{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:55:17Z","timestamp":1725558917804},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540235965"},{"type":"electronic","value":"9783540304791"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30479-1_63","type":"book-chapter","created":{"date-parts":[[2010,6,29]],"date-time":"2010-06-29T17:04:53Z","timestamp":1277831093000},"page":"612-621","source":"Crossref","is-referenced-by-count":5,"title":["Cellular Automata Application to the Linearization of Stream Cipher Generators"],"prefix":"10.1007","author":[{"given":"Amparo","family":"F\u00faster-Sabater","sequence":"first","affiliation":[]},{"given":"Dolores","family":"de la Gu\u00eda-Mart\u00ednez","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"63_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1007\/3-540-45067-X_36","volume-title":"Information Security and Privacy","author":"F. Bao","year":"2003","unstructured":"Bao, F.: Crytanalysis of a New Cellular Automata Cryptosystem. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol.\u00a02727, pp. 416\u2013427. Springer, Heidelberg (2003)"},{"key":"63_CR2","doi-asserted-by":"crossref","unstructured":"Bardell, P.H.: Analysis of Cellular Automata Used as Pseudorandom Pattern Generators. In: Proceedings of the IEEE International Test Conference. Paper 34.1, pp. 762\u2013768 (1990)","DOI":"10.1109\/TEST.1990.114093"},{"key":"63_CR3","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1109\/12.589245","volume":"46","author":"S. Blackburn","year":"1997","unstructured":"Blackburn, S., Murphy, S., Paterson, K.: Comments on Theory and Applications of Cellular Automata in Cryptography. IEEE Transactions on Computers\u00a046, 637\u2013638 (1997)","journal-title":"IEEE Transactions on Computers"},{"key":"63_CR4","doi-asserted-by":"crossref","first-page":"782","DOI":"10.1109\/12.508317","volume":"45","author":"K. Cattell","year":"1996","unstructured":"Cattell, K., Muzio, J.: Analysis of One-Dimensional Linear Hybrid Cellular Automata over GF(q). IEEE Transactions on Computer-Aided Design\u00a045, 782\u2013792 (1996)","journal-title":"IEEE Transactions on Computer-Aided Design"},{"key":"63_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1007\/3-540-48329-2_3","volume-title":"Advances in Cryptology - CRYPTO \u201993","author":"D. Coppersmith","year":"1994","unstructured":"Coppersmith, D., Krawczyk, H., Mansour, Y.: The Shrinking Generator. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol.\u00a0773, pp. 22\u201339. Springer, Heidelberg (1994)"},{"key":"63_CR6","first-page":"81","volume":"1","author":"A.K. Das","year":"1990","unstructured":"Das, A.K., Ganguly, A., Dasgupta, A., Bhawmik, S., Chaudhuri, P.P.: Efficient Characterisation of Cellular Automata. IEE Proc., Part E\u00a01, 81\u201387 (1990)","journal-title":"IEE Proc., Part E"},{"key":"63_CR7","volume-title":"Shift-Register Sequences (revised edition)","author":"S. Golomb","year":"1982","unstructured":"Golomb, S.: Shift-Register Sequences (revised edition). Aegean press, Laguna Hills (1982)"},{"key":"63_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1007\/3-540-45067-X_38","volume-title":"Information Security and Privacy","author":"A. Kanso","year":"2003","unstructured":"Kanso, A.: Clock-Controlled Shrinking Generators. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol.\u00a02727, pp. 443\u2013451. Springer, Heidelberg (2003)"},{"key":"63_CR9","doi-asserted-by":"publisher","first-page":"1346","DOI":"10.1109\/12.338094","volume":"43","author":"S. Nandi","year":"1994","unstructured":"Nandi, S., Kar, B.K., Chaudhuri, P.P.: Theory and Applications of Cellular Automata in Cryptography. IEEE Transactions on Computers\u00a043, 1346\u20131357 (1994)","journal-title":"IEEE Transactions on Computers"},{"key":"63_CR10","first-page":"65","volume-title":"Contemporary Cryptology, The Science of Information","author":"R.A. Rueppel","year":"1992","unstructured":"Rueppel, R.A.: Stream Ciphers. In: Simmons, G.J. (ed.) Contemporary Cryptology, The Science of Information, pp. 65\u2013134. IEEE Press, Los Alamitos (1992)"},{"key":"63_CR11","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1038\/311419a0","volume":"311","author":"S. Wolfram","year":"1984","unstructured":"Wolfram, S.: Cellular Automata as Models of Complexity. Nature\u00a0311, 419 (1984)","journal-title":"Nature"},{"key":"63_CR12","series-title":"Lecture Notes in Computer Science","first-page":"22","volume-title":"Advances in Cryptology","author":"S. Wolfram","year":"1986","unstructured":"Wolfram, S.: Cryptography with Cellular Automata. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol.\u00a0218, pp. 22\u201339. Springer, Heidelberg (1986)"},{"key":"63_CR13","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1016\/0196-8858(86)90028-X","volume":"7","author":"S. Wolfram","year":"1986","unstructured":"Wolfram, S.: Random Sequence generation by Cellular Automata. Advances in Applied Mathematics\u00a07, 123 (1986)","journal-title":"Advances in Applied Mathematics"}],"container-title":["Lecture Notes in Computer Science","Cellular Automata"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30479-1_63","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,15]],"date-time":"2019-03-15T01:44:02Z","timestamp":1552614242000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30479-1_63"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540235965","9783540304791"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30479-1_63","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}