{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T13:12:45Z","timestamp":1725455565702},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642351297"},{"type":"electronic","value":"9783642351303"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-35130-3_19","type":"book-chapter","created":{"date-parts":[[2012,12,10]],"date-time":"2012-12-10T07:09:45Z","timestamp":1355123385000},"page":"265-276","source":"Crossref","is-referenced-by-count":0,"title":["Cryptographic Analysis of a Type of Sequence Generators"],"prefix":"10.1007","author":[{"given":"Alberto","family":"Peinado","sequence":"first","affiliation":[]},{"given":"Amparo","family":"F\u00faster-Sabater","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","unstructured":"Bluetooth, Specifications of the Bluetooth system, Version 1.1, \n                    \n                      http:\/\/www.bluetooth.com\/"},{"key":"19_CR2","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1109\/12.589245","volume":"46","author":"S. Blackburn","year":"1997","unstructured":"Blackburn, S., Murphy, S., Paterson, K.: Comments on Theory and Applications of Cellular Automata to Cryptography. IEEE Trans. on Computers\u00a046, 637\u2013638 (1997)","journal-title":"IEEE Trans. on Computers"},{"key":"19_CR3","unstructured":"eSTREAM, the ECRYPT Stream Cipher Project, The eSTREAM Portfolio in 2012 (2012), \n                    \n                      http:\/\/www.ecrypt.eu.org\/documents\/D.SYM.10-v1.pdf"},{"key":"19_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1007\/11861201_71","volume-title":"Cellular Automata","author":"A. F\u00faster-Sabater","year":"2006","unstructured":"F\u00faster-Sabater, A., Caballero-Gil, P.: Concatenated Automata in Cryptanalysis of Stream Ciphers. In: El Yacoubi, S., Chopard, B., Bandini, S. (eds.) ACRI 2006. LNCS, vol.\u00a04173, pp. 611\u2013616. Springer, Heidelberg (2006)"},{"key":"19_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/978-3-642-15979-4_27","volume-title":"Cellular Automata","author":"A. F\u00faster-Sabater","year":"2010","unstructured":"F\u00faster-Sabater, A., Caballero-Gil, P.: Chaotic Cellular Automata with Cryptographic Application. In: Bandini, S., Manzoni, S., Umeo, H., Vizzari, G. (eds.) ACRI 2010. LNCS, vol.\u00a06350, pp. 251\u2013260. Springer, Heidelberg (2010)"},{"key":"19_CR6","unstructured":"GSM, Global Systems for Mobile Communications, \n                    \n                      http:\/\/cryptome.org\/gsm-a512.html"},{"key":"19_CR7","unstructured":"Golomb, S.W.: Shift-Register Sequences, Revised edn. Aegean Park Press, Laguna Hill (1982)"},{"key":"19_CR8","doi-asserted-by":"publisher","first-page":"1702","DOI":"10.1109\/TIT.2010.2040887","volume":"56","author":"H. Hu","year":"2010","unstructured":"Hu, H., Gong, G.: New sets of zero or low correlation zone sequences via interleaving techniques. IEEE Trans. Informat. Theory\u00a056, 1702\u20131713 (2010)","journal-title":"IEEE Trans. Informat. Theory"},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"Lidl, R., Niederreiter, H.: Finite Fields. Cambridge University Press (1996)","DOI":"10.1017\/CBO9780511525926"},{"key":"19_CR10","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/TIT.1969.1054260","volume":"15","author":"J.L. Massey","year":"1969","unstructured":"Massey, J.L.: Shift Register Synthesis and BCH Decoding. IEEE Trans. Informat. Theory\u00a015, 122\u2013127 (1969)","journal-title":"IEEE Trans. Informat. Theory"},{"key":"19_CR11","volume-title":"Handbook of Applied Cryptography","author":"A.J. Menezes","year":"1997","unstructured":"Menezes, A.J., et al.: Handbook of Applied Cryptography. CRC Press, New York (1997)"},{"key":"19_CR12","doi-asserted-by":"publisher","first-page":"1097","DOI":"10.1049\/el:20020750","volume":"38","author":"R. Mita","year":"2002","unstructured":"Mita, R., Palumbo, G., Pennisi, S., Poli, M.: Pseudorandom bit generator based on dynamic linear feedback topology. Electronics Letters\u00a038, 1097\u20131098 (2002)","journal-title":"Electronics Letters"},{"key":"19_CR13","unstructured":"Mu\u00f1oz, J., Peinado, A.: On the characteristic polynomial of the product of matrices with irreducible characteristic polynomials, Tecnical report UMA-IC03-A0-002 (2003)"},{"key":"19_CR14","unstructured":"Rivest, R.L.: The RC4 Encryption Algorithm. RSA Data Sec., Inc. (March 1998)"},{"key":"19_CR15","unstructured":"Rueppel, R.: Stream Ciphers. In: Simmons, G.J. (ed.) Contemporary Cryptology, The Science of Information, pp. 65\u2013134. IEEE Press (1992)"},{"key":"19_CR16","doi-asserted-by":"publisher","first-page":"1131","DOI":"10.1016\/j.asoc.2006.10.003","volume":"7","author":"S.K. Tan","year":"2007","unstructured":"Tan, S.K., Guan, S.U.: Evolving cellular automata to generate nonlinear sequences with desirable properties. Applied Soft Computing\u00a07, 1131\u20131134 (2007)","journal-title":"Applied Soft Computing"},{"key":"19_CR17","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1016\/S1568-4946(01)00015-1","volume":"1","author":"M. Tomassini","year":"2001","unstructured":"Tomassini, M., Perrenoud, M.: Cryptography with cellular automata. Applied Soft Computing\u00a01, 151\u2013160 (2001)","journal-title":"Applied Soft Computing"},{"key":"19_CR18","unstructured":"Yet Another SSL (YASSL), \n                    \n                      http:\/\/www.yassl.com"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-35130-3_19.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T13:09:47Z","timestamp":1620133787000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-35130-3_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642351297","9783642351303"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-35130-3_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}