{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T09:40:03Z","timestamp":1746265203152,"version":"3.40.4"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319079943"},{"type":"electronic","value":"9783319079950"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07995-0_39","type":"book-chapter","created":{"date-parts":[[2014,6,10]],"date-time":"2014-06-10T23:24:31Z","timestamp":1402442671000},"page":"397-406","source":"Crossref","is-referenced-by-count":5,"title":["Improving the Period and Linear Span of the Sequences Generated by DLFSRs"],"prefix":"10.1007","author":[{"given":"Alberto","family":"Peinado","sequence":"first","affiliation":[]},{"given":"Jorge","family":"Munilla","sequence":"additional","affiliation":[]},{"given":"Amparo","family":"F\u00faster-Sabater","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"39_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/978-3-540-68351-3_15","volume-title":"New Stream Cipher Designs","author":"S. Babbage","year":"2008","unstructured":"Babbage, S., Dodd, M.: The MICKEY Stream Ciphers. In: Robshaw, M., Billet, O. (eds.) New Stream Cipher Designs. LNCS, vol.\u00a04986, pp. 191\u2013209. Springer, Heidelberg (2008)"},{"key":"39_CR2","unstructured":"Bogdanov, A., Preneel, B., Rijmen, V.: Security Evaluation of the K2 Stream Cipher. Internal report, Katholieke Universiteit Leuven, ESAT\/SCD-COSIC (March 2011)"},{"key":"39_CR3","doi-asserted-by":"crossref","unstructured":"Che, W., Deng, H., Tan, X., Wang, J.: Networked RFID Systems and Lightweight Cryptography. In: Random Number Generator for Application in RFID Tags, ch.\u00a016, pp. 279\u2013287. Springer, Heidelberg (2008)","DOI":"10.1007\/978-3-540-71641-9_16"},{"key":"39_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1007\/978-3-642-11145-7_5","volume-title":"Information and Communications Security","author":"C. Cid","year":"2009","unstructured":"Cid, C., Kiyomoto, S., Kurihara, J.: The rakaposhi Stream Cipher. In: Qing, S., Mitchell, C.J., Wang, G. (eds.) ICICS 2009. LNCS, vol.\u00a05927, pp. 32\u201346. Springer, Heidelberg (2009)"},{"key":"39_CR5","doi-asserted-by":"crossref","unstructured":"Ding, L., Guan, J.: Cryptanalysis of Mickey family of stream ciphers. Security and Communication Networks\u00a0(6), 396\u2013941 (2013)","DOI":"10.1002\/sec.637"},{"key":"39_CR6","unstructured":"Golomb, S.W.: Shift-Register Sequences, revised edn. Aegean Park Press, Laguna Hill (1982)"},{"issue":"2","key":"39_CR7","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1109\/18.370141","volume":"41","author":"G. Gong","year":"1995","unstructured":"Gong, G.: Theory and Applications of q-ary interleaved sequences. IEEE Transactions on Information Theory\u00a041(2), 400\u2013411 (1995)","journal-title":"IEEE Transactions on Information Theory"},{"key":"39_CR8","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1109\/12.364534","volume":"44","author":"S. Hellebrand","year":"1995","unstructured":"Hellebrand, S., Rajskia, J., Tarnick, S., Venkataraman, S., Courtois, B.: Built-in test for circuits with scan based on reseeding of multiple-polynomial linear feedback shift registers. IEEE Trans. Comput.\u00a044, 223\u2013233 (1995)","journal-title":"IEEE Trans. Comput."},{"key":"39_CR9","doi-asserted-by":"crossref","unstructured":"Kiyomoto, S., Tanaka, T., Sakurai, K.: K2: A stream cipher algorithm using dynamic feedback control. In: Hernando, J., Fern\u00e1ndez-Medina, E., Malek, M. (eds.) SECRYPT, pp. 204\u2013213. INSTICC Press (2007)","DOI":"10.5220\/0002122302040213"},{"key":"39_CR10","doi-asserted-by":"publisher","first-page":"3816","DOI":"10.3390\/s130303816","volume":"13","author":"J. Meli\u00e1-Segu\u00ed","year":"2013","unstructured":"Meli\u00e1-Segu\u00ed, J., Garc\u00eda-Alfaro, J., Herrera-Joancomart\u00ed, J.: J3Gen: A PRNG for Low-Cost Passive RFID. Sensors\u00a013, 3816\u20133830 (2013)","journal-title":"Sensors"},{"key":"39_CR11","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/s11277-010-0187-1","volume":"59","author":"J. Meli\u00e1-Segu\u00ed","year":"2011","unstructured":"Meli\u00e1-Segu\u00ed, J., Garc\u00eda-Alfaro, J., Herrera-Joancomart\u00ed, J.: A practical implementation attack on weak pseudorandom number generator designs for EPC Gen2 Tags. Wirel. Pers. Commun.\u00a059, 27\u201342 (2011)","journal-title":"Wirel. Pers. Commun."},{"issue":"19","key":"39_CR12","doi-asserted-by":"publisher","first-page":"1097","DOI":"10.1049\/el:20020750","volume":"38","author":"R. Mita","year":"2002","unstructured":"Mita, R., Palumbo, G., Pennisi, S., Poli, M.: Pseudorandom bit generator based on dynamic linear feedback topology. Electronic Letters\u00a038(19), 1097\u20131098 (2002)","journal-title":"Electronic Letters"},{"key":"39_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/978-3-642-38033-4_26","volume-title":"Information Security Practice and Experience","author":"M.A. Orumiehchiha","year":"2013","unstructured":"Orumiehchiha, M.A., Pieprzyk, J., Shakour, E., Steinfeld, R.: Security Evaluation of Rakaposhi Stream Cipher. In: Deng, R.H., Feng, T. (eds.) ISPEC 2013. LNCS, vol.\u00a07863, pp. 361\u2013371. Springer, Heidelberg (2013)"},{"issue":"11-12","key":"39_CR14","doi-asserted-by":"publisher","first-page":"2596","DOI":"10.1016\/j.mcm.2011.07.023","volume":"57","author":"A. Peinado","year":"2013","unstructured":"Peinado, A., F\u00faster-Sabater, A.: Generation of pseudorandom binary sequences by means of LFSRs with dynamic feedback. Mathematical and Computer Modelling\u00a057(11-12), 2596\u20132604 (2013)","journal-title":"Mathematical and Computer Modelling"},{"key":"39_CR15","doi-asserted-by":"crossref","unstructured":"Rosinger, P., Al-Hashimi, B., Nicolici, N.: Dual multiple-polynomial LFSR for low-power mixed-mode BIST. In: IEEE Proc. Comput. Digital Tech., vol.\u00a0150, pp. 209\u2013217 (2003)","DOI":"10.1049\/ip-cdt:20030666"}],"container-title":["Advances in Intelligent Systems and Computing","International Joint Conference SOCO\u201914-CISIS\u201914-ICEUTE\u201914"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07995-0_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T09:15:43Z","timestamp":1746263743000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-07995-0_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319079943","9783319079950"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07995-0_39","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014]]}}}