{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T18:21:21Z","timestamp":1742926881091,"version":"3.40.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319491509"},{"type":"electronic","value":"9783319491516"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-49151-6_2","type":"book-chapter","created":{"date-parts":[[2016,11,3]],"date-time":"2016-11-03T22:09:46Z","timestamp":1478210986000},"page":"13-36","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["The Distribution of $$2^n$$ 2 n -Periodic Binary Sequences with Fixed k-Error Linear Complexity"],"prefix":"10.1007","author":[{"given":"Wenlun","family":"Pan","sequence":"first","affiliation":[]},{"given":"Zhenzhen","family":"Bao","sequence":"additional","affiliation":[]},{"given":"Dongdai","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Feng","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,5]]},"reference":[{"key":"2_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-54973-0","volume-title":"The Stability Theory of Stream Ciphers","author":"C Ding","year":"1991","unstructured":"Ding, C., Xiao, G., Shan, W.: The Stability Theory of Stream Ciphers. Lecture Notes in Computer Science, vol. 561. Springer, Heidelberg (1991)"},{"key":"2_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1007\/11863854_8","volume-title":"Sequences and Their Applications \u2013 SETA 2006","author":"F-W Fu","year":"2006","unstructured":"Fu, F.-W., Niederreiter, H., Su, M.: The characterization of \n                    \n                      \n                    \n                    $$2^k$$\n                    \n                      \n                        \n                          2\n                          k\n                        \n                      \n                    \n                  -periodic binary sequences with fixed 1-error linear complexity. In: Gong, G., Helleseth, T., Song, H.-Y., Yang, K. (eds.) SETA 2006. LNCS, vol. 4086, pp. 88\u2013103. Springer, Heidelberg (2006). doi:\n                    10.1007\/11863854_8"},{"key":"2_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1007\/978-3-540-85912-3_23","volume-title":"Sequences and Their Applications - SETA 2008","author":"R Kavuluru","year":"2008","unstructured":"Kavuluru, R.: \n                    \n                      \n                    \n                    $$2^n$$\n                    \n                      \n                        \n                          2\n                          n\n                        \n                      \n                    \n                  -periodic binary sequences with fixed k-error linear complexity for \n                    \n                      \n                    \n                    $$k$$\n                    \n                      \n                        k\n                      \n                    \n                   2 or 3. In: Golomb, S.W., Parker, M.G., Pott, A., Winterhof, A. (eds.) SETA 2008. LNCS, vol. 5203, pp. 252\u2013265. Springer, Heidelberg (2008). doi:\n                    10.1007\/978-3-540-85912-3_23"},{"issue":"2","key":"2_CR4","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/s10623-009-9295-x","volume":"53","author":"R Kavuluru","year":"2009","unstructured":"Kavuluru, R.: Characterization of \n                    \n                      \n                    \n                    $$2^n$$\n                    \n                      \n                        \n                          2\n                          n\n                        \n                      \n                    \n                  -periodic binary sequences with fixed 2-error or 3-error linear complexity. Des. Codes Crypt. 53(2), 75\u201397 (2009)","journal-title":"Des. Codes Crypt."},{"issue":"2","key":"2_CR5","doi-asserted-by":"publisher","first-page":"694","DOI":"10.1109\/18.825845","volume":"46","author":"K Kurosawa","year":"2000","unstructured":"Kurosawa, K., Sato, F., Sakata, T., Kishimoto, W.: A relationship between linear complexity and \n                    \n                      \n                    \n                    $$k$$\n                    \n                      \n                        k\n                      \n                    \n                  -error linear complexity. IEEE Trans. Inf. Theory 46(2), 694\u2013698 (2000)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"2_CR6","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/TIT.1969.1054260","volume":"15","author":"JL Massey","year":"1969","unstructured":"Massey, J.L.: Shift-register synthesis and bch decoding. IEEE Trans. Inf. Theory 15(1), 122\u2013127 (1969)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"3","key":"2_CR7","doi-asserted-by":"publisher","first-page":"1151","DOI":"10.1109\/TIT.2004.842709","volume":"51","author":"W Meidl","year":"2005","unstructured":"Meidl, W.: On the stability of \n                    \n                      \n                    \n                    $$2^n$$\n                    \n                      \n                        \n                          2\n                          n\n                        \n                      \n                    \n                  -periodic binary sequences. IEEE Trans. Inf. Theory 51(3), 1151\u20131155 (2005)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"7","key":"2_CR8","first-page":"1542","volume":"E97\u2013A","author":"S Ming","year":"2014","unstructured":"Ming, S.: Decomposing approach for error vectors of k-error linear complexity of certain periodic sequences. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. E97\u2013A(7), 1542\u20131555 (2014)","journal-title":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci."},{"key":"2_CR9","series-title":"Communications and Control Engineering Series","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-82865-2","volume-title":"Analysis and Design of Stream Ciphers","author":"AR Rueppel","year":"1986","unstructured":"Rueppel, A.R.: Analysis and Design of Stream Ciphers. Communications and Control Engineering Series. Springer, Heidelberg (1986)"},{"issue":"4","key":"2_CR10","doi-asserted-by":"publisher","first-page":"1398","DOI":"10.1109\/18.243455","volume":"39","author":"M Stamp","year":"1993","unstructured":"Stamp, M., Martin, C.F.: An algorithm for the \n                    \n                      \n                    \n                    $$k$$\n                    \n                      \n                        k\n                      \n                    \n                  -error linear complexity of binary sequences with period \n                    \n                      \n                    \n                    $$2^n$$\n                    \n                      \n                        \n                          2\n                          n\n                        \n                      \n                    \n                  . IEEE Trans. Inf. Theory 39(4), 1398\u20131401 (1993)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"3","key":"2_CR11","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/s10623-011-9576-z","volume":"64","author":"J Zhou","year":"2012","unstructured":"Zhou, J.: A counterexample concerning the 3-error linear complexity of \n                    \n                      \n                    \n                    $$2^n$$\n                    \n                      \n                        \n                          2\n                          n\n                        \n                      \n                    \n                  -periodic binary sequences. Des. Codes Crypt. 64(3), 285\u2013286 (2012)","journal-title":"Des. Codes Crypt."},{"unstructured":"Zhou, J., Liu, J., Liu, W.: The 4-error linear complexity distribution for \n                    \n                      \n                    \n                    $$2^n$$\n                    \n                      \n                        \n                          2\n                          n\n                        \n                      \n                    \n                  -periodic binary sequences. CoRR abs\/1310.0132 (2013)","key":"2_CR12"},{"issue":"1","key":"2_CR13","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/s10623-013-9805-8","volume":"73","author":"J Zhou","year":"2014","unstructured":"Zhou, J., Liu, W.: The \n                    \n                      \n                    \n                    $$k$$\n                    \n                      \n                        k\n                      \n                    \n                  -error linear complexity distribution for \n                    \n                      \n                    \n                    $$2^n$$\n                    \n                      \n                        \n                          2\n                          n\n                        \n                      \n                    \n                  -periodic binary sequences. Des. Codes Crypt. 73(1), 55\u201375 (2014)","journal-title":"Des. Codes Crypt."},{"key":"2_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1007\/978-3-319-12087-4_5","volume-title":"Information Security and Cryptology","author":"J Zhou","year":"2014","unstructured":"Zhou, J., Liu, W., Zhou, G.: Cube theory and stable \n                    \n                      \n                    \n                    $$k$$\n                    \n                      \n                        k\n                      \n                    \n                  -error linear complexity for periodic sequences. In: Lin, D., Xu, S., Yung, M. (eds.) Inscrypt 2013. LNCS, vol. 8567, pp. 70\u201385. Springer, Heidelberg (2014). doi:\n                    10.1007\/978-3-319-12087-4_5"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49151-6_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T01:35:29Z","timestamp":1558316129000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49151-6_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319491509","9783319491516"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49151-6_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"5 November 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISPEC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security Practice and Experience","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Zhangjiajie","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 November 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 November 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ispec2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}