{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T16:34:44Z","timestamp":1725467684261},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540647324"},{"type":"electronic","value":"9783540691013"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/bfb0053729","type":"book-chapter","created":{"date-parts":[[2006,7,6]],"date-time":"2006-07-06T14:57:43Z","timestamp":1152197863000},"page":"147-158","source":"Crossref","is-referenced-by-count":28,"title":["A probabilistic correlation attack on the shrinking generator"],"prefix":"10.1007","author":[{"given":"L.","family":"Simpson","sequence":"first","affiliation":[]},{"given":"J. Dj.","family":"Goli\u0107","sequence":"additional","affiliation":[]},{"given":"E.","family":"Dawson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,5,23]]},"reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"D. Coppersmith, H. Krawczyk and Y. Mansour. The shrinking generator. Advances in Cryptology \u2014 CRYPTO '93, volume 773 of Lecture Notes in Computer Science, pages 22\u201339. Springer-Verlag, 1993.","DOI":"10.1007\/3-540-48329-2_3"},{"issue":"3","key":"14_CR2","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/BF00196912","volume":"3","author":"J. D. Goli\u0107","year":"1991","unstructured":"J. Dj. Goli\u0107 and M. J. Mihaljevi\u0107. A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance. Journal of Cryptology, 3(3):201\u2013212, 1991.","journal-title":"Journal of Cryptology"},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"J. Dj. Goli\u0107 and L. O'Connor. Embedding and probabilistic correlation attacks on clock-controlled shift registers. Advances in Cryptology \u2014 EUROCRYPT '94, volume 950 of Lecture Notes in Computer Science, pages 230\u2013243. Springer-Verlag, 1994.","DOI":"10.1007\/BFb0053439"},{"key":"14_CR4","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/TIT.1969.1054260","volume":"IT-15","author":"J. L. Massey","year":"1969","unstructured":"J. L. Massey. Shift-register synthesis and BCH decoding. IEEE Trans. Inform. Theory, IT-15:122\u2013127, Jan. 1969.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"14_CR5","volume-title":"C the Complete Reference","author":"H. Schildt","year":"1990","unstructured":"H. Schildt. C the Complete Reference. Osborne McGraw-Hill, Berkeley, CA, 1990."},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"K. C. Zeng, C. H. Yang,, and T. R. N. Rao. On the linear consistency test (LCT) in cryptanalysis and its applications. Advances in Cryptology \u2014 CRYPTO '89, volume 434 of Lecture Notes in Computer Science, pages 164\u2013174. Springer-Verlag, 1990.","DOI":"10.1007\/0-387-34805-0_16"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0053729","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,19]],"date-time":"2019-04-19T21:22:17Z","timestamp":1555708937000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0053729"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540647324","9783540691013"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/bfb0053729","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1998]]}}}