{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T09:04:21Z","timestamp":1743152661187,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642396397"},{"type":"electronic","value":"9783642396403"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-39640-3_30","type":"book-chapter","created":{"date-parts":[[2013,6,21]],"date-time":"2013-06-21T02:25:58Z","timestamp":1371781558000},"page":"407-420","source":"Crossref","is-referenced-by-count":0,"title":["Analysis of the Linear Complexity in Pseudorandom Sequence Generators"],"prefix":"10.1007","author":[{"given":"Amparo","family":"F\u00faster-Sabater","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"30_CR1","doi-asserted-by":"publisher","first-page":"4029","DOI":"10.1016\/j.cnsns.2012.03.020","volume":"17","author":"N. Nagaraj","year":"2012","unstructured":"Nagaraj, N.: One-Time Pad as a nonlinear dynamical system. Commun Nonlinear Sci. Numer Simulat.\u00a017, 4029\u20134036 (2012)","journal-title":"Commun Nonlinear Sci. Numer Simulat."},{"key":"30_CR2","unstructured":"eSTREAM, the ECRYPT Stream Cipher Project,The eSTREAM Portfolio (2012), \n                      http:\/\/www.ecrypt.eu.org\/documents\/D.SYM.10-v1.pdf"},{"key":"30_CR3","series-title":"Lecture Notes in Computer Science","volume-title":"New Stream Cipher Designs","year":"2008","unstructured":"Robshaw, M., Billet, O. (eds.): New Stream Cipher Designs. LNCS, vol.\u00a04986. Springer, Heidelberg (2008)"},{"key":"30_CR4","volume-title":"Handbook of Applied Cryptography","author":"A.J. Menezes","year":"1997","unstructured":"Menezes, A.J., et al.: Handbook of Applied Cryptography. CRC Press, New York (1997)"},{"key":"30_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04101-3","volume-title":"Understanding Cryptography","author":"C. Paar","year":"2010","unstructured":"Paar, C., Pelzl, J.: Understanding Cryptography. Springer, Heidelberg (2010)"},{"key":"30_CR6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-82865-2","volume-title":"Analysis and Design of Stream Ciphers","author":"R.A. Rueppel","year":"1986","unstructured":"Rueppel, R.A.: Analysis and Design of Stream Ciphers. Springer, New York (1986)"},{"key":"30_CR7","doi-asserted-by":"publisher","first-page":"1131","DOI":"10.1016\/j.asoc.2006.10.003","volume":"7","author":"S.K. Tan","year":"2007","unstructured":"Tan, S.K., Guan, S.U.: Evolving cellular automata to generate nonlinear sequences with desirable properties. Applied Soft Computing\u00a07, 1131\u20131134 (2007)","journal-title":"Applied Soft Computing"},{"key":"30_CR8","volume-title":"Shift-Register Sequences","author":"S. Golomb","year":"1982","unstructured":"Golomb, S.: Shift-Register Sequences, revised edn. Aegean Park Press, Laguna Hills (1982)","edition":"2"},{"key":"30_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"621","DOI":"10.1007\/978-3-642-01970-8_61","volume-title":"Computational Science \u2013 ICCS 2009","author":"A. F\u00faster-Sabater","year":"2009","unstructured":"F\u00faster-Sabater, A., Caballero-Gil, P., Delgado-Mohatar, O.: Deterministic Computation of Pseudorandomness in Sequences of Cryptographic Application. In: Allen, G., Nabrzyski, J., Seidel, E., van Albada, G.D., Dongarra, J., Sloot, P.M.A. (eds.) ICCS 2009, Part I. LNCS, vol.\u00a05544, pp. 621\u2013630. Springer, Heidelberg (2009)"},{"key":"30_CR10","doi-asserted-by":"publisher","first-page":"1876","DOI":"10.1016\/j.asoc.2010.06.002","volume":"11","author":"A. F\u00faster-Sabater","year":"2011","unstructured":"F\u00faster-Sabater, A., Caballero-Gil, P.: Chaotic modelling of the generalized self-shrinking generator. Appl. Soft Comput.\u00a011, 1876\u20131880 (2011)","journal-title":"Appl. Soft Comput."},{"key":"30_CR11","unstructured":"A. Marsaglia, Test of DIEHARD (1998), \n                      http:\/\/stat.fsu.edu\/pub\/diehard\/"},{"issue":"1","key":"30_CR12","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/TIT.1969.1054260","volume":"15","author":"J.L. Massey","year":"1969","unstructured":"Massey, J.L.: Shift-Register Synthesis and BCH Decoding. IEEE Trans. Information Theory\u00a015(1), 122\u2013127 (1969)","journal-title":"IEEE Trans. Information Theory"},{"key":"30_CR13","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.ins.2003.06.002","volume":"164","author":"P. Caballero-Gil","year":"2004","unstructured":"Caballero-Gil, P., F\u00faster-Sabater, A.: A wide family of nonlinear filter functions with large linear span. Inform. Sci.\u00a0164, 197\u2013207 (2004)","journal-title":"Inform. Sci."},{"key":"30_CR14","doi-asserted-by":"publisher","first-page":"1786","DOI":"10.1109\/TIT.2008.917639","volume":"54","author":"K. Limniotis","year":"2008","unstructured":"Limniotis, K., Kolokotronis, N., Kalouptsidis, N.: On the Linear Complexity of Sequences Obtained by State Space Generators. IEEE Trans. Inform. Theory\u00a054, 1786\u20131793 (2008)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"30_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/11863854_23","volume-title":"Sequences and Their Applications \u2013 SETA 2006","author":"N. Kolokotronis","year":"2006","unstructured":"Kolokotronis, N., Limniotis, K., Kalouptsidis, N.: Lower Bounds on Sequence Complexity Via Generalised Vandermonde Determinants. In: Gong, G., Helleseth, T., Song, H.-Y., Yang, K. (eds.) SETA 2006. LNCS, vol.\u00a04086, pp. 271\u2013284. Springer, Heidelberg (2006)"},{"issue":"12","key":"30_CR16","doi-asserted-by":"publisher","first-page":"1662","DOI":"10.1016\/j.jsc.2007.12.004","volume":"44","author":"K. Lee","year":"2009","unstructured":"Lee, K., O\u2019Sullivan, M.E.: List decoding of Hermitian codes using Gr\u00f6bner bases. Journal of Symbolic Computation\u00a044(12), 1662\u20131675 (2009)","journal-title":"Journal of Symbolic Computation"},{"issue":"2","key":"30_CR17","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1016\/j.aml.2010.08.026","volume":"24","author":"J.S. Respondek","year":"2011","unstructured":"Respondek, J.S.: On the confluent Vandermonde matrix calculation algorithm. Applied Mathematics Letters\u00a024(2), 103\u2013106 (2011)","journal-title":"Applied Mathematics Letters"},{"issue":"5","key":"30_CR18","doi-asserted-by":"publisher","first-page":"2044","DOI":"10.1016\/j.amc.2011.07.017","volume":"218","author":"J.S. Respondek","year":"2011","unstructured":"Respondek, J.S.: Numerical recipes for the high efficient inverse of the confluent Vandermonde matrices. Applied Mathematics and Computation\u00a0218(5), 2044\u20132054 (2011)","journal-title":"Applied Mathematics and Computation"},{"key":"30_CR19","volume-title":"Enciclopedia of Mathematics and Its Applications","author":"R. Lidl","year":"1997","unstructured":"Lidl, R., Niederreiter, H.: Finite Fields. In: Enciclopedia of Mathematics and Its Applications, 2nd edn., vol.\u00a020. Cambridge University Press, Cambridge (1997)","edition":"2"},{"issue":"5","key":"30_CR20","doi-asserted-by":"publisher","first-page":"1752","DOI":"10.1109\/TIT.2007.894690","volume":"53","author":"S. Ronjom","year":"2007","unstructured":"Ronjom, S., Helleseth, T.: A New Attack on the Filter Generator. IEEE Trans. Information Theory\u00a053(5), 1752\u20131758 (2007)","journal-title":"IEEE Trans. Information Theory"},{"key":"30_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1007\/978-3-642-13858-4_3","volume-title":"Fast Software Encryption","author":"S. R\u00f8njom","year":"2010","unstructured":"R\u00f8njom, S., Cid, C.: Nonlinear Equivalence of Stream Ciphers. In: Hong, S., Iwata, T. (eds.) FSE 2010. LNCS, vol.\u00a06147, pp. 40\u201354. Springer, Heidelberg (2010)"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2013"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-39640-3_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,13]],"date-time":"2023-02-13T20:20:51Z","timestamp":1676319651000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-39640-3_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642396397","9783642396403"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-39640-3_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}