{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T15:31:58Z","timestamp":1743089518872,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319018539"},{"type":"electronic","value":"9783319018546"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-01854-6_56","type":"book-chapter","created":{"date-parts":[[2013,8,8]],"date-time":"2013-08-08T06:47:25Z","timestamp":1375944445000},"page":"547-556","source":"Crossref","is-referenced-by-count":0,"title":["Identification of Degeneracies in a Class of Cryptographic Sequences"],"prefix":"10.1007","author":[{"given":"Amparo","family":"F\u00faster-Sabater","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"56_CR1","unstructured":"Bluetooth, Specifications of the Bluetooth system, Version 1.1, \n                    http:\/\/www.bluetooth.com\/"},{"key":"56_CR2","unstructured":"eSTREAM, the ECRYPT Stream Cipher Project, Call for Primitives, \n                    http:\/\/www.ecrypt.eu.org\/stream\/"},{"key":"56_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"621","DOI":"10.1007\/978-3-642-01970-8_61","volume-title":"Computational Science \u2013 ICCS 2009","author":"A. F\u00faster-Sabater","year":"2009","unstructured":"F\u00faster-Sabater, A., Caballero-Gil, P., Delgado-Mohatar, O.: Deterministic Computation of Pseudorandomness in Sequences of Cryptographic Application. In: Allen, G., Nabrzyski, J., Seidel, E., van Albada, G.D., Dongarra, J., Sloot, P.M.A. (eds.) ICCS 2009, Part I. LNCS, vol.\u00a05544, pp. 621\u2013630. Springer, Heidelberg (2009)"},{"key":"56_CR4","volume-title":"Shift Register-Sequences","author":"S.W. Golomb","year":"1982","unstructured":"Golomb, S.W.: Shift Register-Sequences. Aegean Park Press, Laguna Hill (1982)"},{"issue":"3","key":"56_CR5","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1109\/TIT.1971.1054618","volume":"17","author":"E.J. Groth","year":"1971","unstructured":"Groth, E.J.: Generation of binary sequences with controllable complexity. IEEE Trans. Informat. Theory\u00a017(3), 288\u2013296 (1971)","journal-title":"IEEE Trans. Informat. Theory"},{"issue":"6","key":"56_CR6","doi-asserted-by":"publisher","first-page":"732","DOI":"10.1109\/TIT.1976.1055626","volume":"22","author":"E.L. Key","year":"1976","unstructured":"Key, E.L.: An Analysis of the Structure and Complexity of Nonlinear Binary Sequence Generators. IEEE Trans. Informat. Theory\u00a022(6), 732\u2013736 (1976)","journal-title":"IEEE Trans. Informat. Theory"},{"issue":"11","key":"56_CR7","doi-asserted-by":"publisher","first-page":"3047","DOI":"10.1109\/TIT.2003.818400","volume":"49","author":"N. Kolokotronis","year":"2003","unstructured":"Kolokotronis, N., Kalouptsidis, N.: On the linear complexity of nonlinearly filtered PN-sequences. IEEE Trans. Informat. Theory\u00a049(11), 3047\u20133059 (2003)","journal-title":"IEEE Trans. Informat. Theory"},{"issue":"4","key":"56_CR8","doi-asserted-by":"publisher","first-page":"1786","DOI":"10.1109\/TIT.2008.917639","volume":"54","author":"K. Limniotis","year":"2008","unstructured":"Limniotis, K., Kolokotronis, N., Kalouptsidis, N.: On the Linear Complexity of Sequences Obtained by State Space Generators. IEEE Trans. Informat. Theory\u00a054(4), 1786\u20131793 (2008)","journal-title":"IEEE Trans. Informat. Theory"},{"key":"56_CR9","volume-title":"Introduction to Finite Fields and Their Applications","author":"R. Lidl","year":"1986","unstructured":"Lidl, R., Niederreiter, H.: Introduction to Finite Fields and Their Applications. Cambridge University Press, Cambridge (1986)"},{"issue":"1","key":"56_CR10","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/TIT.1969.1054260","volume":"15","author":"J.L. Massey","year":"1969","unstructured":"Massey, J.L.: Shift-Register Synthesis and BCH Decoding. IEEE Trans. Informat. Theory\u00a015(1), 122\u2013127 (1969)","journal-title":"IEEE Trans. Informat. Theory"},{"key":"56_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"332","DOI":"10.1007\/3-540-48658-5_31","volume-title":"Advances in Cryptology - CRYPTO \u201994","author":"J.L. Massey","year":"1994","unstructured":"Massey, J.L., Serconek, S.: A Fourier transform approach to the linear complexity of nonlinearly filtered sequences. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol.\u00a0839, pp. 332\u2013340. Springer, Heidelberg (1994)"},{"key":"56_CR12","volume-title":"Handbook of Applied Cryptography","author":"A.J. Menezes","year":"1997","unstructured":"Menezes, A.J., et al.: Handbook of Applied Cryptography. CRC Press, New York (1997)"},{"key":"56_CR13","doi-asserted-by":"publisher","first-page":"4029","DOI":"10.1016\/j.cnsns.2012.03.020","volume":"17","author":"N. Nagaraj","year":"2012","unstructured":"Nagaraj, N.: One-Time Pad as a nonlinear dynamical system. Commun. Nonlinear Sci. Numer. Simulat.\u00a017, 4029\u20134036 (2012)","journal-title":"Commun. Nonlinear Sci. Numer. Simulat."},{"key":"56_CR14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04101-3","volume-title":"Understanding Cryptography","author":"C. Paar","year":"2010","unstructured":"Paar, C., Pelzl, J.: Understanding Cryptography. Springer, Heildeberg (2010)"},{"key":"56_CR15","series-title":"Discrete Mathematics and Its Applications","volume-title":"RC4 Stream Cipher and Its Variants","author":"G. Paul","year":"2012","unstructured":"Paul, G., Maitra, S.: RC4 Stream Cipher and Its Variants. Discrete Mathematics and Its Applications. CRC Press, Taylor & Francis Group, Boca Raton (2012)"},{"key":"56_CR16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-82865-2","volume-title":"Analysis and Design of Stream Ciphers","author":"R.A. Rueppel","year":"1986","unstructured":"Rueppel, R.A.: Analysis and Design of Stream Ciphers. Springer, New York (1986)"},{"key":"56_CR17","unstructured":"Yet Another SSL (YASSL), \n                    http:\/\/www.yassl.com"}],"container-title":["Advances in Intelligent Systems and Computing","International Joint Conference SOCO\u201913-CISIS\u201913-ICEUTE\u201913"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-01854-6_56","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,19]],"date-time":"2023-02-19T15:09:20Z","timestamp":1676819360000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-01854-6_56"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319018539","9783319018546"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-01854-6_56","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014]]}}}