{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T07:03:25Z","timestamp":1770534205891,"version":"3.49.0"},"reference-count":7,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[1992,10,1]],"date-time":"1992-10-01T00:00:00Z","timestamp":717897600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. Cryptology"],"published-print":{"date-parts":[[1992,10]]},"DOI":"10.1007\/bf02451115","type":"journal-article","created":{"date-parts":[[2006,7,30]],"date-time":"2006-07-30T23:42:59Z","timestamp":1154302979000},"page":"193-207","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":52,"title":["Binary sequences derived from ML-sequences over rings I: Periods and minimal polynomials"],"prefix":"10.1007","volume":"5","author":[{"given":"Zong-Duo","family":"Dai","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"BF02451115_CR1","volume-title":"Cipher Systems","author":"H. Beker","year":"1982","unstructured":"H. Beker and F. Piper,Cipher Systems, Northwood Books, London, 1982."},{"key":"BF02451115_CR2","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1137\/0217016","volume":"17","author":"A. M. Frieze","year":"1988","unstructured":"A. M. Frieze, J. Hastad, R. kannan, J. C. Lagarias, and A. Shamir, Reconstructing Truncated Integer Variables Satisfying Linear Congruences,SIAM J. Comput.,17, 262\u2013280 (1988).","journal-title":"SIAM J. Comput."},{"key":"BF02451115_CR3","volume-title":"Analysis and Cryptology Evaluation on Primitive Sequences","author":"M. Q. Huang","year":"1988","unstructured":"M. Q. Huang, Analysis and Cryptology Evaluation on Primitive Sequences, Ph.D. Dissertation, Department of Mathematics, Graduate School, Academia Sinica, Beijing, 1988."},{"key":"BF02451115_CR4","volume-title":"Finite Fields, Encyclopaedia of Mathematics and Its Applications, Vol. 20","author":"R. Lidl","year":"1983","unstructured":"R. Lidl and H. Niederreiter,Finite Fields, Encyclopaedia of Mathematics and Its Applications, Vol. 20, Addison-Wesley, Reading, MA, 1983."},{"key":"BF02451115_CR5","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-82865-2","volume-title":"Analysis and Design of Stream Ciphers","author":"R. A. Rueppel","year":"1986","unstructured":"R. A. Rueppel,Analysis and Design of Stream Ciphers, Springer-Verlag, Berlin, 1986."},{"key":"BF02451115_CR6","doi-asserted-by":"publisher","first-page":"600","DOI":"10.2307\/1989851","volume":"35","author":"M. Ward","year":"1933","unstructured":"M. Ward, The Arithmetical Theory of Linear Recurring Series,Trans. Amer. Math. Soc.,35, 600\u2013628 (July 1933).","journal-title":"Trans. Amer. Math. Soc."},{"key":"BF02451115_CR7","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/0021-8693(73)90170-1","volume":"27","author":"N. Zierler","year":"1973","unstructured":"N. Zierler and W. H. Mills, Products of Linear Recursive Sequences,J. Algebra,27, 147\u2013157 (1973).","journal-title":"J. Algebra"}],"container-title":["Journal of Cryptology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF02451115.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/BF02451115\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF02451115","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF02451115.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,8]],"date-time":"2020-04-08T08:24:11Z","timestamp":1586334251000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BF02451115"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1992,10]]},"references-count":7,"journal-issue":{"issue":"3","published-print":{"date-parts":[[1992,10]]}},"alternative-id":["BF02451115"],"URL":"https:\/\/doi.org\/10.1007\/bf02451115","relation":{},"ISSN":["0933-2790","1432-1378"],"issn-type":[{"value":"0933-2790","type":"print"},{"value":"1432-1378","type":"electronic"}],"subject":[],"published":{"date-parts":[[1992,10]]},"assertion":[{"value":"8 May 1991","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 November 1991","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}