{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,19]],"date-time":"2024-06-19T00:49:09Z","timestamp":1718758149100},"reference-count":14,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2011,5,18]],"date-time":"2011-05-18T00:00:00Z","timestamp":1305676800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2012,3]]},"DOI":"10.1007\/s10623-011-9519-8","type":"journal-article","created":{"date-parts":[[2011,5,17]],"date-time":"2011-05-17T10:44:18Z","timestamp":1305629058000},"page":"313-321","source":"Crossref","is-referenced-by-count":1,"title":["Asymptotic analysis on the normalized k-error linear complexity of binary sequences"],"prefix":"10.1007","volume":"62","author":[{"given":"Lin","family":"Tan","sequence":"first","affiliation":[]},{"given":"Wen-Feng","family":"Qi","sequence":"additional","affiliation":[]},{"given":"Hong","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,5,18]]},"reference":[{"issue":"11","key":"9519_CR1","doi-asserted-by":"crossref","first-page":"2911","DOI":"10.1109\/TIT.2004.836704","volume":"50","author":"Z.D. Dai","year":"2004","unstructured":"Dai Z.D., Jiang S.Q., Imamura K., Gong G.: Asymptotic behavior of normalized linear complexity of ultimately nonperiodic binary sequences. IEEE Trans. Inform. Theory 50(11), 2911\u20132915 (2004)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"9519_CR2","unstructured":"Dai Z.D., Imamura K., Yang J.H.: Asymptotic behavior of normalized linear complexity of multi-sequences. In: Sequences and Their Applications 2004. Lecture Notes in Computer Science, vol. 3486, pp. 129-142. Springer, Berlin (2005)."},{"key":"9519_CR3","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-54973-0","volume-title":"The Stability Theory of Stream Ciphers. Lecture Notes in Computer Science, vol. 561","author":"C. Ding","year":"1991","unstructured":"Ding C., Xiao G., Shan W.: The Stability Theory of Stream Ciphers. Lecture Notes in Computer Science, vol. 561. Springer, Berlin (1991)"},{"key":"9519_CR4","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1147\/rd.203.0204","volume":"20","author":"F.G. Gustavson","year":"1976","unstructured":"Gustavson F.G.: Analysis of Berlekamp-Massey linear feedback shift-register synthesis algorithm. IBM J. Res. Dev. 20, 204\u2013212 (1976)","journal-title":"IBM J. Res. Dev."},{"issue":"3","key":"9519_CR5","doi-asserted-by":"crossref","first-page":"307","DOI":"10.3934\/amc.2007.1.307","volume":"1","author":"A. Klapper","year":"2007","unstructured":"Klapper A.: The asymptotic behavior of N-adic complexity. Adv. Math. Commun. 1(3), 307\u2013319 (2007)","journal-title":"Adv. Math. Commun."},{"key":"9519_CR6","doi-asserted-by":"crossref","unstructured":"van Lint J.H.: Introduction to coding theory. In: Graduate Text in Mathematics, 3rd edn., vol. 86. Springer, New York (1999).","DOI":"10.1007\/978-3-642-58575-3"},{"key":"9519_CR7","volume-title":"Probability Theory","author":"M. Lo\u00e8ve","year":"1963","unstructured":"Lo\u00e8ve M.: Probability Theory, 3rd ed. Van Nostrand, New York (1963)","edition":"3"},{"key":"9519_CR8","doi-asserted-by":"crossref","first-page":"142","DOI":"10.1006\/ffta.2001.0326","volume":"8","author":"W. Meidl","year":"2002","unstructured":"Meidl W., Niederreiter H.: Counting functions and expected values for the k-error linear complexity. Finite Fields Appl. 8, 142\u2013154 (2002)","journal-title":"Finite Fields Appl."},{"key":"9519_CR9","unstructured":"Niederreiter H.: Linear complexity and related complexity measures for sequences. In: Advances in ryptology\u2014INDOCRYPT\u201903. Lecture Notes in Computer Science, vol. 2904, pp. 1\u201317. Springer, Berlin (2003)."},{"key":"9519_CR10","unstructured":"Niederreiter H.: The probabilistic theory of linear complexity. In: Gunther C.G. (ed.) Advances in Cryptology\u2014EUROCRYPT\u201988. Lecture Notes in Computer Science, vol. 330, pp. 191\u2013209. Springer, Berlin, (1988)"},{"key":"9519_CR11","unstructured":"Niederreiter H., Paschinger H.: Counting functions and expected values in the stability theory of stream ciphers. In: Sequences and Their Applications, pp. 318\u2013329. Springer, London (1999)."},{"key":"9519_CR12","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-82865-2","volume-title":"Analysis and Design of Stream Ciphers","author":"R.A. Rueppel","year":"1986","unstructured":"Rueppel R.A.: Analysis and Design of Stream Ciphers. Springer, Berlin (1986)"},{"issue":"4","key":"9519_CR13","doi-asserted-by":"crossref","first-page":"1398","DOI":"10.1109\/18.243455","volume":"39","author":"M. Stamp","year":"1993","unstructured":"Stamp M., Martin C.F.: An algorithm for the k-error linear complexity of binary sequences with period 2 n . IEEE Trans. Inform. Theory 39(4), 1398\u20131401 (1993)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"9519_CR14","unstructured":"Vielhaber M., Canales Ch.M.del P.: The asymptotic normalized linear complexity of multisequences. J. Complex. 24, 410\u2013422 (2008)."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-011-9519-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-011-9519-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-011-9519-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,10]],"date-time":"2019-06-10T16:54:53Z","timestamp":1560185693000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-011-9519-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,5,18]]},"references-count":14,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2012,3]]}},"alternative-id":["9519"],"URL":"https:\/\/doi.org\/10.1007\/s10623-011-9519-8","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,5,18]]}}}