{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T01:02:37Z","timestamp":1725584557677},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642213229"},{"type":"electronic","value":"9783642213236"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-21323-6_16","type":"book-chapter","created":{"date-parts":[[2011,5,30]],"date-time":"2011-05-30T15:24:58Z","timestamp":1306769098000},"page":"127-134","source":"Crossref","is-referenced-by-count":0,"title":["Structural Properties of Cryptographic Sequences"],"prefix":"10.1007","author":[{"given":"A.","family":"F\u00faster-Sabater","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","unstructured":"Bluetooth, Specifications of the Bluetooth system,Version 1.1, \n                    \n                      http:\/\/www.bluetooth.com\/"},{"key":"16_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1007\/3-540-48329-2_3","volume-title":"Advances in Cryptology - CRYPTO \u201993","author":"D. Coppersmith","year":"1994","unstructured":"Coppersmith, D., Krawczyk, H., Mansour, Y.: The Shrinking Generator. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol.\u00a0773, pp. 22\u201339. Springer, Heidelberg (1994)"},{"key":"16_CR3","first-page":"3","volume-title":"Linear Groups with an Exposition of the Galois Field Theory","author":"L.E. Dickson","year":"1958","unstructured":"Dickson, L.E.: Linear Groups with an Exposition of the Galois Field Theory, pp. 3\u201371. Dover, New York (1958); An updated reprint can be found at, \n                    \n                      http:\/\/www-math.cudenver.edu\/~wcherowi\/courses\/finflds.html"},{"key":"16_CR4","unstructured":"eSTREAM, the ECRYPT Stream Cipher Project, Call for Primitives, \n                    \n                      http:\/\/www.ecrypt.eu.org\/stream\/"},{"issue":"3","key":"16_CR5","doi-asserted-by":"publisher","first-page":"530","DOI":"10.1016\/j.tcs.2008.09.030","volume":"409","author":"A. F\u00faster-Sabater","year":"2008","unstructured":"F\u00faster-Sabater, A., Caballero-Gil, P.: Strategic Attack on the Shrinking Generator. Theoretical Computer Science\u00a0409(3), 530\u2013536 (2008)","journal-title":"Theoretical Computer Science"},{"key":"16_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"621","DOI":"10.1007\/978-3-642-01970-8_61","volume-title":"Computational Science \u2013 ICCS 2009","author":"A. F\u00faster-Sabater","year":"2009","unstructured":"F\u00faster-Sabater, A., Caballero-Gil, P., Delgado-Mohatar, O.: Deterministic Computation of Pseudorandomness in Sequences of Cryptographic Application. In: Allen, G., Nabrzyski, J., Seidel, E., van Albada, G.D., Dongarra, J., Sloot, P.M.A. (eds.) ICCS 2009. LNCS, vol.\u00a05544, pp. 621\u2013630. Springer, Heidelberg (2009)"},{"key":"16_CR7","volume-title":"Shift Register-Sequences","author":"S.W. Golomb","year":"1982","unstructured":"Golomb, S.W.: Shift Register-Sequences. Aegean Park Press, Laguna Hill (1982)"},{"key":"16_CR8","doi-asserted-by":"publisher","first-page":"714","DOI":"10.1109\/TIT.2004.825256","volume":"50","author":"Y. Hu","year":"2004","unstructured":"Hu, Y., Xiao, G.: Generalized Self-Shrinking Generator. IEEE Trans. Inform. Theory\u00a050, 714\u2013719 (2004)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"16_CR9","volume-title":"Introduction to Finite Fields and Their Applications","author":"R. Lidl","year":"1986","unstructured":"Lidl, R., Niederreiter, H.: Introduction to Finite Fields and Their Applications. Cambridge University Press, Cambridge (1986)"},{"key":"16_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/BFb0053436","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"W. Meier","year":"1995","unstructured":"Meier, W., Staffelbach, O.: The Self-shrinking Generator. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 205\u2013214. Springer, Heidelberg (1995)"},{"key":"16_CR11","volume-title":"Handbook of Applied Cryptography","author":"A.J. Menezes","year":"1997","unstructured":"Menezes, A.J., et al.: Handbook of Applied Cryptography. CRC Press, New York (1997)"},{"key":"16_CR12","unstructured":"NIST Test suite for random numbers, \n                    \n                      http:\/\/csrc.nist.gov\/rng\/"},{"key":"16_CR13","unstructured":"Rivest, R.L.: The RC4 Encryption Algorithm. RSA Data Sec., Inc., March 98, \n                    \n                      http:\/\/www.rsasecurity.com"},{"key":"16_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-68351-3","volume-title":"New Stream Cipher Designs","author":"M. Robshaw","year":"2008","unstructured":"Robshaw, M., Billet, O.: New Stream Cipher Designs. LNCS, vol.\u00a04986. Springer, Heidelberg (2008)"}],"container-title":["Lecture Notes in Computer Science","Computational Intelligence in Security for Information Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-21323-6_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,28]],"date-time":"2019-03-28T03:13:26Z","timestamp":1553742806000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-21323-6_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642213229","9783642213236"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-21323-6_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}