{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:17:50Z","timestamp":1725488270230},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540576006"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-48285-7_15","type":"book-chapter","created":{"date-parts":[[2007,7,31]],"date-time":"2007-07-31T22:16:46Z","timestamp":1185920206000},"page":"168-180","source":"Crossref","is-referenced-by-count":1,"title":["Blind Synchronization of m-Sequences with Even Span"],"prefix":"10.1007","author":[{"given":"Richard A.","family":"Games","sequence":"first","affiliation":[]},{"given":"Joseph J.","family":"Rushanan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1007\/3-540-46416-6_16","volume-title":"Advances in Cryptology\u2014EUROCRYPT\u2019 91","author":"V. Chepyzhov","year":"1991","unstructured":"V. Chepyzhov and B. Smeets, \u201cOn a Fast Correlation Attack on Certain Stream Ciphers,\u201d Advances in Cryptology\u2014EUROCRYPT\u2019 91, Lecture Notes in Computer Science #547 (D. W. Davies, Editor), Berlin: Springer-Verlag, pp. 176\u2013185, 1991."},{"key":"15_CR2","volume-title":"An Introduction to Probability Theory and Its Applications","author":"W. Feller","year":"1957","unstructured":"W. Feller, An Introduction to Probability Theory and Its Applications, Volume I, New York: John Wiley & Sons, 1957."},{"key":"15_CR3","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1016\/0166-218X(85)90067-8","volume":"12","author":"R. A. Games","year":"1985","unstructured":"R. A. Games, \u201cCrosscorrelation of M-Sequences and GMW-Sequences with the same Primitive Polynomial,\u201d Discrete Applied Mathematics, Vol. 12, pp. 139\u2013146, 1985.","journal-title":"Discrete Applied Mathematics"},{"key":"15_CR4","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/BF02252874","volume":"1","author":"W. Meier","year":"1989","unstructured":"W. Meier and O. Staffelbach, \u201cFast Correlation Attacks on Certain Stream Ciphers,\u201d J. Cryptography, Vol. 1, pp. 159\u2013176, 1989.","journal-title":"J. Cryptography"},{"issue":"1","key":"15_CR5","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1109\/TC.1985.1676518","volume":"C-34","author":"T. Siegenthaler","year":"1985","unstructured":"T. Siegenthaler, \u201cDecrypting a Class of Stream Ciphers Using Ciphertext Only,\u201d IEEE Transactions on Computers, Vol. C-34, No. 1, pp. 81\u201385, 1985.","journal-title":"IEEE Transactions on Computers"},{"key":"15_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1007\/0-387-34799-2_32","volume-title":"Advances in Cryptology\u2014CRYPTO\u2019 88","author":"K. Zeng","year":"1990","unstructured":"K. Zeng and M. Huang, \u201cOn the Linear Syndrome Method in Cryptanalysis,\u201d Advances in Cryptology\u2014CRYPTO\u2019 88, Lecture Notes in Computer Science #403 (S. Goldwasser, Editor), Berlin: Springer-Verlag, pp. 469\u2013478, 1990."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201993"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48285-7_15.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T20:50:22Z","timestamp":1619556622000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48285-7_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540576006"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/3-540-48285-7_15","relation":{},"subject":[]}}