{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T10:17:03Z","timestamp":1776766623884,"version":"3.51.2"},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540673804","type":"print"},{"value":"9783540455684","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/10719994_5","type":"book-chapter","created":{"date-parts":[[2006,12,30]],"date-time":"2006-12-30T20:38:40Z","timestamp":1167511120000},"page":"53-59","source":"Crossref","is-referenced-by-count":5,"title":["Non-linear Complexity of the Naor\u2013Reingold Pseudo-random Function"],"prefix":"10.1007","author":[{"given":"William D.","family":"Banks","sequence":"first","affiliation":[]},{"given":"Frances","family":"Griffin","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Lieman","sequence":"additional","affiliation":[]},{"given":"Igor E.","family":"Shparlinski","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","volume-title":"Stream Ciphers and Number Theory","author":"T.W. Cusick","year":"1998","unstructured":"Cusick, T.W., Ding, C., Renvall, A.: Stream Ciphers and Number Theory. Elsevier, Amsterdam (1998)"},{"key":"5_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1007\/978-3-540-47942-0_25","volume-title":"Information and Communication Security","author":"F. Griffin","year":"1999","unstructured":"Griffin, F., Shparlinski, I.E.: On the linear complexity of the Naor-Reingold pseudo-random function. In: Varadharajan, V., Mu, Y. (eds.) ICICS 1999. LNCS, vol.\u00a01726, pp. 301\u2013308. Springer, Heidelberg (1999)"},{"key":"5_CR3","doi-asserted-by":"publisher","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Cryptography","author":"A.J. Menezes","year":"1996","unstructured":"Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Cryptography. CRC Press, Boca Raton (1996)"},{"key":"5_CR4","first-page":"458","volume-title":"Proc. 38th IEEE Symp. on Foundations of Comp. Sci. (FOCS 1997)","author":"M. Naor","year":"1997","unstructured":"Naor, M., Reingold, O.: Number-theoretic constructions of effcient pseudo- random functions. In: Proc. 38th IEEE Symp. on Foundations of Comp. Sci (FOCS 1997), Miami Beach, pp. 458\u2013467. IEEE, Los Alamitos (1997)"},{"key":"5_CR5","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1007\/978-1-4471-0551-0_5","volume-title":"Proc. Intern. Conf. on Sequences and their Applications (SETA 1998)","author":"H. Niederreiter","year":"1999","unstructured":"Niederreiter, H.: Some computable complexity measures for binary sequences. In: Ding, C., Helleseth, T., Niederreiter, H. (eds.) Proc. Intern. Conf. on Sequences and their Applications (SETA 1998), Singapore, pp. 67\u201378. Springer, London (1999)"},{"key":"5_CR6","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1006\/jcom.1997.0451","volume":"13","author":"H. Niederreiter","year":"1996","unstructured":"Niederreiter, H., Vielhaber, M.: Linear complexity profiles: Hausdorff dimen- sion for almost perfect profiles and measures for general profiles. J. Compl.\u00a013, 353\u2013383 (1996)","journal-title":"J. Compl."},{"key":"5_CR7","first-page":"65","volume-title":"Contemporary Cryptology: The Science of In- formation Integrity","author":"R.A. Rueppel","year":"1992","unstructured":"Rueppel, R.A.: Stream ciphers. In: Contemporary Cryptology: The Science of In- formation Integrity, pp. 65\u2013134. IEEE Press, NY (1992)"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Shparlinski, I.E.: On the uniformity of distribution of the Naor\u2013Reingold pseudo-random function. Finite Fields and Their Appl (to appear)","DOI":"10.1006\/ffta.2000.0291"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Shparlinski, I.E.: On the Naor\u2013Reingold pseudo-random function from elliptic curves, pp. 1\u20139 (1999) (preprint)","DOI":"10.1007\/s002000000023"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology - ICISC\u201999"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/10719994_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,23]],"date-time":"2019-04-23T11:58:47Z","timestamp":1556020727000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/10719994_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540673804","9783540455684"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/10719994_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2000]]}}}