{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,26]],"date-time":"2025-07-26T09:23:23Z","timestamp":1753521803832,"version":"3.40.3"},"publisher-location":"Boston, MA","reference-count":9,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781441959058"},{"type":"electronic","value":"9781441959065"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-1-4419-5906-5_359","type":"book-chapter","created":{"date-parts":[[2011,10,27]],"date-time":"2011-10-27T13:53:32Z","timestamp":1319723612000},"page":"763-766","source":"Crossref","is-referenced-by-count":4,"title":["Maximal-Length Sequences"],"prefix":"10.1007","author":[{"given":"Tor","family":"Helleseth","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"359_CR1_359","first-page":"356","volume-title":"Advances in cryptology \u2013 EUROCRYPT\u201994, vol 950, Lecture notes in computer science","author":"F Chabaud","year":"1995","unstructured":"Chabaud F, Vaudenay S (1995) Links between differential and linear cryptanalysis. In De Santis A (ed) Advances in cryptology\u00a0\u2013 EUROCRYPT\u201994, vol 950, Lecture notes in computer science, pp\u00a0356\u2013365. Springer, Berlin"},{"key":"359_CR2_359","unstructured":"Golomb SW (1967) Shift register sequences. Holden-Day series in information systems. Holden-Day, San Francisco, 1967. Revised ed., Aegean Park Press, Laguna Hills"},{"key":"359_CR3_359","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511546907","volume-title":"Signal design for good correlation \u2013 for wireless communication, cryptography, and radar","author":"SW Golomb","year":"2005","unstructured":"Golomb SW, Gong G (2005) Signal design for good correlation\u00a0\u2013 for wireless communication, cryptography, and radar. Cambridge University Press, Cambridge"},{"key":"359_CR4_359","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1090\/conm\/477\/09302","volume-title":"Recent trends in cryptography, vol 477, Contemporary mathematics","author":"T Helleseth","year":"2009","unstructured":"Helleseth T (2009) Linear and nonlinear sequences and applications to stream ciphers. In Luengo I (ed) Recent trends in cryptography, vol 477, Contemporary mathematics, pp\u00a021\u201346. American Mathematical Society, Providence, Rhode Island"},{"key":"359_CR5_359","first-page":"1765","volume-title":"Handbook in coding theory","author":"T Helleseth","year":"1998","unstructured":"Helleseth T, Vijay Kumar P (1998) Sequences with low correlation. In Pless VS, Huffman WC (eds), Handbook in coding theory, vol\u00a0II, pp 1765\u20131853. Elsevier, Amsterdam"},{"key":"359_CR6_359","volume-title":"The communications handbook 2nd edn, pp 8\u20131\u20138\u201312","author":"T Helleseth","year":"2002","unstructured":"Helleseth T, Vijay Kumar P (2002) Pseudonoise sequences. In Gibson JD (ed) The communications handbook 2nd edn, pp\u00a08\u20131\u20138\u201312. CRC Press, London"},{"key":"359_CR7_359","first-page":"55","volume-title":"Advances in cryptology - EUROCRYPT\u201993, vol 765 of Lecture notes in computer science","author":"K Nyberg","year":"1994","unstructured":"Nyberg K (1994) Differentially uniform mappings for cryptography. In Helleseth T (ed) Advances in cryptology - EUROCRYPT\u201993, vol 765 of Lecture notes in computer science, pp\u00a055\u201364. Springer, Berlin"},{"key":"359_CR8_359","volume-title":"Linear recurrence relations over finite fields","author":"ES Selmer","year":"1996","unstructured":"Selmer ES (1996) Linear recurrence relations over finite fields. Department of Mathematics, University of Bergen, Norway"},{"issue":"1","key":"359_CR9_359","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1137\/0107003","volume":"7","author":"N Zierler","year":"1959","unstructured":"Zierler N (1959) Linear recurring sequences. J Soc Ind Appl Math 7(1):31\u201348","journal-title":"J Soc Ind Appl Math"}],"container-title":["Encyclopedia of Cryptography and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4419-5906-5_359","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T23:59:25Z","timestamp":1591055965000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4419-5906-5_359"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9781441959058","9781441959065"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-1-4419-5906-5_359","relation":{},"subject":[],"published":{"date-parts":[[2011]]}}}