{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:56:17Z","timestamp":1725558977805},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540258629"},{"type":"electronic","value":"9783540320456"}],"license":[{"start":{"date-parts":[[2005,1,1]],"date-time":"2005-01-01T00:00:00Z","timestamp":1104537600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11424857_79","type":"book-chapter","created":{"date-parts":[[2010,7,13]],"date-time":"2010-07-13T19:49:45Z","timestamp":1279050585000},"page":"719-728","source":"Crossref","is-referenced-by-count":0,"title":["A Simple Acceptance\/Rejection Criterium for Sequence Generators in Symmetric Cryptography"],"prefix":"10.1007","author":[{"given":"Amparo","family":"F\u00faster-Sabater","sequence":"first","affiliation":[]},{"given":"Pino","family":"Caballero-Gil","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"79_CR1","unstructured":"Bluetooth. Specifications of the Bluetooth system, Version 1.1 (February 2001), available at, \n                    \n                      http:\/\/www.bluetooth.com\/"},{"key":"79_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1007\/3-540-48329-2_3","volume-title":"Advances in Cryptology - CRYPTO \u201993","author":"D. Coppersmith","year":"1994","unstructured":"Coppersmith, D., Krawczyk, H., Mansour, Y.: The Shrinking Generator. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol.\u00a0773, pp. 22\u201339. Springer, Heidelberg (1994)"},{"key":"79_CR3","unstructured":"CRYPTREC project- cryptographic evaluation for Japanese Electronic Government, \n                    \n                      www.ipa.go.jp\/security\/enc\/CRYPTREC\/index-e.html"},{"key":"79_CR4","volume-title":"Shift Register-Sequences","author":"S.W. Golomb","year":"1982","unstructured":"Golomb, S.W.: Shift Register-Sequences. Aegean Park Press, Laguna Hill (1982)"},{"key":"79_CR5","unstructured":"GSM, Global Systems for Mobile Communications, available at, \n                    \n                      http:\/\/cryptome.org\/gsm-a512.htm"},{"key":"79_CR6","volume-title":"Introduction to Finite Fields and Their Applications","author":"R. Lidl","year":"1986","unstructured":"Lidl, R., Niederreiter, H.: Introduction to Finite Fields and Their Applications. Cambridge University Press, Cambridge (1986)"},{"key":"79_CR7","unstructured":"Mange, D.: Analysis and Synthesis of Logic Systems. Artech House, INC., Norwood (1986)"},{"key":"79_CR8","volume-title":"Handbook of Applied Cryptography","author":"A.J. Menezes","year":"1997","unstructured":"Menezes, A.J., et al.: Handbook of Applied Cryptography. CRC Press, New York (1997)"},{"key":"79_CR9","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-82865-2","volume-title":"Analysis and Design of Stream Ciphers","author":"R.A. Rueppel","year":"1986","unstructured":"Rueppel, R.A.: Analysis and Design of Stream Ciphers. Springer, New York (1986)"},{"volume-title":"Contemporary Cryptology: The Science of Information Integrity","year":"1991","key":"79_CR10","unstructured":"Simmons, G.J. (ed.): Contemporary Cryptology: The Science of Information Integrity. IEEE Press, New York (1991)"},{"key":"79_CR11","doi-asserted-by":"publisher","first-page":"1370","DOI":"10.1049\/el:20001009","volume":"36","author":"L. Wang","year":"2000","unstructured":"Wang, L., Almani, A.E.: Fast conversion algorithm for very large Boolean functions. Electron. Lett.\u00a036, 1370\u20131371 (2000)","journal-title":"Electron. Lett."}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2005"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11424857_79","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T16:09:56Z","timestamp":1558282196000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11424857_79"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540258629","9783540320456"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/11424857_79","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}