{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T15:19:42Z","timestamp":1753888782125},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540583332"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-48658-5_31","type":"book-chapter","created":{"date-parts":[[2007,8,9]],"date-time":"2007-08-09T20:50:39Z","timestamp":1186692639000},"page":"332-340","source":"Crossref","is-referenced-by-count":27,"title":["A Fourier Transform Approach to the Linear Complexity of Nonlinearly Filtered Sequences"],"prefix":"10.1007","author":[{"given":"James L.","family":"Massey","sequence":"first","affiliation":[]},{"given":"Shirlei","family":"Serconek","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"R. E. Blahut, Theory and Practice of Error Control Codes, Addison-Wesley Publishing Company, 1983.","key":"31_CR1"},{"issue":"3","key":"31_CR2","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1109\/TIT.1971.1054618","volume":"IT-17","author":"E. J. Groth","year":"1971","unstructured":"E. J. Groth \u201cGeneration of binary sequences with controllable complexity,\u201d IEEE Trans. Inform. Theory, vol. IT-17, no. 3, pp. 288\u2013296, May 1971.","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"6","key":"31_CR3","doi-asserted-by":"publisher","first-page":"732","DOI":"10.1109\/TIT.1976.1055626","volume":"IT-22","author":"E. L. Key","year":"1976","unstructured":"E. L. Key \u201cAn analysis of the structure and complexity of nonlinear binary sequence generators,\u201d IEEE Trans. Inform. Theory, vol. IT-22, no. 6, pp. 732\u2013736, Nov. 1976.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"31_CR4","volume-title":"Introduction to Finite Fields and their Applications","author":"R. Lidl","year":"1986","unstructured":"R. Lidl and H. Niederreiter, Introduction to Finite Fields and their Applications, Cambridge: Cambridge Univ. Press, 1986."},{"key":"31_CR5","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/TIT.1969.1054260","volume":"IT-15","author":"J. L. Massey","year":"1969","unstructured":"J. L. Massey, \u201cShift-register synthesis and BCH decoding,\u201d IEEE Trans. Inform. Theory, vol. IT-15, pp. 122\u2013127, Jan. 1969.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"31_CR6","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1109\/TIT.1985.1057072","volume":"IT-31","author":"J. L. Massey","year":"1985","unstructured":"J. L. Massey, \u201cReview of R. E. Blahut, Theory and Practice of Error Control Codes\u201d, IEEE Trans. Inform. Theory, vol. IT-31, no. 4, p. 553, Jul. 1985.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"31_CR7","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-82865-2","volume-title":"Analysis and Design of Stream Ciphers","author":"R. A. Rueppel","year":"1986","unstructured":"R. A. Rueppel, Analysis and Design of Stream Ciphers, Berlin: Springer-Verlag, 1986."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO \u201994"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48658-5_31.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,28]],"date-time":"2021-04-28T00:50:48Z","timestamp":1619571048000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48658-5_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540583332"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/3-540-48658-5_31","relation":{},"subject":[]}}