{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:20:51Z","timestamp":1725495651623},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540534334"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-46885-4_51","type":"book-chapter","created":{"date-parts":[[2007,11,15]],"date-time":"2007-11-15T14:15:56Z","timestamp":1195136156000},"page":"533-543","source":"Crossref","is-referenced-by-count":6,"title":["On the Complexity of Pseudo-Random Sequences - or: If You Can Describe a Sequence It Can\u2019t be Random"],"prefix":"10.1007","author":[{"given":"Thomas","family":"Beth","sequence":"first","affiliation":[]},{"given":"Zong-Duo","family":"Dai","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Beker, H., Piper, F.: Cipher Systems, Northwood, 1982.","key":"51_CR1"},{"unstructured":"Berlekamp, E.R.: Coding Theory, McGraw-Hill, 1968.","key":"51_CR2"},{"unstructured":"Beth, T., Gollmann, D.: Vorlesungsmanuskript: Signale, Codes und Chiffren, 1988","key":"51_CR3"},{"doi-asserted-by":"crossref","unstructured":"Beth, He\u00df, Wirl: Kryptographie, Teubner 1983.","key":"51_CR4","DOI":"10.1007\/3-540-39466-4"},{"unstructured":"Blahut, R.E.: Theory and Practice of Error Control Codes, Addison-Wesley, 1983.","key":"51_CR5"},{"unstructured":"Breim\u00e0n, L.: Probability, Addison-Wesley, 1968.","key":"51_CR6"},{"doi-asserted-by":"crossref","unstructured":"Fumy, W., Rie\u00df, H.P.: Kryptographie, Oldenburg, 1988.","key":"51_CR7","DOI":"10.1515\/juru.1988.1988.4.133"},{"unstructured":"Gollmann, D.: Kaskadenschaltungen taktgesteuerter Schieberegister als Pseudozufallsgeneratoren, Dissertation Universit\u00e4t Linz, 1983.","key":"51_CR8"},{"unstructured":"Hopcroft, F.E.; Ullman, F.D.: Introduction to Automata Theory, Languages and Computation, Addison-Wesley, 1979.","key":"51_CR9"},{"key":"51_CR10","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/TIT.1969.1054260","volume":"15","author":"J.L. Massey","year":"1969","unstructured":"Massey, J.L.: Shift Register Synthesis and BCH Decoding, IEEE Trans. on Information Theory, 15 (1969), pp 122\u2013127.","journal-title":"IEEE Trans. on Information Theory"},{"unstructured":"Micali, S.; Schnorr, C.P.: Efficient, Perfect Random Number Generators, June 1988.","key":"51_CR11"},{"key":"51_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1007\/3-540-45961-8_17","volume-title":"Proc. Eurocrypt 88","author":"H. Niederreiter","year":"1988","unstructured":"Niederreiter, H.: The Probabilistic Theory of Linear Complexity, Proc. Eurocrypt 88, LNCS 330, p. 191\u2013209."},{"doi-asserted-by":"crossref","unstructured":"Rueppel, R.: Analysis and Design of Stream Ciphers, Springer, 1986.","key":"51_CR13","DOI":"10.1007\/978-3-642-82865-2"},{"doi-asserted-by":"crossref","unstructured":"Schnorr, C.P.: On the Construction of Random Number Generators and Random Function Generators, Eurocrypt 1988, Davos.","key":"51_CR14","DOI":"10.1007\/3-540-45961-8_19"},{"key":"51_CR15","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1007\/BF00289514","volume":"1","author":"C.P. Schnorr","year":"1972","unstructured":"Schnorr, C.P., Stimin, H.: Endliche Automaten und Zufallsfolgen, Acta Informatica 1, 345\u2013359, (1972).","journal-title":"Acta Informatica"},{"key":"51_CR16","doi-asserted-by":"crossref","DOI":"10.1142\/0531","volume-title":"Information, Randomness and Incompleteness","author":"G.J. Chaitin","year":"1987","unstructured":"Chaitin, G.J.: Information, Randomness and Incompleteness, World Scientific Publishing, Singapore 1987."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201989"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-46885-4_51.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,14]],"date-time":"2023-05-14T18:57:30Z","timestamp":1684090650000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-46885-4_51"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540534334"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/3-540-46885-4_51","relation":{},"subject":[]}}