{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T04:04:30Z","timestamp":1746331470157,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662438794"},{"type":"electronic","value":"9783662438800"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-43880-0_64","type":"book-chapter","created":{"date-parts":[[2014,6,25]],"date-time":"2014-06-25T09:42:01Z","timestamp":1403689321000},"page":"557-564","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Pseudorandom Bit Generator with Parallel Implementation"],"prefix":"10.1007","author":[{"given":"Borislav","family":"Stoyanov","sequence":"first","affiliation":[]},{"given":"Krasimir","family":"Kordov","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,6,26]]},"reference":[{"issue":"4","key":"64_CR1","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/0898-1221(96)00122-8","volume":"32","author":"A Al Jabri","year":"1996","unstructured":"Al Jabri, A.: Shrinking generators and statistical leakage. Comput. Math. Appl. 32(4), 33\u201339 (1996)","journal-title":"Comput. Math. Appl."},{"key":"64_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/11502760_6","volume-title":"Fast Software Encryption","author":"F Arnault","year":"2005","unstructured":"Arnault, F., Berger, T.P.: F-FCSR: design of a new class of stream ciphers. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol. 3557, pp. 83\u201397. Springer, Heidelberg (2005)"},{"key":"64_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1007\/978-3-540-77026-8_26","volume-title":"Progress in Cryptology \u2013 INDOCRYPT 2007","author":"F Arnault","year":"2007","unstructured":"Arnault, F., Berger, T.P., Lauradoux, C., Minier, M.: X-FCSR \u2013 a new software oriented stream cipher based upon FCSRs. In: Srinathan, K., Rangan, C.P., Yung, M. (eds.) INDOCRYPT 2007. LNCS, vol. 4859, pp. 341\u2013350. Springer, Heidelberg (2007)"},{"key":"64_CR4","unstructured":"Erguler, I., Anarim, E.: The editing bit-search generator. In: National Cryptology Symposium II, pp. 154\u2013165, Ankara (2006)"},{"key":"64_CR5","volume-title":"Shift Register Sequences","author":"S Golomb","year":"1982","unstructured":"Golomb, S.: Shift Register Sequences. Aegean Park Press, Laguna Hills (1982)"},{"key":"64_CR6","unstructured":"Gouget, A., Sibert, H.: The bit-search generator. In: The State of the Art of Stream Cipher: Workshop Record, pp. 60\u201368 (2004)"},{"key":"64_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1007\/11502760_13","volume-title":"Fast Software Encryption","author":"A Gouget","year":"2005","unstructured":"Gouget, A., Sibert, H., Berbain, C., Courtois, N.T., Debraize, B., Mitchell, C.: Analysis of the bit-search generator and sequence compression techniques. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol. 3557, pp. 196\u2013214. Springer, Heidelberg (2005)"},{"issue":"2","key":"64_CR8","first-page":"119","volume":"39","author":"S Karthikeyan","year":"2012","unstructured":"Karthikeyan, S., Sairam, N., Manikandan, G., Sivaguru, J.: A parallel approach for improving data security. J. Theor. Appl. Inf. Technol. 39(2), 119\u2013125 (2012)","journal-title":"J. Theor. Appl. Inf. Technol."},{"key":"64_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1007\/3-540-60590-8_14","volume-title":"Fast Software Encryption","author":"A Klapper","year":"1995","unstructured":"Klapper, A.: Feedback with carry shift register over finite fields. In: Preneel, B. (ed.) FSE 1994. LNCS, vol. 1008, pp. 170\u2013178. Springer, Heidelberg (1995)"},{"key":"64_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1007\/3-540-68339-9_23","volume-title":"Advances in Cryptology - EUROCRYPT \u201996","author":"A Klapper","year":"1996","unstructured":"Klapper, A.: On the existence of secure feedback registers. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 256\u2013267. Springer, Heidelberg (1996)"},{"issue":"2","key":"64_CR11","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/s001459900024","volume":"10","author":"A Klapper","year":"1997","unstructured":"Klapper, A., Goresky, M.: Feedback Shift registers, 2-adic span, and combiners with memory. J. Cryptol. 10(2), 111\u2013147 (1997)","journal-title":"J. Cryptol."},{"key":"64_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1007\/978-3-540-85912-3_27","volume-title":"Sequences and Their Applications - SETA 2008","author":"C Lauradoux","year":"2008","unstructured":"Lauradoux, C., R\u00f6ck, A.: Parallel generation of $$\\ell $$-sequences. In: Golomb, S.W., Parker, M.G., Pott, A., Winterhof, A. (eds.) SETA 2008. LNCS, vol. 5203, pp. 299\u2013312. Springer, Heidelberg (2008)"},{"key":"64_CR13","doi-asserted-by":"crossref","unstructured":"Liu, J., Song, D., Xu, Y.: A parallel encryption algorithm for dual-core processor based on chaotic map. In: Zeng, Z., Li, Y. (eds.) ICMV 2011. Proceedings of SPIE 8350, pp. 83500B-1\u201383500B-7 (2012)","DOI":"10.1117\/12.920226"},{"key":"64_CR14","unstructured":"Marsaglia, G.: DIEHARD: a Battery of Tests of Randomness. http:\/\/www.stat.fsu.edu\/pub\/diehard\/"},{"key":"64_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/BFb0053436","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"W Meier","year":"1995","unstructured":"Meier, W., Staffelbach, O.: The self-shrinking generator. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 205\u2013214. Springer, Heidelberg (1995)"},{"key":"64_CR16","unstructured":"Message Passing Interface Forum: MPI: A Message-Passing Interface Standard, Version 3.0. High Performance Computing Center, Stuttgart (2012)"},{"issue":"1","key":"64_CR17","first-page":"967","volume":"2","author":"V Pachori","year":"2012","unstructured":"Pachori, V., Ansari, G., Chaudhary, N.: Improved performance of advance encryption standard using parallel computing. Int. J. Eng. Res. Appl. 2(1), 967\u2013971 (2012)","journal-title":"Int. J. Eng. Res. Appl."},{"key":"64_CR18","unstructured":"Rukhin, A., Soto, J., Nechvatal, J., Smid, M., Barker, E., Leigh, S., Levenson, M., Vangel, M., Banks, D., Heckert, A., Dray, J., Vo, S.: A statistical test suite for random and pseudorandom number generators for cryptographic application. Natl. Inst. Stand. Technol. Spec. Publ. 800\u201322rev1a (2010)"},{"issue":"3","key":"64_CR19","first-page":"362","volume":"78","author":"B Stoyanov","year":"2012","unstructured":"Stoyanov, B., Kolev, M., Nachev, A.: Design of a new self-shrinking 2-adic cryptographic system with application to image encryption. Eur. J. Sci. Res. 78(3), 362\u2013374 (2012)","journal-title":"Eur. J. Sci. Res."},{"issue":"3","key":"64_CR20","first-page":"228","volume":"8","author":"K Suwais","year":"2008","unstructured":"Suwais, K., Samsudin, A.: High performance multithreaded model for stream cipher. Int. J. Comput. Sci. Netw. Secur. 8(3), 228\u2013233 (2008)","journal-title":"Int. J. Comput. Sci. Netw. Secur."},{"key":"64_CR21","unstructured":"Tasheva, Z., Bedzhev, B., Stoyanov, B.: Self-shrinking p-adic cryptographic generator. In: Milovanovi\u0107, B. (ed.) XL International Scientific Conference on Information, Communication and Energy Systems and Technologies, pp. 7\u201310. Ni\u0161 (2005)"},{"key":"64_CR22","unstructured":"Walker, J.: ENT: A Pseudorandom Number Sequence Test Program. http:\/\/www.fourmilab.ch\/random\/"},{"key":"64_CR23","doi-asserted-by":"crossref","unstructured":"Wang, W., Wang, X., Song, D.: A parallel chaotic cryptosystem for dual-core processor. In: 2nd International Conference on Information and Engineering, pp. 920\u2013923. IEEE Press, New York (2010)","DOI":"10.1109\/ICISE.2010.5689747"}],"container-title":["Lecture Notes in Computer Science","Large-Scale Scientific Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-43880-0_64","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T13:09:36Z","timestamp":1746277776000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-43880-0_64"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662438794","9783662438800"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-43880-0_64","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"26 June 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}