{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T16:15:46Z","timestamp":1742919346920,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642396397"},{"type":"electronic","value":"9783642396403"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-39640-3_3","type":"book-chapter","created":{"date-parts":[[2013,6,21]],"date-time":"2013-06-21T02:25:58Z","timestamp":1371781558000},"page":"33-47","source":"Crossref","is-referenced-by-count":1,"title":["Aspects of Linearity in Cryptographic Sequence Generators"],"prefix":"10.1007","author":[{"given":"Amparo","family":"F\u00faster-Sabater","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","unstructured":"Bluetooth, Specifications of the Bluetooth system, Version 1.1, \n                      http:\/\/www.bluetooth.com\/"},{"key":"3_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1007\/3-540-48329-2_3","volume-title":"Advances in Cryptology - CRYPTO \u201993","author":"D. Coppersmith","year":"1994","unstructured":"Coppersmith, D., Krawczyk, H., Mansour, Y.: The Shrinking Generator. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol.\u00a0773, pp. 22\u201339. Springer, Heidelberg (1994)"},{"key":"3_CR3","unstructured":"Dickson, L.E.: Linear Groups with an Exposition of the Galois Field Theory, pp. 3\u201371. Dover, New York (1958), An updated reprint can be found at \n                      http:\/\/www-math.cudenver.edu\/~wcherowi\/courses\/finflds.html"},{"key":"3_CR4","unstructured":"eSTREAM, the ECRYPT Stream Cipher Project, Call for Primitives, \n                      http:\/\/www.ecrypt.eu.org\/stream\/"},{"issue":"3","key":"3_CR5","doi-asserted-by":"publisher","first-page":"530","DOI":"10.1016\/j.tcs.2008.09.030","volume":"409","author":"A. F\u00faster-Sabater","year":"2008","unstructured":"F\u00faster-Sabater, A., Caballero-Gil, P.: Strategic Attack on the Shrinking Generator. Theoretical Computer Science\u00a0409(3), 530\u2013536 (2008)","journal-title":"Theoretical Computer Science"},{"key":"3_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"621","DOI":"10.1007\/978-3-642-01970-8_61","volume-title":"Computational Science \u2013 ICCS 2009","author":"A. F\u00faster-Sabater","year":"2009","unstructured":"F\u00faster-Sabater, A., Caballero-Gil, P., Delgado-Mohatar, O.: Deterministic Computation of Pseudorandomness in Sequences of Cryptographic Application. In: Allen, G., Nabrzyski, J., Seidel, E., van Albada, G.D., Dongarra, J., Sloot, P.M.A. (eds.) ICCS 2009, Part I. LNCS, vol.\u00a05544, pp. 621\u2013630. Springer, Heidelberg (2009)"},{"key":"3_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"563","DOI":"10.1007\/978-3-642-21928-3_41","volume-title":"Computational Science and Its Applications - ICCSA 2011","author":"A. F\u00faster-Sabater","year":"2011","unstructured":"F\u00faster-Sabater, A.: Generation of Pseudorandom Binary Sequences with Controllable Cryptographic Parameters. In: Murgante, B., Gervasi, O., Iglesias, A., Taniar, D., Apduhan, B.O. (eds.) ICCSA 2011, Part I. LNCS, vol.\u00a06782, pp. 563\u2013572. Springer, Heidelberg (2011)"},{"key":"3_CR8","volume-title":"Shift Register-Sequences","author":"S.W. Golomb","year":"1982","unstructured":"Golomb, S.W.: Shift Register-Sequences. Aegean Park Press, Laguna Hill (1982)"},{"issue":"2","key":"3_CR9","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1109\/18.370141","volume":"41","author":"G. Gong","year":"1995","unstructured":"Gong, G.: Theory and Applications of q-ary Interleaved Sequences. IEEE Trans. Information Theory\u00a041(2), 400\u2013411 (1995)","journal-title":"IEEE Trans. Information Theory"},{"issue":"12","key":"3_CR10","doi-asserted-by":"publisher","first-page":"1662","DOI":"10.1016\/j.jsc.2007.12.004","volume":"44","author":"K. Lee","year":"2009","unstructured":"Lee, K., O\u2019Sullivan, M.E.: List decoding of Hermitian codes using Gr\u00f6bner bases. Journal of Symbolic Computation\u00a044(12), 1662\u20131675 (2009)","journal-title":"Journal of Symbolic Computation"},{"key":"3_CR11","doi-asserted-by":"publisher","first-page":"714","DOI":"10.1109\/TIT.2004.825256","volume":"50","author":"Y. Hu","year":"2004","unstructured":"Hu, Y., Xiao, G.: Generalized Self-Shrinking Generator. IEEE Trans. Inform. Theory\u00a050, 714\u2013719 (2004)","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"6","key":"3_CR12","doi-asserted-by":"publisher","first-page":"732","DOI":"10.1109\/TIT.1976.1055626","volume":"22","author":"E.L. Key","year":"1976","unstructured":"Key, E.L.: An Analysis of the Structure and Complexity of Nonlinear Binary Sequence Generators. IEEE Trans. Informat. Theory\u00a022(6), 732\u2013736 (1976)","journal-title":"IEEE Trans. Informat. Theory"},{"key":"3_CR13","volume-title":"Introduction to Finite Fields and Their Applications","author":"R. Lidl","year":"1986","unstructured":"Lidl, R., Niederreiter, H.: Introduction to Finite Fields and Their Applications. Cambridge University Press, Cambridge (1986)"},{"issue":"1","key":"3_CR14","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/TIT.1969.1054260","volume":"15","author":"J.L. Massey","year":"1969","unstructured":"Massey, J.L.: Shift-Register Synthesis and BCH Decoding. IEEE Trans. Informat. Theory\u00a015(1), 122\u2013127 (1969)","journal-title":"IEEE Trans. Informat. Theory"},{"key":"3_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/BFb0053436","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"W. Meier","year":"1995","unstructured":"Meier, W., Staffelbach, O.: The Self-Shrinking Generator. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 205\u2013214. Springer, Heidelberg (1995)"},{"key":"3_CR16","volume-title":"Handbook of Applied Cryptography","author":"A.J. Menezes","year":"1997","unstructured":"Menezes, A.J., et al.: Handbook of Applied Cryptography. CRC Press, New York (1997)"},{"key":"3_CR17","unstructured":"Rivest, R.L.: The RC4 Encryption Algorithm. RSA Data Sec., Inc. (March 1998)"},{"issue":"2","key":"3_CR18","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1016\/j.aml.2010.08.026","volume":"24","author":"J.S. Respondek","year":"2011","unstructured":"Respondek, J.S.: On the confluent Vandermonde matrix calculation algorithm. Applied Mathematics Letters\u00a024(2), 103\u2013106 (2011)","journal-title":"Applied Mathematics Letters"},{"issue":"5","key":"3_CR19","doi-asserted-by":"publisher","first-page":"2044","DOI":"10.1016\/j.amc.2011.07.017","volume":"218","author":"J.S. Respondek","year":"2011","unstructured":"Respondek, J.S.: Numerical recipes for the high efficient inverse of the confluent Vandermonde matrices. Applied Mathematics and Computation\u00a0218(5), 2044\u20132054 (2011)","journal-title":"Applied Mathematics and Computation"},{"key":"3_CR20","series-title":"Lecture Notes in Computer Science","volume-title":"New Stream Cipher Designs: The eSTREAM Finalist","year":"2008","unstructured":"Robshaw, M., Billet, O. (eds.): New Stream Cipher Designs. LNCS, vol.\u00a04986. Springer, Heidelberg (2008)"},{"key":"3_CR21","unstructured":"Yet Another SSL (YASSL), \n                      http:\/\/www.yassl.com"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2013"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-39640-3_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,7]],"date-time":"2023-02-07T16:00:00Z","timestamp":1675785600000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-39640-3_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642396397","9783642396403"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-39640-3_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}