":"Efficient FPGA Implementations of High-Dimensional Cube Testers on the Stream Cipher Grain-128","volume":"218","author":"aumasson","year":"2009","journal-title":"IACR Cryptology EPrint Archive 2009"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03317-9_1"},{"article-title":"Algorithmic cryptanalysis","year":"2009","author":"joux","key":"ref9"}],"event":{"name":"2015 IEEE International Symposium on Information Theory (ISIT)","start":{"date-parts":[[2015,6,14]]},"location":"Hong Kong, Hong Kong","end":{"date-parts":[[2015,6,19]]}},"container-title":["2015 IEEE International Symposium on Information Theory (ISIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7270906\/7282397\/07282504.pdf?arnumber=7282504","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,31]],"date-time":"2019-08-31T01:16:47Z","timestamp":1567214207000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7282504\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/isit.2015.7282504","relation":{},"subject":[],"published":{"date-parts":[[2015,6]]}}}