{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:34:18Z","timestamp":1725550458237},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540296737"},{"type":"electronic","value":"9783540320913"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11573036_66","type":"book-chapter","created":{"date-parts":[[2005,10,24]],"date-time":"2005-10-24T10:06:19Z","timestamp":1130148379000},"page":"695-704","source":"Crossref","is-referenced-by-count":0,"title":["A Deterministic Approach to Balancedness and Run Quantification in Pseudorandom Pattern Generators"],"prefix":"10.1007","author":[{"given":"Amparo","family":"F\u00faster-Sabater","sequence":"first","affiliation":[]},{"given":"Pino","family":"Caballero-Gil","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"66_CR1","unstructured":"Bluetooth, Specifications of the Bluetooth system, Version 1.1 (February 2001), available at \n                    \n                      http:\/\/www.bluetooth.com\/"},{"key":"66_CR2","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1016\/S0020-0190(02)00349-6","volume":"85","author":"A. F\u00faster-Sabater","year":"2003","unstructured":"F\u00faster-Sabater, A., Garc\u00eda-Mochales, P.: On the Balancedness of nonlinear generators of binary sequences. Information Processing Letters\u00a085, 111\u2013116 (2003)","journal-title":"Information Processing Letters"},{"key":"66_CR3","unstructured":"GSM, Global Systems for Mobile Communications, available at \n                    \n                      http:\/\/cryptome.org\/gsm-a512.htm"},{"key":"66_CR4","unstructured":"Golomb, S.W.: Shift Register-Sequences, Aegean Park Press, Laguna Hill (1982)"},{"key":"66_CR5","volume-title":"Logic and Discrete Mathematics","author":"W.K. Grassman","year":"1996","unstructured":"Grassman, W.K., Trembley, J.P.: Logic and Discrete Mathematics. Prentice-Hall, Englewood Cliffs (1996)"},{"key":"66_CR6","doi-asserted-by":"publisher","first-page":"1241","DOI":"10.1109\/18.508849","volume":"42","author":"A. Klapper","year":"1996","unstructured":"Klapper, A.: Large Families of Sequences with Near Optimal Correlations and Large Linear Span. IEEE Trans. on Information Theory\u00a042, 1241\u20131248 (1996)","journal-title":"IEEE Trans. on Information Theory"},{"key":"66_CR7","unstructured":"Mange, D.: Analysis and Synthesis of Logic Systems, Artech House, INC., Norwood (1986)"},{"key":"66_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"549","DOI":"10.1007\/3-540-46885-4_53","volume-title":"Advances in Cryptology - EUROCRYPT \u201989","author":"W. Meier","year":"1990","unstructured":"Meier, W., Staffelbach, O.: Nonlinearity criteria for cryptographic functions. In: Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol.\u00a0434, pp. 549\u2013562. Springer, Heidelberg (1990)"},{"key":"66_CR9","volume-title":"Handbook of Applied Cryptography","author":"A.J. Menezes","year":"1997","unstructured":"Menezes, A.J., et al.: Handbook of Applied Cryptography. CRC Press, New York (1997)"},{"key":"66_CR10","volume-title":"Digital Logic Circuit Analysis and Design","author":"V.P. Nelson","year":"1995","unstructured":"Nelson, V.P., et al.: Digital Logic Circuit Analysis and Design. Prentice-Hall International, Englewood Cliffs (1995)"},{"key":"66_CR11","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-82865-2","volume-title":"Analysis and Design of Stream Ciphers","author":"R.A. Rueppel","year":"1986","unstructured":"Rueppel, R.A.: Analysis and Design of Stream Ciphers. Springer, New York (1986)"},{"key":"66_CR12","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1011264815860","volume":"23","author":"I.E. Shparlinski","year":"2001","unstructured":"Shparlinski, I.E.: On the Linear Complexity of the Power Generator, Design. Codes and Cryptography\u00a023, 5\u201310 (2001)","journal-title":"Codes and Cryptography"},{"volume-title":"Contemporary Cryptology: The Science of Information Integrity","year":"1991","key":"66_CR13","unstructured":"Simmons, G.J. (ed.): Contemporary Cryptology: The Science of Information Integrity. IEEE Press, New York (1991)"}],"container-title":["Lecture Notes in Computer Science","Advances in Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11573036_66.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:41:05Z","timestamp":1619505665000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11573036_66"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540296737","9783540320913"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/11573036_66","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}