{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T13:00:02Z","timestamp":1772283602819,"version":"3.50.1"},"reference-count":14,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2009,5,12]],"date-time":"2009-05-12T00:00:00Z","timestamp":1242086400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2009,11]]},"DOI":"10.1007\/s10623-009-9295-x","type":"journal-article","created":{"date-parts":[[2009,5,11]],"date-time":"2009-05-11T10:49:14Z","timestamp":1242038954000},"page":"75-97","source":"Crossref","is-referenced-by-count":8,"title":["Characterization of 2 n -periodic binary sequences with fixed 2-error or 3-error linear complexity"],"prefix":"10.1007","volume":"53","author":[{"given":"Ramakanth","family":"Kavuluru","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,5,12]]},"reference":[{"key":"9295_CR1","unstructured":"Cusick T.W., Ding C., Renvall A.: Stream Ciphers and Number Theory. North-Holland (1998)."},{"key":"9295_CR2","doi-asserted-by":"crossref","unstructured":"Ding C., Xiao G., Shan W.: The Stability Theory of Stream Ciphers. Springer (1991).","DOI":"10.1007\/3-540-54973-0"},{"key":"9295_CR3","doi-asserted-by":"crossref","unstructured":"Fu F.-W., Niederreiter H., Su M.: The characterization of 2 n -periodic binary sequences with fixed 1-error linear complexity. In: Gong G., Helleseth T., Song H.-Y., Yang K. (eds.) SETA 2006. LNCS, vol. 4086, pp. 88\u2013103. Springer (2006).","DOI":"10.1007\/11863854_8"},{"issue":"1","key":"9295_CR4","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1109\/TIT.1983.1056619","volume":"29","author":"R.A. Games","year":"1983","unstructured":"Games R.A., Chan A.H.: A fast algorithm for determining the complexity of a pseudo-random sequence with period 2 n . IEEE Trans. Inform. Theory 29(1), 144\u2013146 (1983)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"9295_CR5","doi-asserted-by":"crossref","unstructured":"Kavuluru R.: 2 n -periodic binary sequences with fixed 2-error or 3-error linear complexity. In: Golomb S., Parker M., Pott A., Winterhof A. (eds.) SETA 2008. LNCS, vol. 5203, pp. 252\u2013265. Springer (2008).","DOI":"10.1007\/978-3-540-85912-3_23"},{"issue":"2","key":"9295_CR6","doi-asserted-by":"crossref","first-page":"694","DOI":"10.1109\/18.825845","volume":"46","author":"K. Kurosawa","year":"2000","unstructured":"Kurosawa K., Sato F., Sakata T., Kishimoto W.: A relationship between linear complexity and k-error linear complexity. IEEE Trans. Inform. Theory 46(2), 694\u2013698 (2000)","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"1","key":"9295_CR7","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1109\/TIT.1969.1054260","volume":"15","author":"J.L. Massey","year":"1969","unstructured":"Massey J.L.: Shift register synthesis and BCH decoding. IEEE Trans. Inform. Theory 15(1), 122\u2013127 (1969)","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"3","key":"9295_CR8","doi-asserted-by":"crossref","first-page":"1151","DOI":"10.1109\/TIT.2004.842709","volume":"51","author":"W. Meidl","year":"2005","unstructured":"Meidl W.: On the stability of 2 n -periodic binary sequences. IEEE Trans. Inform. Theory 51(3), 1151\u20131155 (2005)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"9295_CR9","doi-asserted-by":"crossref","first-page":"142","DOI":"10.1006\/ffta.2001.0326","volume":"8","author":"W. Meidl","year":"2002","unstructured":"Meidl W., Niederreiter H.: Counting functions and expected values for the k-error linear complexity. Finite Fields Appl. 8, 142\u2013154 (2002)","journal-title":"Finite Fields Appl."},{"issue":"1","key":"9295_CR10","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1006\/jcom.2001.0621","volume":"18","author":"W. Meidl","year":"2002","unstructured":"Meidl W., Niederreiter H.: Linear complexity, k-error linear complexity, and the discrete fourier transform. J. Complexity 18(1), 87\u2013103 (2002)","journal-title":"J. Complexity"},{"issue":"11","key":"9295_CR11","doi-asserted-by":"crossref","first-page":"2817","DOI":"10.1109\/TIT.2002.804050","volume":"48","author":"W. Meidl","year":"2002","unstructured":"Meidl W., Niederreiter H.: On the expected value of linear complexity and the k-error linear complexity of periodic sequences. IEEE Trans. Inform. Theory 48(11), 2817\u20132825 (2002)","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"2","key":"9295_CR12","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/s10623-006-9029-2","volume":"42","author":"W. Meidl","year":"2007","unstructured":"Meidl W., Venkateswarlu A.: Remarks on the k-error linear complexity of p n -periodic sequences. Des. Codes Cryptogr. 42(2), 181\u2013193 (2007)","journal-title":"Des. Codes Cryptogr."},{"key":"9295_CR13","doi-asserted-by":"crossref","unstructured":"Rueppel R.A.: Analysis and Design of Stream Ciphers. Springer (1986).","DOI":"10.1007\/978-3-642-82865-2"},{"issue":"4","key":"9295_CR14","doi-asserted-by":"crossref","first-page":"1398","DOI":"10.1109\/18.243455","volume":"39","author":"M. Stamp","year":"1993","unstructured":"Stamp M., Martin C.F.: An algorithm for the k-error linear complexity of binary sequences with period 2 n . IEEE Trans. Inform. Theory 39(4), 1398\u20131401 (1993)","journal-title":"IEEE Trans. Inform. Theory"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-009-9295-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-009-9295-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-009-9295-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T19:58:26Z","timestamp":1559246306000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-009-9295-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,5,12]]},"references-count":14,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2009,11]]}},"alternative-id":["9295"],"URL":"https:\/\/doi.org\/10.1007\/s10623-009-9295-x","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,5,12]]}}}