{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:24:43Z","timestamp":1725488683795},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540546207"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-46416-6_15","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T14:02:07Z","timestamp":1186408927000},"page":"168-175","source":"Crossref","is-referenced-by-count":10,"title":["Linear Complexity of Periodically Repeated Random Sequences"],"prefix":"10.1007","author":[{"given":"Zong-Duo","family":"Dai","sequence":"first","affiliation":[]},{"given":"Jun-Hui","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","volume-title":"Ciper Systems","author":"H. Beker","year":"1982","unstructured":"H. Beker and F. Piper, \u201cCiper Systems\u201d, Northwood Books, London, 1982."},{"unstructured":"D. Gollman, \u201cLinear Complexity of Sequences with Period p\n                  n\u201d, Eurocrypt\u201986, A Workshop on the Theory and Application of Chryptographic Techniques, May 20\u201322, 1986, in Linkoping, Sweden, pp. 3.2\u20133.3.","key":"15_CR2"},{"key":"15_CR3","volume-title":"An Introduction To The Theory of Numbers","author":"G. H. Hardy","year":"1938","unstructured":"G. H. Hardy and E. M. Wright, \u201cAn Introduction To The Theory of Numbers\u201d, Oxford, The Clarendon Press, 1938."},{"key":"15_CR4","volume-title":"Encyclopaedia of Mathematics and its Applications","author":"R. Lidl","year":"1983","unstructured":"R. Lidl and H. Niederreiter, \u201cFinite Fields\u201d, Encyclopaedia of Mathematics and its Applications\n                  20, Reading, Mass, Addison-Wesley, 1983."},{"key":"15_CR5","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/TIT.1969.1054260","volume":"IT-15","author":"J. L. Massey","year":"1969","unstructured":"J. L. Massey, \u201cShift-Register Synthesis and BCH decoding\u201d, IEEE Trans. on Info. Theory, Vol. IT-15, pp. 122\u2013127, Jan. 1969.","journal-title":"IEEE Trans. on Info. Theory"},{"key":"15_CR6","volume-title":"New Approaches to Stream Ciphers","author":"R. A. Rueppel","year":"1984","unstructured":"R. A. Rueppel, \u201cNew Approaches to Stream Ciphers\u201d, Ph.D.dissertation, Inst. of Telecommunications, Swiss Federal Inst. of Technol., Zurich, Dec. 1984."},{"unstructured":"R. A. Rueppel, \u201cLinear Complexity and Random Sequences\u201d, Presented at Eurocrypt\u201985","key":"15_CR7"},{"key":"15_CR8","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-82865-2","volume-title":"Analysis and Design of Stream Ciphers","author":"R. A. Rueppel","year":"1986","unstructured":"R. A. Rueppel, \u201cAnalysis and Design of Stream Ciphers\u201d, Springer, Berlin-Heidelberg-New York-London-Paris-Tokyo: Springer-Verlag. 1986."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201991"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-46416-6_15.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T16:11:21Z","timestamp":1605629481000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-46416-6_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540546207"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/3-540-46416-6_15","relation":{},"subject":[]}}