{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,22]],"date-time":"2025-03-22T09:02:51Z","timestamp":1742634171949},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540002635"},{"type":"electronic","value":"9783540362319"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-36231-2_3","type":"book-chapter","created":{"date-parts":[[2007,7,2]],"date-time":"2007-07-02T11:21:45Z","timestamp":1183375305000},"page":"22-33","source":"Crossref","is-referenced-by-count":11,"title":["A New Class of Stream Ciphers Combining LFSR and FCSR Architectures"],"prefix":"10.1007","author":[{"given":"Fran\u00e7ois","family":"Arnault","sequence":"first","affiliation":[]},{"given":"Thierry P.","family":"Berger","sequence":"additional","affiliation":[]},{"given":"Abdelkader","family":"Necer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,12,18]]},"reference":[{"key":"3_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1007\/3-540-48329-2_3","volume-title":"Advances Cryptology, CRYPTO\u201993","author":"D. Coppersmith","year":"1994","unstructured":"D. Coppersmith, H Krawczyk, Y. Mansour. The Shrinking Generator, Lecture notes in computer science (773), Advances Cryptology, CRYPTO\u201993. Springer Verlag 1994, 22\u201339"},{"key":"3_CR2","unstructured":"M. Goresky, A. Klapper Fibonacci and Galois Representation of Feedback with Carry Shift Registers, preprint, October 27, 2000."},{"key":"3_CR3","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/s001459900024","volume":"10","author":"A. Klapper","year":"1997","unstructured":"A. Klapper, M. Goresky, Feedback Shift Registers, 2-Adic Span, and Combiners With Memory, Journal of Cryptology (10), (1997) 111\u2013147.","journal-title":"Journal of Cryptology"},{"key":"3_CR4","series-title":"Lect Notes Comput Sci","first-page":"262","volume-title":"Advances in Cryptology, CRYPTO\u201995","author":"M. Goresky","year":"1995","unstructured":"M. Goresky, A. Klapper Cryptanalysis based on 2-adic Rational Approximation, Lecture notes in computer science (963), Advances in Cryptology, CRYPTO\u201995, Springer Verlag 1995, 262\u2013274"},{"key":"3_CR5","unstructured":"N. Koblitz p-adic Numbers, p-adic analysis and Zeta-Functions, Springer-Verlag 1997."},{"key":"3_CR6","unstructured":"F. J. Macwilliams, N. J. A. Sloane The theory of Error Correcting Codes, North-Holland 1986."},{"key":"3_CR7","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/TIT.1969.1054260","volume":"IT-15","author":"J. L. Massey","year":"1969","unstructured":"J. L. Massey Shift register synthesis and BCH decoding, IEEE Trans. Inform. Theory, vol IT-15, 122\u2013127, 1969.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"3_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"458","DOI":"10.1007\/3-540-46416-6_39","volume-title":"Advances in Cryptology, EUROCRYPT\u2019 91","author":"U. M. Maurer","year":"1991","unstructured":"U. M. Maurer New approaches of the Design of Self-Synchronizing Stream Ciphers, Lecture Notes in Computer Science (547), Advances in Cryptology, EUROCRYPT\u2019 91, Springer-Verlag 1991, 458\u2013471."},{"issue":"1","key":"3_CR9","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/BF00191322","volume":"5","author":"J. W. Meier","year":"1992","unstructured":"J. W. Meier, O. Staffelbach Correlation properties of combiners with memory in stream ciphers, Journal of Cryptology, vol.5, n.1, 1992, 67\u201386.","journal-title":"Journal of Cryptology"},{"key":"3_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1007\/3-540-68339-9_4","volume-title":"Advances in Cryptology, Eurocrypt 96","author":"J. Patarin","year":"1996","unstructured":"J. Patarin Hidden Field Equations (HFE) and Isomorphisms of Polynomials (IP): two new families of asymmetric algorithms, Advances in Cryptology, Eurocrypt 96, Springer LNCS 1070, 33\u201348"},{"key":"3_CR11","series-title":"Lect Notes Comput Sci","first-page":"260","volume-title":"Advances in Cryptology, CRYPTO\u201985","author":"R. A. Rueppel","year":"1985","unstructured":"R. A. Rueppel, Correlation immunity and the summation generator, Lecture Notes in Computer Science (218), Advances in Cryptology, CRYPTO\u201985, Springer-Verlag 1985, 260\u2013272."},{"key":"3_CR12","series-title":"Lect Notes Comput Sci","first-page":"167","volume-title":"Linear complexity of random sequences","author":"R. A. Rueppel","year":"1985","unstructured":"R. A. Rueppel, Linear complexity of random sequences, Lecture Notes in Computer Science (219, Proc. of Eurocrypt\u201985, 167\u2013188)"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"N. Zierler, Linear recurring Sequences, J. Soc. Indust. Appl. Math., Vol. 7, 1958.","DOI":"10.1137\/0107003"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2014 INDOCRYPT 2002"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36231-2_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,12]],"date-time":"2023-05-12T16:27:34Z","timestamp":1683908854000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36231-2_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540002635","9783540362319"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/3-540-36231-2_3","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}