{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:04:29Z","timestamp":1750277069539},"reference-count":7,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2009,10,10]],"date-time":"2009-10-10T00:00:00Z","timestamp":1255132800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2010,4]]},"DOI":"10.1007\/s10623-009-9331-x","type":"journal-article","created":{"date-parts":[[2009,10,9]],"date-time":"2009-10-09T03:38:54Z","timestamp":1255059534000},"page":"65-79","source":"Crossref","is-referenced-by-count":2,"title":["Expected values for the rational complexity of finite binary sequences"],"prefix":"10.1007","volume":"55","author":[{"given":"Tian","family":"Tian","sequence":"first","affiliation":[]},{"given":"Wen-Feng","family":"Qi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,10,10]]},"reference":[{"key":"9331_CR1","doi-asserted-by":"crossref","unstructured":"Rueppel R.A.: Linear complexity and random sequences. In: Advances in Cryptology-Eurocrypt\u201985. Lecture Notes in Computer Science, vol. 219, pp. 167\u2013188. Springer, Berlin (1986).","DOI":"10.1007\/3-540-39805-8_21"},{"key":"9331_CR2","doi-asserted-by":"crossref","unstructured":"Klapper A., Goresky M.: 2-Adic shift registers. In: Fast Software Encryption, Cambridge Security Work Shop. Lecture Notes in Computer Science, vol. 809, pp. 174\u2013178. Springer, New York (1993).","DOI":"10.1007\/3-540-58108-1_21"},{"key":"9331_CR3","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1007\/s001459900024","volume":"10","author":"A. Klapper","year":"1997","unstructured":"Klapper A., Goresky M.: Feedback shift registers, 2-adic span, and combiners with memory. J. Cryptol. 10, 111\u2013147 (1997)","journal-title":"J. Cryptol."},{"issue":"2","key":"9331_CR4","doi-asserted-by":"crossref","first-page":"874","DOI":"10.1109\/TIT.2007.913238","volume":"54","author":"H.G. Hu","year":"2008","unstructured":"Hu H.G., Feng D.G.: On the 2-adic complexity and the k-error 2-adic complexity of periodic binary sequences. IEEE Trans. Inform. Theory 54(2), 874\u2013883 (2008)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"9331_CR5","doi-asserted-by":"crossref","unstructured":"Klapper A., Goresky M.: Cryptanalysis based on 2-adic rational approximation. In: Advances in Cryptology\u2014CRYPTO\u201995. Lecture Notes in Computer Science, vol. 963, pp. 262\u2013273. Springer, Berlin (1995).","DOI":"10.1007\/3-540-44750-4_21"},{"key":"9331_CR6","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1215\/ijm\/1255631807","volume":"6","author":"J.B. Rosser","year":"1962","unstructured":"Rosser J.B., Schoenfeld L.: Approximate formulas for some functions of prime numbers. Illinois J. Math. 6, 64\u201394 (1962)","journal-title":"Illinois J. Math."},{"key":"9331_CR7","volume-title":"Inequalities","author":"G. Hardy","year":"1988","unstructured":"Hardy G., Littlewood J.E., Plya G.: Inequalities, 2nd edn. Cambridge University Press, UK (1988)","edition":"2"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-009-9331-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-009-9331-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-009-9331-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T19:58:27Z","timestamp":1559246307000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-009-9331-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,10,10]]},"references-count":7,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2010,4]]}},"alternative-id":["9331"],"URL":"https:\/\/doi.org\/10.1007\/s10623-009-9331-x","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,10,10]]}}}