{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:39:35Z","timestamp":1725518375518},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540859116"},{"type":"electronic","value":"9783540859123"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-85912-3_5","type":"book-chapter","created":{"date-parts":[[2008,9,11]],"date-time":"2008-09-11T09:34:32Z","timestamp":1221125672000},"page":"51-59","source":"Crossref","is-referenced-by-count":0,"title":["A Study on the Pseudorandom Properties of Sequences Generated Via the Additive Order"],"prefix":"10.1007","author":[{"given":"Honggang","family":"Hu","sequence":"first","affiliation":[]},{"given":"Guang","family":"Gong","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"Chen, Z.: Finite binary sequences constructed by explicit inversive methods. Finite Fields Appl. (to appear)","DOI":"10.1016\/j.ffa.2007.08.002"},{"issue":"7","key":"5_CR2","doi-asserted-by":"publisher","first-page":"2397","DOI":"10.1109\/18.796380","volume":"45","author":"J.A. Davis","year":"1999","unstructured":"Davis, J.A., Jedwab, J.: Peak-to-mean power control in OFDM, Golay complementary sequences and Reed-Muller codes. IEEE Trans. Inform. Theory\u00a045(7), 2397\u20132417 (1999)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"5_CR3","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511546907","volume-title":"Signal Design for Good Correlation-For Wireless Communication, Cryptography and Radar","author":"S.W. Golomb","year":"2005","unstructured":"Golomb, S.W., Gong, G.: Signal Design for Good Correlation-For Wireless Communication, Cryptography and Radar. Cambridge Univ. Press, Cambridge (2005) (Section 6.6)"},{"key":"5_CR4","volume-title":"Finite Fields","author":"R. Lidl","year":"1983","unstructured":"Lidl, R., Niederreiter, H.: Finite Fields. Addison-Wesley, Reading (1983) (now distributed by Cambridge Univ. Press)"},{"key":"5_CR5","unstructured":"Lipmaa, H., Rogaway, P., Wagner, D.: Comments to NIST concerning AES modes of operations: CTR-mode encryption, http:\/\/www.cs.ucdavis.edu\/rogaway\/papers\/ctr.pdf"},{"issue":"3-4","key":"5_CR6","doi-asserted-by":"crossref","first-page":"305","DOI":"10.5486\/PMD.2007.3685","volume":"71","author":"C. Mauduit","year":"2007","unstructured":"Mauduit, C., Niederreiter, H., S\u00e1rk\u00f6zy, A.: On pseudorandom (0,1) and binary sequences. Publ. Math. Debrecen.\u00a071(3-4), 305\u2013324 (2007)","journal-title":"Publ. Math. Debrecen."},{"key":"5_CR7","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Finite Fields and Applications","author":"W. Meidl","year":"2003","unstructured":"Meidl, W., Winterhof, A.: On the autocorrelation of cyclotomic generator. In: Mullen, G.L., Poli, A., Stichtenoth, H. (eds.) Fq7 2003. LNCS, vol.\u00a02948, pp. 1\u201311. Springer, Heidelberg (2003)"},{"key":"5_CR8","doi-asserted-by":"publisher","first-page":"523","DOI":"10.2307\/2048345","volume":"111","author":"C.J. Moreno","year":"1991","unstructured":"Moreno, C.J., Moreno, O.: Exponential sums and Goppa codes: I. Proc. Amer. Math. Soc.\u00a0111, 523\u2013531 (1991)","journal-title":"Proc. Amer. Math. Soc."},{"key":"5_CR9","doi-asserted-by":"crossref","first-page":"387","DOI":"10.4064\/aa-93-4-387-399","volume":"93","author":"H. Niederreiter","year":"2000","unstructured":"Niederreiter, H., Winterhof, A.: Incomplete exponential sums over finite fields and their applications to new inversive pseudorandom number generators. Acta Arith.\u00a093, 387\u2013399 (2000)","journal-title":"Acta Arith."},{"issue":"1","key":"5_CR10","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1109\/18.817512","volume":"46","author":"K.G. Paterson","year":"2000","unstructured":"Paterson, K.G.: Generalized Reed-Muller codes and power control in OFDM modulation. IEEE Trans. Inform. Theory\u00a046(1), 104\u2013120 (2000)","journal-title":"IEEE Trans. Inform. Theory"}],"container-title":["Lecture Notes in Computer Science","Sequences and Their Applications - SETA 2008"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-85912-3_5.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,19]],"date-time":"2023-05-19T18:40:14Z","timestamp":1684521614000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-85912-3_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540859116","9783540859123"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-85912-3_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}