{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T11:39:09Z","timestamp":1742384349443},"publisher-location":"Berlin, Heidelberg","reference-count":3,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540160762"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-39757-4_8","type":"book-chapter","created":{"date-parts":[[2007,2,28]],"date-time":"2007-02-28T07:21:29Z","timestamp":1172647289000},"page":"74-87","source":"Crossref","is-referenced-by-count":7,"title":["Linear Ciphers and Random Sequence Generators with Multiple Clocks"],"prefix":"10.1007","author":[{"given":"James L.","family":"Massey","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Rainer A.","family":"Rueppel","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"8_CR1","series-title":"CISM Courses and Lectures","first-page":"1","volume-title":"Coding and Complexity","author":"J.L. Massey","year":"1975","unstructured":"J.L. Massey, \u201cError Bounds for Tree Codes, Trellis Codes, and Convolutional Codes with Encoding and Decoding Procedures\u201d, pp.1\u201357 in Coding and Complexity (Ed. G. Longo), CISM Courses and Lectures No. 216, Springer-Verlag, Vienna and New York, 1975."},{"key":"8_CR2","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C.E. Shannon","year":"1949","unstructured":"C.E. Shannon, \u201cCommunication Theory of Secrecy Systems\u201d, Bell System Tech. J., vol. 28, pp.656\u2013715, October 1949.","journal-title":"Bell System Tech. J."},{"key":"8_CR3","doi-asserted-by":"publisher","first-page":"732","DOI":"10.1109\/TIT.1976.1055626","volume":"IT-22","author":"E.L. Key","year":"1976","unstructured":"E.L. Key, \u201cAn Analysis of the Structure and Complexity of Nonlinear Binary Sequence Generators\u201d, IEEE Trans. Info. Th., vol. IT-22, pp.732\u2013736, Nov. 1976.","journal-title":"IEEE Trans. Info. Th."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-39757-4_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T21:22:26Z","timestamp":1619558546000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-39757-4_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540160762"],"references-count":3,"URL":"https:\/\/doi.org\/10.1007\/3-540-39757-4_8","relation":{},"subject":[]}}