{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T08:39:50Z","timestamp":1771576790160,"version":"3.50.1"},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2022,1,20]],"date-time":"2022-01-20T00:00:00Z","timestamp":1642636800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,20]],"date-time":"2022-01-20T00:00:00Z","timestamp":1642636800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61672533"],"award-info":[{"award-number":["61672533"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61521003"],"award-info":[{"award-number":["61521003"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2022,2]]},"DOI":"10.1007\/s10623-021-00982-5","type":"journal-article","created":{"date-parts":[[2022,1,20]],"date-time":"2022-01-20T00:04:11Z","timestamp":1642637051000},"page":"387-408","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["A generic method for investigating nonsingular Galois NFSRs"],"prefix":"10.1007","volume":"90","author":[{"given":"Xiao-Juan","family":"Wang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6044-9083","authenticated-orcid":false,"given":"Tian","family":"Tian","sequence":"additional","affiliation":[]},{"given":"Wen-Feng","family":"Qi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,20]]},"reference":[{"issue":"1","key":"982_CR1","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1504\/IJWMC.2011.044106","volume":"5","author":"M \u00c5gren","year":"2011","unstructured":"\u00c5gren M., Hell M., Johansson T., Meier W.: Grain-128a: a new version of grain-128 with optional authentication. IJWMC 5(1), 48\u201359 (2011).","journal-title":"IJWMC"},{"key":"982_CR2","doi-asserted-by":"crossref","unstructured":"Canteaut A., Trabbia M.: Improved fast correlation attacks using parity-check equations of weight 4 and 5. In: Preneel, Bart (ed), Advances in Cryptology\u2014EUROCRYPT 2000, International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14\u201318, 2000, Proceeding, volume 1807 of Lecture Notes in Computer Science, Springer, pp. 573\u2013588 (2000).","DOI":"10.1007\/3-540-45539-6_40"},{"issue":"3","key":"982_CR3","doi-asserted-by":"publisher","first-page":"885","DOI":"10.1007\/s00145-017-9273-9","volume":"31","author":"A Canteaut","year":"2018","unstructured":"Canteaut A., Carpov S., Fontaine C., Lepoint T., Naya-Plasencia M., Paillier P., Sirdey R.: Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression. J. Cryptol. 31(3), 885\u2013916 (2018).","journal-title":"J. Cryptol."},{"key":"982_CR4","doi-asserted-by":"crossref","unstructured":"Chose P., Joux A., Mitton M.: Fast correlation attacks: An algorithmic point of view. In: Knudsen, Lars\u00a0R. (ed), Advances in Cryptology\u2014EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings, volume 2332 of Lecture Notes in Computer Science, Springer, pp. 209\u2013221 (2002).","DOI":"10.1007\/3-540-46035-7_14"},{"key":"982_CR5","doi-asserted-by":"crossref","unstructured":"Courtois N., Meier W.: Algebraic attacks on stream ciphers with linear feedback. In: Biham, Eli (ed), Advances in Cryptology\u2014EUROCRYPT 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings, volume 2656 of Lecture Notes in Computer Science, Springer, pp. 345\u2013359 (2003).","DOI":"10.1007\/3-540-39200-9_21"},{"key":"982_CR6","doi-asserted-by":"crossref","unstructured":"Courtois N.T.: Fast algebraic attacks on stream ciphers with linear feedback. In: Boneh, Dan (ed), Advances in Cryptology\u2014CRYPTO 2003, 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings, volume 2729 of Lecture Notes in Computer Science, Springer, pp. 176\u2013194 (2003).","DOI":"10.1007\/978-3-540-45146-4_11"},{"key":"982_CR7","doi-asserted-by":"crossref","unstructured":"De Canni\u00e8re C., Preneel B.: Trivium. In: Robshaw and Billet [19], pp. 244\u2013266.","DOI":"10.1007\/978-3-540-68351-3_18"},{"issue":"11","key":"982_CR8","doi-asserted-by":"publisher","first-page":"5263","DOI":"10.1109\/TIT.2009.2030467","volume":"55","author":"E Dubrova","year":"2009","unstructured":"Dubrova E.: A transformation from the fibonacci to the galois nlfsrs. IEEE Trans. Inf. Theory 55(11), 5263\u20135271 (2009).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"982_CR9","volume-title":"Shift Register Sequences","author":"SW Golomb","year":"1982","unstructured":"Golomb S.W.: Shift Register Sequences. Aegean Park Press, Laguna Hills (1982)."},{"key":"982_CR10","doi-asserted-by":"crossref","unstructured":"Hell M., Johansson T., Maximov A., Meier W.: The grain family of stream ciphers. In: Robshaw and Billet [19], pp. 179\u2013190.","DOI":"10.1007\/978-3-540-68351-3_14"},{"issue":"6","key":"982_CR11","doi-asserted-by":"publisher","first-page":"1317","DOI":"10.1142\/S0129054111008738","volume":"22","author":"H Honggang","year":"2011","unstructured":"Honggang H., Gong G.: Periods on two kinds of nonlinear feedback shift registers with time varying feedback functions. Int. J. Found. Comput. Sci. 22(6), 1317\u20131329 (2011).","journal-title":"Int. J. Found. Comput. Sci."},{"key":"982_CR12","doi-asserted-by":"crossref","unstructured":"Johansson T., J\u00f6nsson F.: Fast correlation attacks through reconstruction of linear polynomials. In: Bellare, Mihir (ed.), Advances in Cryptology\u2014CRYPTO 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings, volume 1880 of Lecture Notes in Computer Science, Springer, pp. 300\u2013315 (2000).","DOI":"10.1007\/3-540-44598-6_19"},{"key":"982_CR13","doi-asserted-by":"crossref","unstructured":"Lu Y., Vaudenay S.: Faster correlation attack on bluetooth keystream generator E0. In: Franklin, Matthew\u00a0K. (ed), Advances in Cryptology\u2014CRYPTO 2004, 24th Annual International CryptologyConference, Santa Barbara, California, USA, August 15-19, 2004, Proceedings, volume 3152 of Lecture Notes in Computer Science, Springer, pp. 407\u2013425 (2004).","DOI":"10.1007\/978-3-540-28628-8_25"},{"key":"982_CR14","doi-asserted-by":"crossref","unstructured":"Robshaw M.J.B., Billet, O. (eds).: New Stream Cipher Designs\u2014The eSTREAM Finalists, volume 4986 of Lecture Notes in Computer Science. Springer, Heidelberg (2008).","DOI":"10.1007\/978-3-540-68351-3"},{"issue":"3\u20134","key":"982_CR15","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/s12095-012-0066-6","volume":"4","author":"L Simpson","year":"2012","unstructured":"Simpson L., Boztas S.: State cycles, initialization and the trivium stream cipher. Cryptogr. Commun. 4(3\u20134), 245\u2013258 (2012).","journal-title":"Cryptogr. Commun."},{"issue":"6","key":"982_CR16","first-page":"815","volume":"6","author":"T Tian","year":"2019","unstructured":"Tian T., Qi W.-F., Ye C.-D., Xie X.-F.: Spring: a family of small hardware-oriented block ciphers based on nfsrs. J. Cryptol. Res. 6(6), 815\u2013834 (2019).","journal-title":"J. Cryptol. Res."},{"key":"982_CR17","unstructured":"Wu H.-J.: Acorn: a lightweight authenticated cipher (v3). Candidate for the CAESAR Competition (2016)."},{"issue":"1","key":"982_CR18","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/s10623-018-0493-2","volume":"87","author":"S Zhang","year":"2019","unstructured":"Zhang S., Chen G.: New results on the state cycles of trivium. Des. Codes Cryptogr. 87(1), 149\u2013162 (2019).","journal-title":"Des. Codes Cryptogr."},{"issue":"1","key":"982_CR19","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/s10623-019-00677-y","volume":"88","author":"X-X Zhao","year":"2020","unstructured":"Zhao X.-X., Qi W.-F., Zhang J.-M.: Further results on the equivalence between galois nfsrs and fibonacci nfsrs. Des. Codes Cryptogr. 88(1), 153\u2013171 (2020).","journal-title":"Des. Codes Cryptogr."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-021-00982-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10623-021-00982-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-021-00982-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,24]],"date-time":"2022-02-24T18:26:51Z","timestamp":1645727211000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10623-021-00982-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,20]]},"references-count":19,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,2]]}},"alternative-id":["982"],"URL":"https:\/\/doi.org\/10.1007\/s10623-021-00982-5","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,20]]},"assertion":[{"value":"2 April 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 November 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 November 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 January 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}