{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:39:52Z","timestamp":1750307992568,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2006,3,21]],"date-time":"2006-03-21T00:00:00Z","timestamp":1142899200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,3,21]]},"DOI":"10.1145\/1128817.1128859","type":"proceedings-article","created":{"date-parts":[[2006,5,8]],"date-time":"2006-05-08T21:40:43Z","timestamp":1147124443000},"page":"283-288","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Cryptanalysis of the \"Grain\" family of stream ciphers"],"prefix":"10.1145","author":[{"given":"Alexander","family":"Maximov","sequence":"first","affiliation":[{"name":"Lund University, Lund, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2006,3,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/560131"},{"key":"e_1_3_2_1_2_1","unstructured":"N. Smart. Cryptography: An Introduction 2003.]]   N. Smart. Cryptography: An Introduction 2003.]]"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"J.D.\n       \n      Goli\u0107\n    .\n      \n  \n   \n  Linear statistical weakness of alleged RC4 keystream generator. In W. Fumy editor Advances in Cryptology---EUROCRYPT'97 volume \n  1233\n   of \n  Lecture Notes in Computer Science pages \n  226\n  --\n  238\n  . \n  Springer--Verlag 1997\n  .]]  J.D. Goli\u0107. Linear statistical weakness of alleged RC4 keystream generator. In W. Fumy editor Advances in Cryptology---EUROCRYPT'97 volume 1233 of Lecture Notes in Computer Science pages 226--238. Springer--Verlag 1997.]]","DOI":"10.1007\/3-540-69053-0_16"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"S. R.\n       \n      Fluhrer\n     and \n      \n      \n      D. A.\n       \n      McGrew\n    .\n      \n  \n   \n  Statistical analysis of the alleged RC4 keystream generator. In B. Schneier editor Fast Software Encryption\n   \n  2000 volume \n  1978\n   of \n  Lecture Notes in Computer Science pages \n  19\n  --\n  30\n  . \n  Springer--Verlag 2000.]]   S. R. Fluhrer and D. A. McGrew. Statistical analysis of the alleged RC4 keystream generator. In B. Schneier editor Fast Software Encryption 2000 volume 1978 of Lecture Notes in Computer Science pages 19--30. Springer--Verlag 2000.]]","DOI":"10.1007\/3-540-44706-7_2"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"I.\n       \n      Mantin\n     and \n      \n      \n      A.\n       \n      Shamir\n      \n  \n  . \n  Practical attack on broadcast RC4. In M. Matsui editor Fast Software Encryption\n   \n  2001 volume \n  2355\n   of \n  Lecture Notes in Computer Science pages \n  152\n  --\n  164\n  . \n  Springer--Verlag 2001.]]   I. Mantin and A. Shamir. Practical attack on broadcast RC4. In M. Matsui editor Fast Software Encryption 2001 volume 2355 of Lecture Notes in Computer Science pages 152--164. Springer--Verlag 2001.]]","DOI":"10.1007\/3-540-45473-X_13"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"S.\n       \n      Paul\n     and \n      \n      \n      B.\n       \n      Preneel\n      \n  \n  . \n  A new weekness in the RC4 keystream generator. In B. Roy and W. Meier editors Fast Software Encryption\n   \n  2004 volume \n  3017\n   of \n  Lecture Notes in Computer Science pages \n  245\n  --\n  259\n  . \n  Springer--Verlag 2004.]]  S. Paul and B. Preneel. A new weekness in the RC4 keystream generator. In B. Roy and W. Meier editors Fast Software Encryption 2004 volume 3017 of Lecture Notes in Computer Science pages 245--259. Springer--Verlag 2004.]]","DOI":"10.1007\/978-3-540-25937-4_16"},{"key":"e_1_3_2_1_7_1","first-page":"1999","article-title":"A pedagogical implementation of A5\/1. Available at http:\/\/jya.com\/a51-pi.htm","author":"Briceno M.","year":"2003","journal-title":"Accessed"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"A.\n       \n      Biryukov A.\n       \n      Shamir and \n      \n      \n      D.\n       \n      Wagner\n      \n  \n  . \n  Real time cryptanalysis of A5\/1 on a PC. In B. Schneier editor Fast Software Encryption\n   \n  2000 volume \n  1978\n   of \n  Lecture Notes in Computer Science pages \n  1\n  --\n  13\n  . \n  Springer--Verlag 2000.]]   A. Biryukov A. Shamir and D. Wagner. Real time cryptanalysis of A5\/1 on a PC. In B. Schneier editor Fast Software Encryption 2000 volume 1978 of Lecture Notes in Computer Science pages 1--13. Springer--Verlag 2000.]]","DOI":"10.1007\/3-540-44706-7_1"},{"key":"e_1_3_2_1_9_1","series-title":"Lecture Notes in Computer Science","volume-title":"Selected Areas in Cryptography---SAC","author":"Maximov A.","year":"2004"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/11535218_7"},{"key":"e_1_3_2_1_11_1","first-page":"1999","article-title":"New European Schemes for Signatures, Integrity, and Encryption. Available at http:\/\/www.cryptonessie.org","author":"NESSIE","year":"2003","journal-title":"Accessed"},{"key":"e_1_3_2_1_12_1","first-page":"2005","article-title":"ECRYPT Stream Cipher Project, IST-2002-507932. Available at http:\/\/www.ecrypt. eu.org\/stream\/","author":"ECRYPT.","year":"2005","journal-title":"Accessed"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2002.802608"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"M.\n       \n      Matsui\n    .\n      \n  \n   \n  Linear cryptanalysis method for DES cipher. In T. Helleseth editor Advances in Cryptology---EUROCRYPT'93 volume \n  765\n   of \n  Lecture Notes in Computer Science pages \n  386\n  --\n  397\n  . \n  Springer--Verlag 1994\n  .]]   M. Matsui. Linear cryptanalysis method for DES cipher. In T. Helleseth editor Advances in Cryptology---EUROCRYPT'93 volume 765 of Lecture Notes in Computer Science pages 386--397. Springer--Verlag 1994.]]","DOI":"10.1007\/3-540-48285-7_33"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1984.1056949"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"T.\n       \n      Johansson\n     and \n      \n      \n      F.\n       \n      J\u00f6nsson\n      \n  \n  . \n  Fast correlation attacks based on turbo code techniques. In M.J. Wiener editor Advances in Cryptology---CRYPTO'99 volume \n  1666\n   of \n  Lecture Notes in Computer Science pages \n  181\n  --\n  197\n  . \n  Springer--Verlag 1999\n  .]]   T. Johansson and F. J\u00f6nsson. Fast correlation attacks based on turbo code techniques. In M.J. Wiener editor Advances in Cryptology---CRYPTO'99 volume 1666 of Lecture Notes in Computer Science pages 181--197. Springer--Verlag 1999.]]","DOI":"10.1007\/3-540-48405-1_12"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"T.\n       \n      Johansson\n     and \n      \n      \n      F.\n       \n      J\u00f6nsson\n      \n  \n  . \n  Fast correlation attacks through reconstruction of linear polynomials. In M. Bellare editor Advances in Cryptology---CRYPTO\n   \n  2000 volume \n  1880\n   of \n  Lecture Notes in Computer Science pages \n  300\n  --\n  315\n  . \n  Springer--Verlag 2000.]]   T. Johansson and F. J\u00f6nsson. Fast correlation attacks through reconstruction of linear polynomials. In M. Bellare editor Advances in Cryptology---CRYPTO 2000 volume 1880 of Lecture Notes in Computer Science pages 300--315. Springer--Verlag 2000.]]","DOI":"10.1007\/3-540-44598-6_19"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"V.\n       \n      Chepyzhov T.\n       \n      Johansson and \n      \n      \n      B.\n       \n      Smeets\n      \n  \n  . \n  A simple algorithm for fast correlation attacks on stream ciphers. In B. Schneier editor Fast Software Encryption\n   \n  2000 volume \n  1978\n   of \n  Lecture Notes in Computer Science pages \n  181\n  --\n  195\n  . \n  Springer--Verlag 2000.]]   V. Chepyzhov T. Johansson and B. Smeets. A simple algorithm for fast correlation attacks on stream ciphers. In B. Schneier editor Fast Software Encryption 2000 volume 1978 of Lecture Notes in Computer Science pages 181--195. Springer--Verlag 2000.]]","DOI":"10.1007\/3-540-44706-7_13"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/647936.741079"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/647087.715845"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30564-4_3"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"W.T.\n       \n      Penzhorn\n     and \n      \n      \n      G.J.\n       \n      K\u00fchn\n      \n  \n  . \n  Computation of low-weight parity checks for correlation attacks on stream ciphers. In C. Boyd editor Cryptography and Coding - 5th IMA Conference volume \n  1025\n   of \n  Lecture Notes in Computer Science pages \n  74\n  --\n  83\n  . \n  Springer--Verlag 1995\n  .]]   W.T. Penzhorn and G.J. K\u00fchn. Computation of low-weight parity checks for correlation attacks on stream ciphers. In C. Boyd editor Cryptography and Coding - 5th IMA Conference volume 1025 of Lecture Notes in Computer Science pages 74--83. Springer--Verlag 1995.]]","DOI":"10.1007\/3-540-60693-9_10"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1985.1676518"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"W.\n       \n      Meier\n     and \n      \n      \n      O.\n       \n      Staffelbach\n      \n  \n  . \n  Fast correlation attacks on stream ciphers. In C.G. G\u00fcnter editor Advances in Cryptology---EUROCRYPT'88 volume \n  330\n   of \n  Lecture Notes in Computer Science pages \n  301\n  --\n  316\n  . \n  Springer--Verlag 1988\n  .]]   W. Meier and O. Staffelbach. Fast correlation attacks on stream ciphers. In C.G. G\u00fcnter editor Advances in Cryptology---EUROCRYPT'88 volume 330 of Lecture Notes in Computer Science pages 301--316. Springer--Verlag 1988.]]","DOI":"10.1007\/3-540-45961-8_28"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02252874"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"M.\n       \n      Mihaljevic\n     and \n      \n      \n      J.D.\n       \n      Goli\u0107\n      \n  \n  . \n  A fast iterative algorithm for a shift register initial state reconstruction given the noisy output sequence. In J. Seberry and J. Pieprzyk editors Advances in Cryptology---AUSCRYPT'90 volume \n  453\n   of \n  Lecture Notes in Computer Science pages \n  165\n  --\n  175\n  . \n  Springer--Verlag 1990\n  .]]   M. Mihaljevic and J.D. Goli\u0107. A fast iterative algorithm for a shift register initial state reconstruction given the noisy output sequence. In J. Seberry and J. Pieprzyk editors Advances in Cryptology---AUSCRYPT'90 volume 453 of Lecture Notes in Computer Science pages 165--175. Springer--Verlag 1990.]]","DOI":"10.1007\/BFb0030359"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"V.\n       \n      Chepyzhov\n     and \n      \n      \n      B.\n       \n      Smeets\n      \n  \n  . \n  On a fast correlation attack on certain stream ciphers. In D. W. Davies editor Advances in Cryptology---EUROCRYPT'91 volume \n  547\n   of \n  Lecture Notes in Computer Science pages \n  176\n  --\n  185\n  . \n  Springer--Verlag 1991\n  .]]  V. Chepyzhov and B. Smeets. On a fast correlation attack on certain stream ciphers. In D. W. Davies editor Advances in Cryptology---EUROCRYPT'91 volume 547 of Lecture Notes in Computer Science pages 176--185. Springer--Verlag 1991.]]","DOI":"10.1007\/3-540-46416-6_16"},{"volume-title":"Lund","year":"2002","author":"J\u00f6nsson F.","key":"e_1_3_2_1_30_1"}],"event":{"name":"Asia CCS06: ACM Symposium on Information, Computer and Communications Security 2006","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Taipei Taiwan","acronym":"Asia CCS06"},"container-title":["Proceedings of the 2006 ACM Symposium on Information, computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1128817.1128859","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1128817.1128859","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T15:06:17Z","timestamp":1750259177000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1128817.1128859"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,3,21]]},"references-count":29,"alternative-id":["10.1145\/1128817.1128859","10.1145\/1128817"],"URL":"https:\/\/doi.org\/10.1145\/1128817.1128859","relation":{},"subject":[],"published":{"date-parts":[[2006,3,21]]},"assertion":[{"value":"2006-03-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}