{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T01:40:07Z","timestamp":1737078007934,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540007166"},{"type":"electronic","value":"9783540365525"}],"license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36552-4_15","type":"book-chapter","created":{"date-parts":[[2007,6,6]],"date-time":"2007-06-06T23:22:37Z","timestamp":1181172157000},"page":"213-226","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Balanced Shrinking Generators"],"prefix":"10.1007","author":[{"given":"Se","family":"Ah Choi","sequence":"first","affiliation":[]},{"given":"Kyeongcheol","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,3,14]]},"reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"N. Alon, O. Gollreich, J. Hastad, and R. Peralta, \u201cSimple constructions of almost k-wise independent random variables,\u201d 31th Annual Symposium on Foundations of Computer Science, St. Louis, Missouri, pp. 544\u2013553, 1990. 221","DOI":"10.1109\/FSCS.1990.89575"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"S.R. Blackburn, \u201cThe linear complexity of the self-shrinking generator,\u201d IEEE Trans. on Inform. Theory, IT-45, no. 6, pp. 2073\u20132077, September 1999. 218","DOI":"10.1109\/18.782139"},{"key":"15_CR3","series-title":"Lect Notes Comput Sci","first-page":"22","volume-title":"Cryptology-CRYPTO\u201993","author":"D. Coppersmith","year":"1993","unstructured":"D. Coppersmith, H. Krawczyk, and Y. Mansour, \u201cThe shrinking generator,\u201d Advanced in Cryptology-CRYPTO\u201993, Lecture Notes in Computer Science, vol. 773, pp. 22\u201339, 1993. 213, 217, 220, 221, 222"},{"key":"15_CR4","unstructured":"S.W. Golomb, Shift Resister Sequences, Aegean Park Press, 1982. 214, 218"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"E. Kushilevitx and Y. Mansour, \u201cLearning decision trees using the fourier spectrum,\u201d Proceedings of the 23th Annual ACM Symposium on Theory of Computing, pp. 455\u2013464, May. 1991. 222","DOI":"10.1145\/103418.103466"},{"key":"15_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/BFb0053436","volume-title":"Cryptology-EUROCRYPT\u201994","author":"W. Meier","year":"1995","unstructured":"W. Meier and O. Staffelbach, \u201cThe self-shrinking generator,\u201d Advanced in Cryptology-EUROCRYPT\u201994, Lecture Notes in Computer Science, vol. 950, pp. 205\u2013214, 1995. 213, 215"},{"key":"15_CR7","unstructured":"A. J. Menezes, P.C. Oorshot, S.A. Vanstone, Handbook of Applied Cryptography, CRC Press, 1997. 213"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"R.A. Rueppel,Analysis and Design of Stream Ciphers, Springer-Verlag, 1986. 213","DOI":"10.1007\/978-3-642-82865-2"},{"key":"15_CR9","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1023\/A:1011256430812","volume":"23","author":"I. Shparlinski","year":"2001","unstructured":"I. Shparlinski, \u201cOn some properties of the shrinking generator,\u201d Designs, Codes and Cryptography, vol. 23, pp. 147\u2013156, 2001. 215","journal-title":"Designs, Codes and Cryptography"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"T. Siegenthaler, \u201cCorrelation-immunity of nonlinear combining functions for cryptographic applications,\u201d IEEE Transactions on Information Theory, IT-30, pp. 776\u2013780, Sept. 1984.","DOI":"10.1109\/TIT.1984.1056949"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology \u2014 ICISC 2002"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36552-4_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T01:10:12Z","timestamp":1737076212000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36552-4_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540007166","9783540365525"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/3-540-36552-4_15","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]},"assertion":[{"value":"14 March 2003","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}