{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T14:19:29Z","timestamp":1772806769106,"version":"3.50.1"},"reference-count":14,"publisher":"American Institute of Mathematical Sciences (AIMS)","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["AMC"],"published-print":{"date-parts":[[2021]]},"DOI":"10.3934\/amc.2020081","type":"journal-article","created":{"date-parts":[[2020,4,13]],"date-time":"2020-04-13T05:09:43Z","timestamp":1586754583000},"page":"539-556","source":"Crossref","is-referenced-by-count":2,"title":["Internal state recovery of Espresso stream cipher using conditional sampling resistance and TMDTO attack"],"prefix":"10.3934","volume":"15","author":[{"given":"Nishant","family":"Sinha","sequence":"first","affiliation":[]}],"member":"2321","reference":[{"key":"key-10.3934\/amc.2020081-1","doi-asserted-by":"crossref","unstructured":"<p>S. Babbage, A space\/time tradeoff in exhaustive search attacks on stream ciphers, <i>European Convention on Security and Detection<\/i>, <b>408<\/b> (1995).<\/p>","DOI":"10.1049\/cp:19950490"},{"key":"key-10.3934\/amc.2020081-2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44448-3_1"},{"key":"key-10.3934\/amc.2020081-3","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44706-7_1"},{"key":"key-10.3934\/amc.2020081-4","unstructured":"<p>T. E. Bj\u00f8rstad, Cryptanalysis of grain using time\/memory\/data tradeoffs, (2008). Available from: <a href=\"http:\/\/www.ecrypt.eu.org\/stream\/grainp3.html\" target=\"_blank\">http:\/\/www.ecrypt.eu.org\/stream\/grainp3.html<\/a>.<\/p>"},{"key":"key-10.3934\/amc.2020081-5"},{"key":"key-10.3934\/amc.2020081-6","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2030467"},{"key":"key-10.3934\/amc.2020081-7","doi-asserted-by":"publisher","DOI":"10.1007\/s12095-015-0173-2"},{"key":"key-10.3934\/amc.2020081-8"},{"key":"key-10.3934\/amc.2020081-9"},{"key":"key-10.3934\/amc.2020081-10","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1980.1056220"},{"key":"key-10.3934\/amc.2020081-11","doi-asserted-by":"publisher","DOI":"10.1007\/11593447_19"},{"key":"key-10.3934\/amc.2020081-12","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2017.2773062"},{"key":"key-10.3934\/amc.2020081-13"},{"key":"key-10.3934\/amc.2020081-14","doi-asserted-by":"publisher","DOI":"10.1007\/s10998-012-4631-8"}],"container-title":["Advances in Mathematics of Communications"],"original-title":[],"link":[{"URL":"https:\/\/www.aimsciences.org\/article\/exportPdf?id=eda1043b-5613-43f5-b95f-7da4ad236cee","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T10:01:15Z","timestamp":1772791275000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.aimsciences.org\/\/article\/doi\/10.3934\/amc.2020081"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":14,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021]]}},"URL":"https:\/\/doi.org\/10.3934\/amc.2020081","relation":{},"ISSN":["1930-5346","1930-5338"],"issn-type":[{"value":"1930-5346","type":"print"},{"value":"1930-5338","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}