{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T06:12:10Z","timestamp":1725603130622},"publisher-location":"London","reference-count":9,"publisher":"Springer London","isbn-type":[{"type":"print","value":"9781852331962"},{"type":"electronic","value":"9781447105510"}],"license":[{"start":{"date-parts":[[1999,1,1]],"date-time":"1999-01-01T00:00:00Z","timestamp":915148800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/978-1-4471-0551-0_28","type":"book-chapter","created":{"date-parts":[[2011,8,26]],"date-time":"2011-08-26T08:46:19Z","timestamp":1314348379000},"page":"371-378","source":"Crossref","is-referenced-by-count":1,"title":["Period and Linear Complexity of Cascaded Clock-Controlled Generators"],"prefix":"10.1007","author":[{"given":"Chik How","family":"Tan","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"28_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1007\/3-540-39757-4_9","volume-title":"The Stop-and-go generator, Advances in Cryptology, EUROCRYPT\u201984","author":"T Beth","year":"1985","unstructured":"T. Beth and F.C. Piper; The Stop-and-go generator, Advances in Cryptology, EUROCRYPT\u201984, Lecture Notes in Computer Science, Springer-Verlag, New York, 209 (1985), 88\u201392."},{"key":"28_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1007\/3-540-39757-4_10","volume-title":"Pseudo random properties of cascade connections of clock controlled shift registers, Advances in Cryptology, EUROCRYPT\u201984","author":"D Gollmann","year":"1985","unstructured":"D. Gollmann, Pseudo random properties of cascade connections of clock controlled shift registers, Advances in Cryptology, EUROCRYPT\u201984, Lecture Notes in Computer Science, Springer-Verlag, New York, 209 (1985), 93\u201398."},{"key":"28_CR3","first-page":"173","volume":"3","author":"D Gollmann","year":"1984","unstructured":"D. Gollmann, Linear recursions of cascaded sequences, Contributions to General Algebra\n                3, (1984), 173\u2013179.","journal-title":"Contributions to General Algebra"},{"key":"28_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"680","DOI":"10.1007\/3-540-46885-4_67","volume-title":"A cryptanalysis of Stepk k,m -Cascades, Advances in Cryptology, EUROCRYPT\u201989","author":"D Gollmann","year":"1990","unstructured":"D. Gollmann and W.G. Chambers, A cryptanalysis of Stepk\n                  k,m\n                -Cascades, Advances in Cryptology, EUROCRYPT\u201989, Lecture Notes in Computer Science, Springer-Verlag, New York, 434 (1990), 680\u2013687."},{"key":"28_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1007\/BFb0046097","volume-title":"Alternating step generators controlled by De Bruijn sequences, Advances in Cryptology, EUROCRYPT\u201987","author":"CG G\u00fcnther","year":"1988","unstructured":"C.G. G\u00fcnther, Alternating step generators controlled by De Bruijn sequences, Advances in Cryptology, EUROCRYPT\u201987, Lecture Notes in Computer Science, Springer-Verlag, New York, 304 (1988), 5\u201314."},{"key":"28_CR6","volume-title":"\u201cIntroduction to finite fields and their applications\u201d","author":"R Lidl","year":"1986","unstructured":"R. Lidl and H. Niederreiter, \u201cIntroduction to finite fields and their applications\u201d, Cambridge University Press, 1986."},{"issue":"8","key":"28_CR7","doi-asserted-by":"publisher","first-page":"709","DOI":"10.1049\/el:19920449","volume":"28","author":"X Liu","year":"1992","unstructured":"X. Liu and G.Z. Xiao, Linear complexity of a type of clock-controlled sequences, Electronic letters\n                28 No 8 (1992), 709\u2013710.","journal-title":"Electronic letters"},{"key":"28_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"142","DOI":"10.1007\/3-540-39805-8_17","volume-title":"A note on sequences generated by clock controlled shift registers, Advances in Cryptology, EUROCRYPT\u201985","author":"B Smeets","year":"1986","unstructured":"B. Smeets, A note on sequences generated by clock controlled shift registers, Advances in Cryptology, EUROCRYPT\u201985, Lecture Notes in Computer Science, Springer-Verlag, New York, 219 (1986), 142\u2013148."},{"key":"28_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1007\/3-540-39757-4_11","volume-title":"On the linear complexity of cascaded sequences, Advances in Cryptology, EUROCRYPT\u201984","author":"R Vogel","year":"1985","unstructured":"R. Vogel, On the linear complexity of cascaded sequences, Advances in Cryptology, EUROCRYPT\u201984, Lecture Notes in Computer Science, Springer-Verlag, New York 209 (1985), 99\u2013109."}],"container-title":["Sequences and their Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4471-0551-0_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,16]],"date-time":"2019-05-16T11:12:39Z","timestamp":1558005159000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4471-0551-0_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9781852331962","9781447105510"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-1-4471-0551-0_28","relation":{},"subject":[],"published":{"date-parts":[[1999]]}}}