{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T06:12:07Z","timestamp":1725603127728},"publisher-location":"London","reference-count":5,"publisher":"Springer London","isbn-type":[{"type":"print","value":"9781852331962"},{"type":"electronic","value":"9781447105510"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/978-1-4471-0551-0_26","type":"book-chapter","created":{"date-parts":[[2011,8,26]],"date-time":"2011-08-26T08:46:19Z","timestamp":1314348379000},"page":"343-353","source":"Crossref","is-referenced-by-count":0,"title":["On the Randomness of a [d, k] Self-Decimation Stream Key Generator"],"prefix":"10.1007","author":[{"given":"Fumio","family":"Sato","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Kaoru","family":"Kurosawa","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"26_CR1","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1016\/B978-0-444-88071-0.50010-2","volume-title":"Algorithms and Complexity","author":"AV Aho","year":"1990","unstructured":"A. V. Aho, \u201cAlgorithms for Finding Patterns in String,\u201d Handbook of Theoretical Computer Science, Volume\n                A: Algorithms and Complexity, J. van Leeuwen ed., MIT Press, 1990, pp. 255\u2013300."},{"key":"26_CR2","volume-title":"Shift Register Sequences(revised edition)","author":"SW Golomb","year":"1982","unstructured":"S. W. Golomb, Shift Register Sequences(revised edition), Aegean Park Press, 1982."},{"key":"26_CR3","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/3-540-39118-5_6","volume":"304","author":"RA Rueppel","year":"1988","unstructured":"R. A. Rueppel, \u201cWhen Shift Registers Clock Themselves,\u201d Advances in Cryptology \u2014 EUROCRYPT \u201887, Lecture Notes in Computer Science 304, Springer-Verlag, 1988, pp. 53\u201364.","journal-title":"Lecture Notes in Computer Science"},{"key":"26_CR4","first-page":"65","volume-title":"Contemporary Cryptology: The Science of Information Integrity","author":"RA Rueppel","year":"1992","unstructured":"R. A. Rueppel, \u201cStream Ciphers,\u201d Contemporary Cryptology: The Science of Information Integrity, G. J. Simmons ed, IEEE Press, 1992, pp. 65\u2013134."},{"issue":"2","key":"26_CR5","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1109\/2.67207","volume":"24","author":"K Zeng","year":"1991","unstructured":"K. Zeng, C.-H. Yang, D.-Y. Wei and T.R.N. Rao, \u201cPseudorandom Bit Generators in Stream-Cipher Cryptography,\u201d IEEE Computer, v. 24, n. 2, Feb 1991, pp. 8\u201317.","journal-title":"IEEE Computer"}],"container-title":["Sequences and their Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4471-0551-0_26.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,1]],"date-time":"2021-05-01T00:26:21Z","timestamp":1619828781000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4471-0551-0_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9781852331962","9781447105510"],"references-count":5,"URL":"https:\/\/doi.org\/10.1007\/978-1-4471-0551-0_26","relation":{},"subject":[],"published":{"date-parts":[[1999]]}}}