{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,20]],"date-time":"2023-10-20T04:34:32Z","timestamp":1697776472582},"reference-count":6,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2006,11,13]],"date-time":"2006-11-13T00:00:00Z","timestamp":1163376000000},"content-version":"vor","delay-in-days":11274,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Mathematical Logic Qtrly"],"published-print":{"date-parts":[[1976,1]]},"DOI":"10.1002\/malq.19760220161","type":"journal-article","created":{"date-parts":[[2007,5,26]],"date-time":"2007-05-26T02:57:11Z","timestamp":1180148231000},"page":"517-522","source":"Crossref","is-referenced-by-count":0,"title":["The Boolean (k, m, p<sub>1<\/sub>,\u2026, p<sub>m<\/sub>)\u2010Shift\u2010Registers I"],"prefix":"10.1002","volume":"22","author":[{"given":"Zdzislaw","family":"Grodzki","sequence":"first","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2006,11,13]]},"reference":[{"key":"e_1_2_1_2_2","first-page":"367","volume-title":"Moderm applied algebra","author":"Birkhoff G."},{"key":"e_1_2_1_3_2","first-page":"99","article-title":"How to protect data with ciphers that are really to break","volume":"46","author":"Geffe P. R.","year":"1973","journal-title":"Electronics"},{"key":"e_1_2_1_4_2","first-page":"24","volume-title":"Shift\u2010register sequences","author":"Golomb S. W.","year":"1967"},{"key":"e_1_2_1_5_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(72)80002-0"},{"key":"e_1_2_1_6_2","first-page":"296","volume-title":"Discrete mathematical structures and their applications","author":"Stone H. S.","year":"1973"},{"key":"e_1_2_1_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/PGEC.1963.263465"}],"container-title":["Mathematical Logic Quarterly"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fmalq.19760220161","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/malq.19760220161","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,19]],"date-time":"2023-10-19T14:39:03Z","timestamp":1697726343000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/malq.19760220161"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1976,1]]},"references-count":6,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1976,1]]}},"alternative-id":["10.1002\/malq.19760220161"],"URL":"https:\/\/doi.org\/10.1002\/malq.19760220161","archive":["Portico"],"relation":{},"ISSN":["0942-5616","1521-3870"],"issn-type":[{"value":"0942-5616","type":"print"},{"value":"1521-3870","type":"electronic"}],"subject":[],"published":{"date-parts":[[1976,1]]}}}