{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:34:31Z","timestamp":1729665271801,"version":"3.28.0"},"reference-count":7,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,7]]},"DOI":"10.1109\/itwitwn.2007.4318038","type":"proceedings-article","created":{"date-parts":[[2007,9,24]],"date-time":"2007-09-24T18:51:32Z","timestamp":1190659892000},"page":"1-4","source":"Crossref","is-referenced-by-count":11,"title":["A Note on Distinguishing Attacks"],"prefix":"10.1109","author":[{"given":"Hakan","family":"Englund","sequence":"first","affiliation":[]},{"given":"Martin","family":"Hell","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Johansson","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"1999","key":"ref4","article-title":"New European Schemes for Signatures, Integrity, and Encryption"},{"key":"ref3","article-title":"Two general attacks on pomaranch-like keystream generators","author":"englund","year":"2006","journal-title":"ESTREAM the ECRYPT Stream Cipher Project Report 2005\/066"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"422","DOI":"10.1007\/11799313_27","article-title":"Resynchronization attacks on WG and LEX","volume":"4047","author":"wu","year":"2006","journal-title":"Fast Software Encryption 2006"},{"article-title":"On the applicability of distinguishing attacks against stream ciphers","year":"2002","author":"rose","key":"ref5"},{"key":"ref7","article-title":"How secure is secure? On message and IV lengths for synchronous stream ciphers","author":"zenner","year":"0","journal-title":"ESTREAM ECRYPT Stream Cipher Project"},{"key":"ref2","article-title":"The design of a stream cipher LEX","author":"biryukov","year":"2006","journal-title":"Selected Areas in CryptographySAC 2006"},{"key":"ref1","article-title":"A new 128-bit key stream cipher LEX. eSTREAM, ECRYPT Stream Cipher Project","author":"biryukov","year":"2005","journal-title":"Report 2005\/013"}],"event":{"name":"2007 IEEE Information Theory Workshop on Information Theory for Wireless Networks","start":{"date-parts":[[2007,7,1]]},"location":"Bergen, Norway","end":{"date-parts":[[2007,7,6]]}},"container-title":["2007 IEEE Information Theory Workshop on Information Theory for Wireless Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4318012\/4318013\/04318038.pdf?arnumber=4318038","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,17]],"date-time":"2017-06-17T23:16:15Z","timestamp":1497741375000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4318038\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,7]]},"references-count":7,"URL":"https:\/\/doi.org\/10.1109\/itwitwn.2007.4318038","relation":{},"subject":[],"published":{"date-parts":[[2007,7]]}}}