{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T08:27:33Z","timestamp":1730276853869,"version":"3.28.0"},"reference-count":9,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1109\/isvdat.2015.7208129","type":"proceedings-article","created":{"date-parts":[[2015,8,20]],"date-time":"2015-08-20T17:53:11Z","timestamp":1440093191000},"page":"1-6","source":"Crossref","is-referenced-by-count":4,"title":["Cryptanalysis of hardware based stream ciphers and implementation of GSM stream cipher to propose a novel approach for designing n-bit LFSR stream cipher"],"prefix":"10.1109","author":[{"given":"Darshana","family":"Upadhyay","sequence":"first","affiliation":[]},{"given":"Trishla","family":"Shah","sequence":"additional","affiliation":[]},{"given":"Priyanka","family":"Sharma","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1504\/IJWMC.2007.013798"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28632-5_26"},{"key":"ref6","article-title":"A Comparative Analysis Of Different LFSR based Ciphers and Parallel Computing Platforms For Development of Generic Cipher Compatible On Both Hardware and Software Platforms","author":"trishla","year":"0","journal-title":"International Conference On Recent Cognizance in Wireless Technology and Image Processing Springer Conference Proceedings"},{"key":"ref5","article-title":"A new version of grain-128 with authentication","author":"agren","year":"2011","journal-title":"Symmetric Key Encryption Workshop"},{"key":"ref8","first-page":"4","article-title":"Cryptanalysis of lfsr-based pseudorandom generators-a survey","author":"zenner","year":"2004","journal-title":"Reihe Informtik"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CICN.2014.196"},{"key":"ref2","first-page":"160","article-title":"Understanding Cryptography-A textbook for students and practioners","volume":"xviii","author":"paar","year":"2010"},{"key":"ref9","first-page":"95","article-title":"Randomness analysis of A5\/1 Stream Cipher for secure mobile communication","volume":"3","author":"upadhyay","year":"2014","journal-title":"International Journal of Computer Science & Communication"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-739X(99)00053-9"}],"event":{"name":"2015 19th International Symposium on VLSI Design and Test (VDAT)","start":{"date-parts":[[2015,6,26]]},"location":"Ahmedabad, India","end":{"date-parts":[[2015,6,29]]}},"container-title":["2015 19th International Symposium on VLSI Design and Test"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7166536\/7208044\/07208129.pdf?arnumber=7208129","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T18:03:53Z","timestamp":1490378633000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7208129\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/isvdat.2015.7208129","relation":{},"subject":[],"published":{"date-parts":[[2015,6]]}}}