{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T09:47:05Z","timestamp":1764841625273,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642054433"},{"type":"electronic","value":"9783642054457"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-05445-7_27","type":"book-chapter","created":{"date-parts":[[2009,11,3]],"date-time":"2009-11-03T10:03:23Z","timestamp":1257242603000},"page":"433-448","source":"Crossref","is-referenced-by-count":23,"title":["A New Approach for FCSRs"],"prefix":"10.1007","author":[{"given":"Franc\u0328ois","family":"Arnault","sequence":"first","affiliation":[]},{"given":"Thierry","family":"Berger","sequence":"additional","affiliation":[]},{"given":"C\u00e9dric","family":"Lauradoux","sequence":"additional","affiliation":[]},{"given":"Marine","family":"Minier","sequence":"additional","affiliation":[]},{"given":"Benjamin","family":"Pousse","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"27_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"174","DOI":"10.1007\/3-540-58108-1_21","volume-title":"Fast Software Encryption","author":"A. Klapper","year":"1994","unstructured":"Klapper, A., Goresky, M.: 2-adic shift registers. In: Anderson, R. (ed.) FSE 1993. LNCS, vol.\u00a0809, pp. 174\u2013178. Springer, Heidelberg (1994)"},{"issue":"2","key":"27_CR2","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/s001459900024","volume":"10","author":"A. Klapper","year":"1997","unstructured":"Klapper, A., Goresky, M.: Feedback shift registers, 2-adic span and combiners with memory. Journal of Cryptology\u00a010(2), 111\u2013147 (1997)","journal-title":"Journal of Cryptology"},{"key":"27_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1007\/11423461_3","volume-title":"Sequences and Their Applications - SETA 2004","author":"A. Klapper","year":"2005","unstructured":"Klapper, A.: A survey of feedback with carry shift registers. In: Helleseth, T., Sarwate, D., Song, H.-Y., Yang, K. (eds.) SETA 2004. LNCS, vol.\u00a03486, pp. 56\u201371. Springer, Heidelberg (2005)"},{"key":"27_CR4","unstructured":"Fischer, S., Meier, W., Stegemann, D.: Equivalent Representations of the F-FCSR Keystream Generator. In: ECRYPT Network of Excellence - SASC Workshop, pp. 87\u201394 (2008), \n                    \n                      http:\/\/www.ecrypt.eu.org\/stvl\/sasc2008\/"},{"key":"27_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1007\/978-3-540-89255-7_34","volume-title":"Advances in Cryptology - ASIACRYPT 2008","author":"M. Hell","year":"2008","unstructured":"Hell, M., Johansson, T.: Breaking the F-FCSR-H stream cipher in real time. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol.\u00a05350, pp. 557\u2013569. Springer, Heidelberg (2008)"},{"key":"27_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1007\/11502760_6","volume-title":"Fast Software Encryption","author":"F. Arnault","year":"2005","unstructured":"Arnault, F., Berger, T.P.: F-FCSR: Design of a new class of stream ciphers. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol.\u00a03557, pp. 83\u201397. Springer, Heidelberg (2005)"},{"key":"27_CR7","unstructured":"Arnault, F., Berger, T.P., Lauradoux, C.: Update on F-FCSR Stream Cipher. ECRYPT - Network of Excellence in Cryptology (Call for stream Cipher Primitives - Phase 2 2006) (2006), \n                    \n                      http:\/\/www.ecrypt.eu.org\/stream\/"},{"key":"27_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"670","DOI":"10.1007\/3-540-46885-4_66","volume-title":"Advances in Cryptology - EUROCRYPT \u201989","author":"Y. Roggeman","year":"1990","unstructured":"Roggeman, Y.: Varying feedback shift registers. In: Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol.\u00a0434, pp. 670\u2013679. Springer, Heidelberg (1990)"},{"key":"27_CR9","unstructured":"Jansen, C.J., Helleseth, T., Kholosha, A.: Cascade jump controlled sequence generator and pomaranch stream cipher (version 2). eSTREAM, ECRYPT Stream Cipher Project, Report 2006\/006 (2006), \n                    \n                      http:\/\/www.ecrypt.eu.org\/stream"},{"issue":"9","key":"27_CR10","doi-asserted-by":"publisher","first-page":"1306","DOI":"10.1109\/TCAD.2004.831584","volume":"23","author":"G. Mrugalski","year":"2004","unstructured":"Mrugalski, G., Rajski, J., Tyszer, J.: Ring generators - new devices for embedded test applications. IEEE Trans. on CAD of Integrated Circuits and Systems\u00a023(9), 1306\u20131320 (2004)","journal-title":"IEEE Trans. on CAD of Integrated Circuits and Systems"},{"key":"27_CR11","unstructured":"Jansen, C.J., Helleseth, T., Kholosha, A.: Pomaranch version 3. eSTREAM, ECRYPT Stream Cipher Project (2006), \n                    \n                      http:\/\/www.ecrypt.eu.org\/stream"},{"key":"27_CR12","volume-title":"p-adic numbers, p-adic analysis and Zeta-Functions","author":"N. Koblitz","year":"1997","unstructured":"Koblitz, N.: p-adic numbers, p-adic analysis and Zeta-Functions. Springer, Heidelberg (1997)"},{"issue":"11","key":"27_CR13","doi-asserted-by":"publisher","first-page":"2826","DOI":"10.1109\/TIT.2002.804048","volume":"48","author":"M. Goresky","year":"2002","unstructured":"Goresky, M., Klapper, A.: Fibonacci and Galois representations of feedback-with-carry shift registers. IEEE Transactions on Information Theory\u00a048(11), 2826\u20132836 (2002)","journal-title":"IEEE Transactions on Information Theory"},{"issue":"11","key":"27_CR14","doi-asserted-by":"publisher","first-page":"1374","DOI":"10.1109\/TC.2005.181","volume":"54","author":"F. Arnault","year":"2005","unstructured":"Arnault, F., Berger, T.P.: Design and Properties of a New Pseudorandom Generator Based on a Filtered FCSR Automaton. IEEE Transaction on Computers\u00a054(11), 1374\u20131383 (2005)","journal-title":"IEEE Transaction on Computers"},{"key":"27_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1007\/978-3-540-85912-3_27","volume-title":"Sequences and Their Applications - SETA 2008","author":"C. Lauradoux","year":"2008","unstructured":"Lauradoux, C., R\u00f6ck, A.: Parallel generation of \u2113-sequences. In: Golomb, S.W., Parker, M.G., Pott, A., Winterhof, A. (eds.) SETA 2008. LNCS, vol.\u00a05203, pp. 299\u2013312. Springer, Heidelberg (2008)"},{"issue":"2","key":"27_CR16","doi-asserted-by":"publisher","first-page":"836","DOI":"10.1109\/TIT.2007.913244","volume":"54","author":"F. Arnault","year":"2008","unstructured":"Arnault, F., Berger, T.P., Minier, M.: Some Results on FCSR Automata With Applications to the Security of FCSR-Based Pseudorandom Generators. IEEE Transactions on Information Theory\u00a054(2), 836\u2013840 (2008)","journal-title":"IEEE Transactions on Information Theory"},{"key":"27_CR17","unstructured":"Goldberg, I., Wagner, D.: Architectural considerations for cryptanalytic hardware. Technical report, Secrets of Encryption Research, Wiretap Politics & Chip Design (1996)"},{"key":"27_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1007\/11941378_31","volume-title":"Progress in Cryptology - INDOCRYPT 2006","author":"A. Joux","year":"2006","unstructured":"Joux, A., Delaunay, P.: Galois LFSR, embedded devices and side channel weaknesses. In: Barua, R., Lange, T. (eds.) INDOCRYPT 2006. LNCS, vol.\u00a04329, pp. 436\u2013451. Springer, Heidelberg (2006)"},{"key":"27_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1007\/978-3-540-68164-9_18","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2008","author":"A. R\u00f6ck","year":"2008","unstructured":"R\u00f6ck, A.: Stream ciphers using a random update function: Study of the entropy of the inner state. In: Vaudenay, S. (ed.) AFRICACRYPT 2008. LNCS, vol.\u00a05023, pp. 258\u2013275. Springer, Heidelberg (2008)"},{"key":"27_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/11596219_14","volume-title":"Progress in Cryptology - INDOCRYPT 2005","author":"J. Hong","year":"2005","unstructured":"Hong, J., Kim, W.H.: TMD-Tradeoff and State Entropy Loss Considerations of Streamcipher MICKEY. In: Maitra, S., Veni Madhavan, C.E., Venkatesan, R. (eds.) INDOCRYPT 2005. LNCS, vol.\u00a03797, pp. 169\u2013182. Springer, Heidelberg (2005)"}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-05445-7_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,29]],"date-time":"2020-01-29T11:31:31Z","timestamp":1580297491000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-05445-7_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642054433","9783642054457"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-05445-7_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}