{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T01:02:29Z","timestamp":1725843749874},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319273396"},{"type":"electronic","value":"9783319273402"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-27340-2_2","type":"book-chapter","created":{"date-parts":[[2015,12,16]],"date-time":"2015-12-16T18:40:44Z","timestamp":1450291244000},"page":"10-17","source":"Crossref","is-referenced-by-count":0,"title":["A Simple Linearisation of the Self-shrinking Generator"],"prefix":"10.1007","author":[{"given":"Sara D.","family":"Cardell","sequence":"first","affiliation":[]},{"given":"Amparo","family":"F\u00faster-Sabater","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,17]]},"reference":[{"key":"2_CR1","series-title":"Discrete Mathematics and Its Applications","volume-title":"RC4 Stream Cipher and Its Variants","author":"G Paul","year":"2012","unstructured":"Paul, G., Maitra, S.: RC4 Stream Cipher and Its Variants. Discrete Mathematics and Its Applications. CRC Press, Taylor & Francis Group, Boca Raton (2012)"},{"key":"2_CR2","unstructured":"Bluetooth, Specifications of the Bluetooth system, Version 1.1. \n                      http:\/\/www.bluetooth.com\/"},{"key":"2_CR3","unstructured":"eSTREAM, the ECRYPT Stream Cipher Project, Call for Primitives. \n                      http:\/\/www.ecrypt.eu.org\/stream\/"},{"key":"2_CR4","unstructured":"Yet Another SSL (YASSL). \n                      http:\/\/www.yassl.com"},{"key":"2_CR5","volume-title":"Shift Register-Sequences","author":"SW Golomb","year":"1982","unstructured":"Golomb, S.W.: Shift Register-Sequences. Aegean Park Press, Laguna Hill (1982)"},{"key":"2_CR6","volume-title":"Handbook of Applied Cryptography","author":"AJ Menezes","year":"1997","unstructured":"Menezes, A.J., et al.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)"},{"issue":"11\u201312","key":"2_CR7","doi-asserted-by":"publisher","first-page":"2596","DOI":"10.1016\/j.mcm.2011.07.023","volume":"57","author":"A Peinado","year":"2013","unstructured":"Peinado, A., F\u00faster-Sabater, A.: Generation of pseudorandom binary sequences by means of LFSRs with dynamic feedback. Math. Comput. Model. 57(11\u201312), 2596\u20132604 (2013)","journal-title":"Math. Comput. Model."},{"issue":"6","key":"2_CR8","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1515\/ijnsns-2013-0121","volume":"15","author":"A F\u00faster-Sabater","year":"2014","unstructured":"F\u00faster-Sabater, A.: Linear solutions for irregularly decimated generators of cryptographic sequences. Int. J. Nonlinear Sci. Numer. Simul. 15(6), 377\u2013385 (2014)","journal-title":"Int. J. Nonlinear Sci. Numer. Simul."},{"key":"2_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/BFb0053436","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"W Meier","year":"1995","unstructured":"Meier, W., Staffelbach, O.: The self-shrinking generator. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 205\u2013214. Springer, Heidelberg (1995)"},{"issue":"4","key":"2_CR10","doi-asserted-by":"publisher","first-page":"714","DOI":"10.1109\/TIT.2004.825256","volume":"50","author":"Y Hu","year":"2004","unstructured":"Hu, Y., Xiao, G.: Generalized self-shrinking generator. IEEE Trans. Inf. Theory 50(4), 714\u2013719 (2004)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"2_CR11","first-page":"81","volume":"137","author":"AK Das","year":"1990","unstructured":"Das, A.K., Ganguly, A., Dasgupta, A., Bhawmik, S., Chaudhuri, P.P.: Efficient characterisation of cellular automata. IEE Proc. E: Comput. Digit. Tech. 137(1), 81\u201387 (1990)","journal-title":"IEE Proc. E: Comput. Digit. Tech."},{"key":"2_CR12","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1016\/j.physleta.2007.04.103","volume":"369","author":"A F\u00faster-Sabater","year":"2007","unstructured":"F\u00faster-Sabater, A., Caballero-Gil, P.: Linear solutions for cryptographic nonlinear sequence generators. Phys. Lett. A 369, 432\u2013437 (2007)","journal-title":"Phys. Lett. A"},{"issue":"3","key":"2_CR13","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1016\/j.neunet.2009.12.008","volume":"23","author":"A F\u00faster-Sabater","year":"2010","unstructured":"F\u00faster-Sabater, A., Pazo-Robles, M.E., Caballero-Gil, P.: A simple linearization of the self-shrinking generator by means of cellular automata. Neural Netw. 23(3), 461\u2013464 (2010)","journal-title":"Neural Netw."},{"key":"2_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1007\/3-540-48329-2_3","volume-title":"Advances in Cryptology - CRYPTO \u201993","author":"D Coppersmith","year":"1994","unstructured":"Coppersmith, D., Krawczyk, H., Mansour, Y.: The shrinking generator. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 22\u201339. Springer, Heidelberg (1994)"},{"key":"2_CR15","unstructured":"Wolfram, S.: Cellular automata as simple self-organizing system. Caltrech preprint CALT 68\u2013938 (1982)"},{"issue":"6","key":"2_CR16","doi-asserted-by":"publisher","first-page":"2073","DOI":"10.1109\/18.782139","volume":"45","author":"SR Blackburn","year":"1999","unstructured":"Blackburn, S.R.: The linear complexity of the self-shrinking generator. IEEE Trans. Inf. Theory 45(6), 2073\u20132077 (1999)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"3","key":"2_CR17","doi-asserted-by":"publisher","first-page":"530","DOI":"10.1016\/j.tcs.2008.09.030","volume":"409","author":"A F\u00faster-Sabater","year":"2008","unstructured":"F\u00faster-Sabater, A., Caballero-Gil, P.: Strategic attack on the shrinking generator. Theoret. Comput. Sci. 409(3), 530\u2013536 (2008)","journal-title":"Theoret. Comput. Sci."},{"issue":"3","key":"2_CR18","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1515\/IJNSNS.2010.11.3.165","volume":"11","author":"P Caballero-Gil","year":"2010","unstructured":"Caballero-Gil, P., F\u00faster-Sabater, A., Pazo-Robles, M.E.: Using linear equations to model nonlinear cryptographic sequences. Int. J. nonlinear Sci. Numer. Simul. 11(3), 165\u2013172 (2010)","journal-title":"Int. J. nonlinear Sci. Numer. Simul."},{"issue":"1","key":"2_CR19","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/TIT.1969.1054260","volume":"15","author":"JL Massey","year":"1969","unstructured":"Massey, J.L.: Shift-register synthesis and BCH decoding. IEEE Trans. Inf. Theory 15(1), 122\u2013127 (1969)","journal-title":"IEEE Trans. Inf. Theory"}],"container-title":["Lecture Notes in Computer Science","Computer Aided Systems Theory \u2013 EUROCAST 2015"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-27340-2_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:23:08Z","timestamp":1559348588000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-27340-2_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319273396","9783319273402"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-27340-2_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}