{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T13:03:18Z","timestamp":1772283798705,"version":"3.50.1"},"publisher-location":"New York, NY","reference-count":15,"publisher":"Springer New York","isbn-type":[{"value":"9780387973173","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/0-387-34805-0_10","type":"book-chapter","created":{"date-parts":[[2007,11,9]],"date-time":"2007-11-09T02:05:53Z","timestamp":1194573953000},"page":"90-99","source":"Crossref","is-referenced-by-count":32,"title":["The Shortest Feedback Shift Register That Can Generate A Given Sequence"],"prefix":"10.1007","author":[{"given":"Cees J. A.","family":"Jansen","sequence":"first","affiliation":[]},{"given":"Dick E.","family":"Boekee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"10_CR1","doi-asserted-by":"publisher","first-page":"971","DOI":"10.1214\/aos\/1176350045","volume":"14","author":"R. Arratia","year":"1986","unstructured":"R. Arratia, L. Gordon and M. S. Waterman. \u201cAn Extreme Value Theory for Sequence Matching\u201d, The Annals of Statistics, vol. 14, no. 3, pp. 971\u2013993, 1986.","journal-title":"The Annals of Statistics"},{"key":"10_CR2","first-page":"12","volume":"21","author":"A. Blumer","year":"1983","unstructured":"A. Blumer, J. Blumer, A. Ehrenfeucht, D. Haussler and R. McConnell. \u201cLinear Size Finite Automata for the Set of all Subwords of a Word: An Outline of Results\u201d, Bul. Eur. Assoc. Theor. Comp. Sci., no. 21, pp. 12\u201320, 1983.","journal-title":"Bul. Eur. Assoc. Theor. Comp. Sci."},{"key":"10_CR3","volume-title":"Security for Computer Networks","author":"D. W. Davies","year":"1984","unstructured":"D. W. Davies and W. L. Price. Security for Computer Networks, John Wiley & Sons, Inc., Chichester, 1984."},{"key":"10_CR4","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1137\/1024041","volume":"24","author":"H. Fredricksen. \u201c","year":"1982","unstructured":"H. Fredricksen. \u201cA survey of full-length nonlinear shift register cycle algorithms\u201d, SIAM Rev., vol. 24, pp. 195\u2013221, April 1982.","journal-title":"SIAM Rev."},{"key":"10_CR5","volume-title":"Shift Register Sequences","author":"S. W. Golomb","year":"1967","unstructured":"S. W. Golomb. Shift Register Sequences, Holden-Day Inc., San Francisco, 1967."},{"key":"10_CR6","volume-title":"Investigations On Nonlinear Streamcipher Systems: Construction and Evaluation Methods","author":"C. J. A. Jansen","year":"1989","unstructured":"C. J. A. Jansen. Investigations On Nonlinear Streamcipher Systems: Construction and Evaluation Methods, PhD. Thesis, Technical University of Delft, Delft, 1989."},{"key":"10_CR7","doi-asserted-by":"publisher","first-page":"5660","DOI":"10.1073\/pnas.80.18.5660","volume":"80","author":"S. Karlin","year":"1983","unstructured":"S. Karlin, G. Ghandour, F. Ost, S. Tavare and L. J. Korn. \u201cNew Approaches for Computer Analysis of Nucleic Acid Sequences\u201d, Proc. Natl. Acad. Sci. USA, vol. 80, pp. 5660\u20135664, September 1983.","journal-title":"Proc. Natl. Acad. Sci. USA"},{"key":"10_CR8","volume-title":"Cryptography","author":"A. G. Konheim","year":"1981","unstructured":"A. G. Konheim. Cryptography, John Wiley & Sons, Inc., New York, 1981."},{"issue":"1","key":"10_CR9","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1109\/TIT.1976.1055501","volume":"IT-22","author":"A. Lempel","year":"1976","unstructured":"A. Lempel and J. Ziv. \u201cOn the Complexity of Finite Sequences\u201d, IEEE Trans. on Info. Theory, vol. IT-22, no. 1, pp. 75\u201381, January 1976.","journal-title":"IEEE Trans. on Info. Theory"},{"key":"10_CR10","volume-title":"The Theory of Error Correcting Codes","author":"F. J. MacWilliams","year":"1978","unstructured":"F. J. MacWilliams and N. J. A. Sloane. The Theory of Error Correcting Codes, Amsterdam, North-Holland, 1978."},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"J. L. Massey. \u201cShift-Register Synthesis and BCH Decoding\u201d, IEEE Trans. on Info. Theory, vol. IT-15, January 1969.","DOI":"10.1109\/TIT.1969.1054260"},{"key":"10_CR12","volume-title":"Cryptography: A New Dimension in Computer Data Security","author":"C. H. Meyer","year":"1982","unstructured":"C. H. Meyer and S. M. Matyas. Cryptography: A New Dimension in Computer Data Security, John Wiley & Sons, New York, 1982."},{"issue":"2","key":"10_CR13","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1145\/321941.321946","volume":"23","author":"E. M. McCreight. \u201c","year":"1976","unstructured":"E. M. McCreight. \u201cA space-economical suffix tree construction algorithm\u201d, JACM, vol. 23, no. 2, pp. 262\u2013272, April 1976.","journal-title":"JACM"},{"key":"10_CR14","volume-title":"New Approaches to Stream Ciphers","author":"R. A. Rueppel","year":"1984","unstructured":"R. A. Rueppel. New Approaches to Stream Ciphers, PhD. Thesis, Swiss Federal Institute of Technology, Zurich, 1984."},{"key":"10_CR15","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C. E. Shannon. \u201c","year":"1949","unstructured":"C. E. Shannon. \u201cCommunication Theory of Secrecy Systems\u201d, Bell Systems Technical Journal, vol. 28, pp. 656\u2013715, October 1949.","journal-title":"Bell Systems Technical Journal"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO\u2019 89 Proceedings"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-387-34805-0_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T05:28:00Z","timestamp":1619501280000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-387-34805-0_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387973173"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/0-387-34805-0_10","relation":{},"subject":[]}}