{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T13:32:51Z","timestamp":1725456771631},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642347030"},{"type":"electronic","value":"9783642347047"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34704-7_4","type":"book-chapter","created":{"date-parts":[[2012,10,19]],"date-time":"2012-10-19T02:38:37Z","timestamp":1350614317000},"page":"44-56","source":"Crossref","is-referenced-by-count":2,"title":["Searching Short Recurrences of Nonlinear Shift Registers via Directed Acyclic Graphs"],"prefix":"10.1007","author":[{"given":"Lin","family":"Wang","sequence":"first","affiliation":[]},{"given":"Bing","family":"Shen","sequence":"additional","affiliation":[]},{"given":"TongXu","family":"Qiao","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","series-title":"LNBIP","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/978-3-642-20511-8_11","volume-title":"Business Process Management Workshops","author":"A. Adriansyah","year":"2011","unstructured":"Adriansyah, A., van Dongen, B.F., van der Aalst, W.M.P.: Towards Robust Conformance Checking. In: zur Muehlen, M., Su, J. (eds.) BPM 2010 Workshops. LNBIP, vol.\u00a066, pp. 122\u2013133. Springer, Heidelberg (2011)"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"Bondy, J.A., Murty, U.S.R.: Graph Theory. Springer (2008)","DOI":"10.1007\/978-1-84628-970-5"},{"key":"4_CR3","volume-title":"Introduction to Algorithms","author":"T.H. Cormen","year":"2001","unstructured":"Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: Introduction to Algorithms, 2nd edn. The MIT Press, Cambridge (2001)","edition":"2"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"De Canni\u00e8re, C., Preneel, B.: Trivium: a Stream Cipher Construction Inspired by Block Cipher Design Principles. eSTREAM, ECRYPT Stream Cipher Project, Report 2006\/021, \n                  \n                    http:\/\/www.ecrypt.eu.org\/stream\/papersdir\/2006\/021","DOI":"10.1007\/11836810_13"},{"key":"4_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/978-3-540-68351-3_18","volume-title":"New Stream Cipher Designs","author":"C. Canni\u00e8re De","year":"2008","unstructured":"De Canni\u00e8re, C., Preneel, B.: Trivium. In: Robshaw, M., Billet, O. (eds.) New Stream Cipher Designs. LNCS, vol.\u00a04986, pp. 244\u2013266. Springer, Heidelberg (2008)"},{"key":"4_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/978-3-642-15874-2_3","volume-title":"Sequences and Their Applications \u2013 SETA 2010","author":"J. Chabloz","year":"2010","unstructured":"Chabloz, J., Mansouri, S.S., Dubrova, E.: An Algorithm for Constructing a Fastest Galois NLFSR Generating a Given Sequence. In: Carlet, C., Pott, A. (eds.) SETA 2010. LNCS, vol.\u00a06338, pp. 41\u201354. Springer, Heidelberg (2010)"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Daemen, J., Rijmen, V.: The Design of Rijindael: AES - the Advanced Encryption Standard. Springer (2001)","DOI":"10.1007\/978-3-662-04722-4_1"},{"issue":"11","key":"4_CR8","doi-asserted-by":"publisher","first-page":"5263","DOI":"10.1109\/TIT.2009.2030467","volume":"55","author":"E. Dubrova","year":"2009","unstructured":"Dubrova, E.: A Transformation from the Fibonacci to the Galois NLFSRs. IEEE Transactions on Information Theory\u00a055(11), 5263\u20135271 (2009)","journal-title":"IEEE Transactions on Information Theory"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Foulds, L.R.: Graph Theory Applications. Springer (1992)","DOI":"10.1007\/978-1-4612-0933-1"},{"key":"4_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/3-540-44983-3_17","volume-title":"Selected Areas in Cryptography","author":"J.D. Goli\u0107","year":"2001","unstructured":"Goli\u0107, J.D.: Modes of Operation of Stream Ciphers. In: Stinson, D.R., Tavares, S. (eds.) SAC 2000. LNCS, vol.\u00a02012, pp. 233\u2013247. Springer, Heidelberg (2001)"},{"key":"4_CR11","volume-title":"Shift Register Sequences","author":"S. Golomb","year":"1982","unstructured":"Golomb, S.: Shift Register Sequences. Aegean Park Press, Walnut Creek (1982)"},{"key":"4_CR12","unstructured":"Russell, S.J., Norvis, P.: Artificial Intelligence: a Modern Approach. Prentice Hall, Inc. (1995)"},{"key":"4_CR13","unstructured":"Wan, Z.X., Dai, Z.D., Liu, M.L., Feng, X.N.: Nonlinear Shift Registers. Science Press (1978) (in Chinese)"},{"key":"4_CR14","unstructured":"Wan, Z.X.: Algebra and Codes. Science Press (1980) (in Chinese)"},{"key":"4_CR15","unstructured":"Data Assurance & Communication Security Center, Chinese Science Academy, 3GPP Confidentiality and Integrity Algorithms 128-EEA3 & 128-EIA3, \n                  \n                    http:\/\/zucalg.forumotion.net\/"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34704-7_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,8]],"date-time":"2019-05-08T06:47:32Z","timestamp":1557298052000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34704-7_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642347030","9783642347047"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34704-7_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}