{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T02:18:17Z","timestamp":1742955497028,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540876557"},{"type":"electronic","value":"9783540876564"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-87656-4_59","type":"book-chapter","created":{"date-parts":[[2009,1,7]],"date-time":"2009-01-07T18:56:17Z","timestamp":1231354577000},"page":"475-482","source":"Crossref","is-referenced-by-count":0,"title":["On the Use of Linear Cellular Automata for the Synthesis of Cryptographic Sequences"],"prefix":"10.1007","author":[{"given":"A.","family":"F\u00faster-Sabater","sequence":"first","affiliation":[]},{"given":"P.","family":"Caballero-Gil","sequence":"additional","affiliation":[]},{"given":"O.","family":"Delgado","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"59_CR1","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1109\/18.370141","volume":"147","author":"G. Gong","year":"1995","unstructured":"Gong, G.: Theory and Applications of q-ary Interleaved Sequences. IEEE Trans. Information Theory\u00a0147, 400\u2013411 (1995)","journal-title":"IEEE Trans. Information Theory"},{"key":"59_CR2","volume-title":"Shift Register-Sequences","author":"S.W. Golomb","year":"1982","unstructured":"Golomb, S.W.: Shift Register-Sequences. Aegean Park Press, Laguna Hill (1982)"},{"key":"59_CR3","doi-asserted-by":"publisher","first-page":"1427","DOI":"10.1016\/j.am1.2002.09.003","volume":"17","author":"A. F\u00faster-Sabater","year":"2004","unstructured":"F\u00faster-Sabater, A.: Run Distribution in Nonlinear Binary Generators. Applied Mathematics Letters\u00a017, 1427\u20131432 (2004)","journal-title":"Applied Mathematics Letters"},{"key":"59_CR4","series-title":"Lecture Notes in Computer Science","volume-title":"Proc. Eurocrypt 1983","author":"S.M. Jennings","year":"1983","unstructured":"Jennings, S.M.: Multiplexed Sequences: Some Properties. In: Advances in Cryptology 1981 - 1997. LNCS, vol.\u00a0149. Springer, Heidelberg (1983)"},{"key":"59_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1007\/3-540-39757-4","volume-title":"Advances in Cryptology","author":"T. Beth","year":"1985","unstructured":"Beth, T., Piper, F.: The Stop-and-Go Generator. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol.\u00a0209, pp. 124\u2013132. Springer, Heidelberg (1985)"},{"key":"59_CR6","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1109\/49.17716","volume":"7","author":"D. Gollmann","year":"1989","unstructured":"Gollmann, D., Chambers, W.G.: Clock-Controlled Shift Register. IEEE J. Selected Areas Commun.\u00a07, 525\u2013533 (1989)","journal-title":"IEEE J. Selected Areas Commun."},{"key":"59_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1007\/3-540-48329-2_3","volume-title":"Advances in Cryptology - CRYPTO \u201993","author":"D. Coppersmith","year":"1994","unstructured":"Coppersmith, D., Krawczyk, H., Mansour, A.: The Shrinking Generator. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol.\u00a0773, pp. 22\u201339. Springer, Heidelberg (1994)"},{"key":"59_CR8","volume-title":"Introduction to Finite Fields and Their Applications","author":"R. Lidl","year":"1986","unstructured":"Lidl, R., Niederreiter, H.: Introduction to Finite Fields and Their Applications. Cambridge University Press, Cambridge (1986)"},{"key":"59_CR9","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.tcs.2004.11.021","volume":"334","author":"J. Kari","year":"2005","unstructured":"Kari, J.: A Survey of Cellular Automata. Theoretical Computer Science\u00a0334, 3\u201339 (2005)","journal-title":"Theoretical Computer Science"},{"key":"59_CR10","volume-title":"Additive Cellular Automata-Theory and Applications","author":"P.P. Chaudhuri","year":"1997","unstructured":"Chaudhuri, P.P., Chowdhury, D.R., Nandi, S., Chatterjee, S.: Additive Cellular Automata-Theory and Applications, vol.\u00a01. IEEE Computer Society Press, Los Alamitos (1997)"},{"issue":"7","key":"59_CR11","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1109\/43.55213","volume":"9","author":"M. Serra","year":"1990","unstructured":"Serra, M., Slater, T., Muzio, J.C., Miller, D.M.: The Analysis of One-dimensional Linear Cellular Automata and Their Aliasing Properties. IEEE Trans. on Computer-Aided Design\u00a09(7), 767\u2013778 (1990)","journal-title":"IEEE Trans. on Computer-Aided Design"},{"key":"59_CR12","series-title":"Advances in Soft Computing Series","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/978-3-540-74972-1_25","volume-title":"Innovations in Hybrid Intelligent Systems","author":"A. F\u00faster-Sabater","year":"2007","unstructured":"F\u00faster-Sabater, A., Caballero-Gil, P., Delgado, O.: Solving Linear Difference Equations by means of Cellular Automata. In: Corchado, E., Corchado, J.M., Abraham, A. (eds.) Innovations in Hybrid Intelligent Systems. Advances in Soft Computing Series, vol.\u00a044, pp. 183\u2013190. Springer, Heidelberg (2007)"},{"key":"59_CR13","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1109\/43.489103","volume":"15","author":"K. Cattell","year":"1996","unstructured":"Cattell, K., Muzzio, J.C.: Synthesis of One-Dimensional Linear Cellular Automata. IEEE Trans. Computers-Aided Design\u00a015, 325\u2013335 (1996)","journal-title":"IEEE Trans. Computers-Aided Design"},{"key":"59_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/BFb0053436","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"W. Meier","year":"1995","unstructured":"Meier, W., Staffelbach, O.: The Shelf-Shrinking Generator. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 205\u2013214. Springer, Heidelberg (1995)"}],"container-title":["Lecture Notes in Computer Science","Hybrid Artificial Intelligence Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-87656-4_59","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,2]],"date-time":"2024-05-02T03:41:12Z","timestamp":1714621272000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-540-87656-4_59"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540876557","9783540876564"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-87656-4_59","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}