{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,20]],"date-time":"2025-04-20T04:43:29Z","timestamp":1745124209559},"publisher-location":"London","reference-count":9,"publisher":"Springer London","isbn-type":[{"type":"print","value":"9781852331962"},{"type":"electronic","value":"9781447105510"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/978-1-4471-0551-0_24","type":"book-chapter","created":{"date-parts":[[2011,8,26]],"date-time":"2011-08-26T04:46:19Z","timestamp":1314333979000},"page":"318-329","source":"Crossref","is-referenced-by-count":8,"title":["Counting Functions and Expected Values in the Stability Theory of Stream Ciphers"],"prefix":"10.1007","author":[{"given":"Harald","family":"Niederreiter","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Heike","family":"Paschinger","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"24_CR1","volume-title":"\u201cCovering Codes\u201d","author":"G Cohen","year":"1997","unstructured":"G. Cohen, L Honkala, S. Litsyn, and A. Lobstein, \u201cCovering Codes\u201d, Elsevier, Amsterdam, 1997."},{"key":"24_CR2","volume-title":"Lecture Notes in Computer Science","author":"C Ding","year":"1991","unstructured":"C. Ding, G. Xiao, and W. Shan, \u201cThe Stability Theory of Stream Ciphers\u201d, Lecture Notes in Computer Science, Vol. 561, Springer-Verlag, Berlin, 1991."},{"key":"24_CR3","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1147\/rd.203.0204","volume":"20","author":"FG Gustayson","year":"1976","unstructured":"F.G. Gustayson, Analysis of the Berlekamp-Massey linear feedback shift-register synthesis algorithm, IBM J. Res. Develop. 20 (1976), 204\u2013212.","journal-title":"IBM J. Res. Develop"},{"key":"24_CR4","unstructured":"T. Kaida, S. Uehara, and K. Imamura, A new algorithm for the k -error linear complexity of sequences over GF(pm)with period pn, this volume."},{"key":"24_CR5","first-page":"37","volume-title":"Lecture Notes in Computer ScienceSequences with almost perfect linear complexity profile, in \u201c Advances in Cryptology \u2014 EUROCRYPT \u201887\u201d","author":"H Niederreiter","year":"1988","unstructured":"H. Niederreiter, Sequences with almost perfect linear complexity profile, in \u201cAdvances in Cryptology \u2014 EUROCRYPT \u201887\u201d (D. Chaum and W.L. Price, eds.), Lecture Notes in Computer Science, Vol. 304, pp. 37\u201351, Springer-Verlag, Berlin, 1988."},{"key":"24_CR6","unstructured":"H. Niederreiter, Some computable complexity measures for binary sequences, this volume."},{"key":"24_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-82865-2","volume-title":"\u201cAnalysis and Design of Stream Ciphers\u201d","author":"RA Rueppel","year":"1986","unstructured":"R.A. Rueppel, \u201cAnalysis and Design of Stream Ciphers\u201d, Springer-Verlag, Berlin, 1986."},{"key":"24_CR8","first-page":"65","volume-title":"Stream ciphers, \u201cContemporary Cryptology: The Science of Information Integrity\u201d","author":"RA Rueppel","year":"1992","unstructured":"R.A. Rueppel, Stream ciphers, in \u201cContemporary Cryptology: The Science of Information Integrity\u201d (G.J. Simmons, ed.), pp. 65\u2013134, IEEE Press, New York, 1992."},{"key":"24_CR9","doi-asserted-by":"publisher","first-page":"1398","DOI":"10.1109\/18.243455","volume":"39","author":"M Stamp","year":"1993","unstructured":"M. Stamp and C.F. Martin, An algorithm for the k -error linear complexity of binary sequences with period 2n\n                IEEE Trans. Inform. Theory\n                39 (1993), 1398\u20131401.","journal-title":"IEEE Trans. Inform. Theory"}],"container-title":["Sequences and their Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4471-0551-0_24.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T20:26:19Z","timestamp":1619814379000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4471-0551-0_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9781852331962","9781447105510"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-1-4471-0551-0_24","relation":{},"subject":[],"published":{"date-parts":[[1999]]}}}