{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T13:49:13Z","timestamp":1766065753226},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540546207"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-46416-6_17","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T18:02:07Z","timestamp":1186423327000},"page":"186-199","source":"Crossref","is-referenced-by-count":75,"title":["Analysis of Pseudo Random Sequences Generated by Cellular Automata"],"prefix":"10.1007","author":[{"given":"Willi","family":"Meier","sequence":"first","affiliation":[]},{"given":"Othmar","family":"Staffelbach","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"I. Damg\u00e5rd, A Design Principle for Hash Functions, Advances in Cryptology\u2014Crypto\u201989, Proceedings, pp. 416\u2013427, Springer-Verlag, 1990.","DOI":"10.1007\/0-387-34805-0_39"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"W. Diffie, The First Ten Years of Public-Key Cryptography, Proceedings of the IEEE, pp. 560\u2013577, 1988.","DOI":"10.1109\/5.4442"},{"key":"17_CR3","doi-asserted-by":"publisher","first-page":"907","DOI":"10.1007\/BF00668821","volume":"25","author":"P. Grassberger","year":"1986","unstructured":"P. Grassberger, Toward a Quantitative Theory of Self-Generated Complexity, International Journal of Theoretical Physics, Vol. 25, pp. 907\u2013938, 1986.","journal-title":"International Journal of Theoretical Physics"},{"key":"17_CR4","unstructured":"U. Maurer, A Universal Statistical Test for Random Bit Generators, Proceedings of Crypto\u201990, Springer-Verlag, to appear."},{"key":"17_CR5","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","volume":"27","author":"C.E. Shannon","year":"1948","unstructured":"C.E. Shannon, A Mathematical Theory of Communication, Bell Syst. Tech. Journal, Vol. 27, pp. 379\u2013423, 623\u2013656, 1948.","journal-title":"Bell Syst. Tech. Journal"},{"key":"17_CR6","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1103\/PhysRevLett.55.449","volume":"55","author":"S. Wolfram","year":"1985","unstructured":"S. Wolfram, Origins of Randomness in Physical Systems, Physical Review Letters, Vol. 55, pp. 449\u2013452, 1985.","journal-title":"Physical Review Letters"},{"key":"17_CR7","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/0196-8858(86)90028-X","volume":"7","author":"S. Wolfram","year":"1986","unstructured":"S. Wolfram, Random Sequence Generation by Cellular Automata, Advances in Applied Mathematics 7, pp. 123\u2013169, 1986.","journal-title":"Advances in Applied Mathematics"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"S. Wolfram, Cryptography with Cellular Automata, Advances in Cryptology\u2014Crypto\u201985, Proceedings, pp. 429\u2013432, Springer-Verlag, 1986.","DOI":"10.1007\/3-540-39799-X_32"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201991"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-46416-6_17.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:11:22Z","timestamp":1605647482000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-46416-6_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540546207"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/3-540-46416-6_17","relation":{},"subject":[]}}