{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,15]],"date-time":"2025-01-15T05:16:26Z","timestamp":1736918186081,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540160762"},{"type":"electronic","value":"9783540397571"}],"license":[{"start":{"date-parts":[[1985,1,1]],"date-time":"1985-01-01T00:00:00Z","timestamp":473385600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1985]]},"DOI":"10.1007\/3-540-39757-4_28","type":"book-chapter","created":{"date-parts":[[2007,2,28]],"date-time":"2007-02-28T12:21:29Z","timestamp":1172665289000},"page":"399-415","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Time-Division Multiplexing Scramblers: Selecting Permutations and Testing the System"],"prefix":"10.1007","author":[{"given":"A.","family":"Ecker","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2000,12,1]]},"reference":[{"key":"28_CR1","volume-title":"Ciper Systems","author":"H. Beker","year":"1982","unstructured":"H. Beker and F. Piper: Ciper Systems. Northwood Books, London (1982)."},{"key":"28_CR2","volume-title":"Kryptographie","author":"Th. Beth","year":"1983","unstructured":"Th. Beth, P. He\u00df, K. Wirl: Kryptographie. Teubner, Stuttgart (1983)."},{"key":"28_CR3","first-page":"49","volume":"67","author":"G. Cohen","year":"1979","unstructured":"G. Cohen and M. Deza: Distances invariantes et L-cliques sur certains demigroupes finis. Math. Sci. Humaines 67, (1979), 49\u201369.","journal-title":"Math. Sci. Humaines"},{"key":"28_CR4","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/S0167-5060(08)70875-6","volume":"8","author":"G. Cohen","year":"1980","unstructured":"G. Cohen and M. Deza: Some metrical problems on Sn. Annuals of discrete math. 8, (1980), 211\u2013216.","journal-title":"Annuals of discrete math"},{"issue":"3","key":"28_CR5","doi-asserted-by":"crossref","first-page":"425","DOI":"10.4153\/CMB-1975-078-1","volume":"18","author":"J.L. Davison","year":"1975","unstructured":"J.L. Davison: A result on sums of squares. Cand. Math. Bull. 18(3), (1975), 425\u2013426.","journal-title":"Cand. Math. Bull."},{"issue":"1","key":"28_CR6","doi-asserted-by":"crossref","first-page":"71","DOI":"10.4153\/CMB-1977-012-0","volume":"20","author":"J.L. Davison","year":"1977","unstructured":"J.L. Davison: Some mappings associated with permutation groups. Canad. Math. Bull. 20(1), (1977), 71\u201375.","journal-title":"Canad. Math. Bull."},{"key":"28_CR7","doi-asserted-by":"crossref","first-page":"262","DOI":"10.1111\/j.2517-6161.1977.tb01624.x","volume":"B39-2","author":"P. Diaconis","year":"1977","unstructured":"P. Diaconis and R.L. Graham: Spearman\u2019s footrule as a measure of disarray. J. Roy. Statist. Soc. Ser. B39-2 (1977), 262\u2013268.","journal-title":"J. Roy. Statist. Soc. Ser."},{"key":"28_CR8","volume-title":"An Introduction to Probability Theory and Its Applications","author":"W. Feller","year":"1968","unstructured":"W. Feller: An Introduction to Probability Theory and Its Applications, Vol. 1, Wiley, New York (1968), 3rd edn..","edition":"3rd edn."},{"key":"28_CR9","doi-asserted-by":"publisher","first-page":"558","DOI":"10.1214\/aoms\/1177729545","volume":"22","author":"W. Hoeffding","year":"1951","unstructured":"W. Hoeffding: A combinatorial central limit theorem. Ann. Math. Statist. 22, (1951), 558\u2013566.","journal-title":"Ann. Math. Statist."},{"key":"28_CR10","volume-title":"Rank Correlation Methods","author":"M.G. Kendall","year":"1970","unstructured":"M.G. Kendall: Rank Correlation Methods. Griffin, London (1970), 4th edn..","edition":"4th edn."},{"key":"28_CR11","doi-asserted-by":"crossref","first-page":"199","DOI":"10.24033\/asens.1110","volume":"79","author":"M.R. Lagrange","year":"1962","unstructured":"M.R. Lagrange: Quelques r\u00e9sultats dans la m\u00e9trique des permutations. Ann. Sci. Ecole Norm. Sup. 79 (1962a), 199\u2013241.","journal-title":"Ann. Sci. Ecole Norm. Sup."},{"key":"28_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1007\/3-540-39466-4_6","volume-title":"Encryption by Random Rotations","author":"N.J.A. Sloane","year":"1983","unstructured":"N.J.A. Sloane: Encryption by Random Rotations. Lecture Notes in Computer Science Vol. 149, Springer Verlag (1983), pp. 71, Cryptography (Proc., Burg Feuerstein 1982, Ed. Th. Beth"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-39757-4_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,14]],"date-time":"2025-01-14T09:26:51Z","timestamp":1736846811000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-39757-4_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1985]]},"ISBN":["9783540160762","9783540397571"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/3-540-39757-4_28","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1985]]},"assertion":[{"value":"1 December 2000","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}