{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T21:36:46Z","timestamp":1768772206164,"version":"3.49.0"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2025,6,20]],"date-time":"2025-06-20T00:00:00Z","timestamp":1750377600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,6,20]],"date-time":"2025-06-20T00:00:00Z","timestamp":1750377600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2025,11]]},"DOI":"10.1007\/s11432-024-4364-4","type":"journal-article","created":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T04:34:06Z","timestamp":1750826046000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Cycle structure and observability of two types of Galois NFSRs"],"prefix":"10.1007","volume":"68","author":[{"given":"Xianghan","family":"Wang","sequence":"first","affiliation":[]},{"given":"Jianghua","family":"Zhong","sequence":"additional","affiliation":[]},{"given":"Dongdai","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,20]]},"reference":[{"key":"4364_CR1","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/978-3-540-68351-3_14","volume-title":"New Stream Cipher Designs: The eSTREAM Finalists","author":"M Hell","year":"2008","unstructured":"Hell M, Johansson T, Maximov A, et al. The grain family of stream ciphers. In: New Stream Cipher Designs: The eSTREAM Finalists. Berlin: Springer-Verlag, 2008. 4986: 179\u2013190"},{"key":"4364_CR2","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/978-3-540-68351-3_18","volume-title":"New Stream Cipher Designs: The eSTREAM Finalists","author":"C D Canni\u00e8re","year":"2008","unstructured":"Canni\u00e8re C D, Preneel B. Trivium. In: New Stream Cipher Designs: The eSTREAM Finalists. Berlin: Springer-Verlag, 2008. 4986: 244\u2013266"},{"key":"4364_CR3","volume-title":"ACORN: a lightweight authenticated cipher (v3)","author":"H Wu","year":"2016","unstructured":"Wu H. ACORN: a lightweight authenticated cipher (v3). 2016. http:\/\/competitions.cr.yp.to\/round3\/acornv3.pdf"},{"key":"4364_CR4","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1016\/0022-5193(69)90015-0","volume":"22","author":"S A Kauffman","year":"1969","unstructured":"Kauffman S A. Metabolic stability and epigenesis in randomly constructed genetic nets. J Theor Biol, 1969, 22: 437\u2013467","journal-title":"J Theor Biol"},{"key":"4364_CR5","doi-asserted-by":"publisher","DOI":"10.1142\/8323","volume-title":"An Introduction to Semi-Tensor Product of Matrices and Its Applications","author":"D Cheng","year":"2012","unstructured":"Cheng D, Qi H, Zhao Y. An Introduction to Semi-Tensor Product of Matrices and Its Applications. Singapore: World Scientific Publishing Company, 2012"},{"key":"4364_CR6","doi-asserted-by":"publisher","first-page":"1390","DOI":"10.1109\/TAC.2012.2231592","volume":"58","author":"E Fornasini","year":"2013","unstructured":"Fornasini E, Valcher M E. Observability, reconstructibility and state observers of Boolean control networks. IEEE Trans Automat Contr, 2013, 58: 1390\u20131401","journal-title":"IEEE Trans Automat Contr"},{"key":"4364_CR7","doi-asserted-by":"publisher","first-page":"152203","DOI":"10.1007\/s11432-021-3365-2","volume":"65","author":"Y Liu","year":"2022","unstructured":"Liu Y, Zhong J, Ho D W C, et al. Minimal observability of Boolean networks. Sci China Inf Sci, 2022, 65: 152203","journal-title":"Sci China Inf Sci"},{"key":"4364_CR8","doi-asserted-by":"publisher","first-page":"2351","DOI":"10.1016\/j.automatica.2013.04.038","volume":"49","author":"D Laschov","year":"2013","unstructured":"Laschov D, Margaliot M, Even G. Observability of Boolean networks: a graph-theoretic approach. Automatica, 2013, 49: 2351\u20132362","journal-title":"Automatica"},{"key":"4364_CR9","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1016\/j.automatica.2018.01.013","volume":"91","author":"Y Guo","year":"2018","unstructured":"Guo Y, Gui W, Yang C. Redefined observability matrix for Boolean networks and distinguishable partitions of state space. Automatica, 2018, 91: 316\u2013319","journal-title":"Automatica"},{"key":"4364_CR10","doi-asserted-by":"publisher","first-page":"6248","DOI":"10.1109\/TAC.2021.3131436","volume":"67","author":"Y Yu","year":"2022","unstructured":"Yu Y, Meng M, Feng J, et al. Observability criteria for Boolean networks. IEEE Trans Automat Contr, 2022, 67: 6248\u20136254","journal-title":"IEEE Trans Automat Contr"},{"key":"4364_CR11","doi-asserted-by":"publisher","first-page":"010204","DOI":"10.1007\/s11432-017-9269-6","volume":"61","author":"J Q Lu","year":"2018","unstructured":"Lu J Q, Li M L, Liu Y, et al. Nonsingularity of Grain-like cascade FSRs via semi-tensor product. Sci China Inf Sci, 2018, 61: 010204","journal-title":"Sci China Inf Sci"},{"key":"4364_CR12","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1016\/j.automatica.2015.03.014","volume":"55","author":"Z Liu","year":"2015","unstructured":"Liu Z, Wang Y, Cheng D. Nonsingularity of feedback shift registers. Automatica, 2015, 55: 247\u2013253","journal-title":"Automatica"},{"key":"4364_CR13","doi-asserted-by":"publisher","first-page":"012204","DOI":"10.1007\/s11432-015-5311-0","volume":"59","author":"J H Zhong","year":"2016","unstructured":"Zhong J H, Lin D D. Stability of nonlinear feedback shift registers. Sci China Inf Sci, 2016, 59: 012204","journal-title":"Sci China Inf Sci"},{"key":"4364_CR14","doi-asserted-by":"publisher","first-page":"092114","DOI":"10.1007\/s11432-013-5058-4","volume":"57","author":"D W Zhao","year":"2014","unstructured":"Zhao D W, Peng H P, Li L X, et al. Novel way to research nonlinear feedback shift register. Sci China Inf Sci, 2014, 57: 092114","journal-title":"Sci China Inf Sci"},{"key":"4364_CR15","volume-title":"Encyclopedia of Cryptography and Security","author":"A Biryukov","year":"2005","unstructured":"Biryukov A. Weak keys. In: Encyclopedia of Cryptography and Security. Boston: Springer, 2005"},{"key":"4364_CR16","first-page":"794","volume-title":"Proceedings of International Symposium on Information Theory and Its Applications, Chicago","author":"N Kalouptsidis","year":"2004","unstructured":"Kalouptsidis N, Limniotis K. Nonlinear span, minimal realizations of sequences over finite fields and de Bruijn generators. In: Proceedings of International Symposium on Information Theory and Its Applications, Chicago, 2004. 794\u2013799"},{"key":"4364_CR17","doi-asserted-by":"publisher","first-page":"192206","DOI":"10.1007\/s11432-021-3346-6","volume":"65","author":"W H Kong","year":"2022","unstructured":"Kong W H, Zhong J H, Lin D D. Observability of Galois nonlinear feedback shift registers. Sci China Inf Sci, 2022, 65: 192206","journal-title":"Sci China Inf Sci"},{"key":"4364_CR18","doi-asserted-by":"publisher","first-page":"1533","DOI":"10.1631\/FITEE.2200228","volume":"23","author":"Z Gao","year":"2022","unstructured":"Gao Z, Feng J, Yu Y, et al. On observability of Galois nonlinear feedback shift registers over finite fields. Front Inform Technol Electron Eng, 2022, 23: 1533\u20131545","journal-title":"Front Inform Technol Electron Eng"},{"key":"4364_CR19","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/s10623-018-0493-2","volume":"87","author":"S Zhang","year":"2019","unstructured":"Zhang S, Chen G. New results on the state cycles of Trivium. Des Codes Cryptogr, 2019, 87: 149\u2013162","journal-title":"Des Codes Cryptogr"},{"key":"4364_CR20","doi-asserted-by":"publisher","first-page":"1317","DOI":"10.1142\/S0129054111008738","volume":"22","author":"H Hu","year":"2011","unstructured":"Hu H, Gong G. Periods on two kinds of nonlinear feedback shift registers with time varying feedback functions. Int J Found Comput Sci, 2011, 22: 1317\u20131329","journal-title":"Int J Found Comput Sci"},{"key":"4364_CR21","doi-asserted-by":"publisher","first-page":"3766","DOI":"10.1109\/TIT.2019.2956741","volume":"66","author":"Z Chang","year":"2019","unstructured":"Chang Z, Gong G, Wang Q. Cycle structures of a class of cascaded FSRs. IEEE Trans Inform Theor, 2019, 66: 3766\u20133774","journal-title":"IEEE Trans Inform Theor"},{"key":"4364_CR22","doi-asserted-by":"publisher","first-page":"2961","DOI":"10.1109\/TIT.2010.2046250","volume":"56","author":"E Dubrova","year":"2010","unstructured":"Dubrova E. Finding matching initial states for equivalent NLFSRs in the Fibonacci and the Galois configurations. IEEE Trans Inform Theor, 2010, 56: 2961\u20132966","journal-title":"IEEE Trans Inform Theor"},{"key":"4364_CR23","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/s10623-016-0309-1","volume":"85","author":"J Dong","year":"2017","unstructured":"Dong J, Pei D. Construction for de Bruijn sequences with large stage. Des Codes Cryptogr, 2017, 85: 343\u2013358","journal-title":"Des Codes Cryptogr"},{"key":"4364_CR24","doi-asserted-by":"publisher","first-page":"1835","DOI":"10.1109\/TC.2020.2979460","volume":"69","author":"K Mandal","year":"2020","unstructured":"Mandal K, Yang B, Gong G, et al. Analysis and efficient implementations of a class of composited de Bruijn sequences. IEEE Trans Comput, 2020, 69: 1835\u20131848","journal-title":"IEEE Trans Comput"},{"key":"4364_CR25","doi-asserted-by":"publisher","first-page":"598","DOI":"10.1109\/TIT.2022.3201519","volume":"69","author":"M Li","year":"2023","unstructured":"Li M, Lin D. Partial cycle structure of FSRs and its applications in searching de Bruijn sequences. IEEE Trans Inform Theor, 2023, 69: 598\u2013609","journal-title":"IEEE Trans Inform Theor"},{"key":"4364_CR26","unstructured":"Dubrova E. A list of maximum-period NFSRs. Cyptology ePrint Archive, 2012. http:\/\/eprint.iacr.org\/2012\/166"},{"key":"4364_CR27","unstructured":"Gammel B, G\u00f6ttfert R, Kniffer O. Achterbahn-128\/80, eSTREAM: the ECRYPT Stream Cipher Project. 2006. http:\/\/www.ecrypt.eu.org\/stream\/p2ciphers\/achterbahn\/achterbahn_p2.pdf"},{"key":"4364_CR28","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1049\/cje.2019.01.018","volume":"28","author":"Y Yang","year":"2019","unstructured":"Yang Y, Zeng X, Xu Y. Periods on the cascade connection of an LFSR and an NFSR. Chin J Electron, 2019, 28: 301\u2013308","journal-title":"Chin J Electron"},{"key":"4364_CR29","doi-asserted-by":"publisher","first-page":"5263","DOI":"10.1109\/TIT.2009.2030467","volume":"55","author":"E Dubrova","year":"2009","unstructured":"Dubrova E. A transformation from the Fibonacci to the Galois NLFSRs. IEEE Trans Inform Theor, 2009, 55: 5263\u20135271","journal-title":"IEEE Trans Inform Theor"},{"key":"4364_CR30","first-page":"248","volume-title":"Proceeding of International Workshop on Selected Areas in Cryptography (SAC), Ottawa","author":"A Klimov","year":"2004","unstructured":"Klimov A, Shamir A. Cryptographic application of T-functions. In: Proceeding of International Workshop on Selected Areas in Cryptography (SAC), Ottawa, 2004. 3006: 248\u2013261"},{"key":"4364_CR31","first-page":"68","volume-title":"Proceedings of International Workshop on Fast Software Encryption (FSE), Paris","author":"J Hong","year":"2005","unstructured":"Hong J, Lee D, Yeom Y, et al. A new class of single cycle T-functions. In: Proceedings of International Workshop on Fast Software Encryption (FSE), Paris, 2005. 3557: 68\u201382"},{"key":"4364_CR32","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1007\/978-3-319-17533-1_27","volume-title":"Proceedings of Information Security Practice and Experience (ISPEC), Beijing","author":"D Roy","year":"2015","unstructured":"Roy D, Chaturvedi A, Mukhopadhyay S. New constructions of T-function. In: Proceedings of Information Security Practice and Experience (ISPEC), Beijing, 2015. 9065: 395\u2013405"},{"key":"4364_CR33","first-page":"470","volume-title":"Proceedings of Cryptographic Hardware and Embedded Systems(CHES), Redwood Shores","author":"A Klimov","year":"2002","unstructured":"Klimov A, Shamir A. A new class of invertible mappings. In: Proceedings of Cryptographic Hardware and Embedded Systems(CHES), Redwood Shores, 2002. 2523: 470\u2013483"},{"key":"4364_CR34","unstructured":"Anashin V, Bogdanov A, Kizhvtov I, et al. ABC: a new fast flexible stream cipher. ECRYPT Stream Cipher Project Report 2005\/001, 2005. http:\/\/www.ecrypt.eu.org\/stream"},{"key":"4364_CR35","first-page":"391","volume-title":"Proceedings of Sequences and Their Applications (SETA), Beijing","author":"W Zhang","year":"2006","unstructured":"Zhang W, Wu C. The algebraic normal form, linear complexity and k-error linear complexity of single-cycle T-function. In: Proceedings of Sequences and Their Applications (SETA), Beijing, 2006. 4086: 391\u2013401"},{"key":"4364_CR36","first-page":"468","volume-title":"Proceedings of Advances in Cryptology-ASIACRYPT, Jeju Island","author":"J Mitra","year":"2004","unstructured":"Mitra J, Sarkar P. Time-memory trade-off attacks on multiplication and T-functions. In: Proceedings of Advances in Cryptology-ASIACRYPT, Jeju Island, 2004. 3329: 468\u2013482"},{"key":"4364_CR37","first-page":"1604","volume-title":"Proceedings of IEEE International Symposium on Information Theory (ISIT), Seattle","author":"N Kolokotronis","year":"2006","unstructured":"Kolokotronis N. Cryptographic properties of stream ciphers based on T-functions. In: Proceedings of IEEE International Symposium on Information Theory (ISIT), Seattle, 2006. 1604\u20131608"},{"key":"4364_CR38","doi-asserted-by":"publisher","DOI":"10.1515\/9783110203011","volume-title":"Applied Algebraic Dynamics","author":"V S Anashin","year":"2009","unstructured":"Anashin V S, Khrennikov Y A. Applied Algebraic Dynamics. Berlin: Walter de Gruyter, 2009"},{"key":"4364_CR39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48865-2","volume-title":"Boolean Functions and Their Applications in Cryptography","author":"C-K Wu","year":"2016","unstructured":"Wu C-K, Feng D. Boolean Functions and Their Applications in Cryptography. Heidelberg: Springer-Berlin, 2016"},{"key":"4364_CR40","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-85729-097-7","volume-title":"Analysis and Control of Boolean Networks","author":"D Cheng","year":"2011","unstructured":"Cheng D, Qi H, Li Z. Analysis and Control of Boolean Networks. London: Springer-Verlag, 2011"},{"key":"4364_CR41","volume-title":"Topics in Matrix Analysis","author":"H A Roger","year":"1991","unstructured":"Roger H A, Johnson R C. Topics in Matrix Analysis. Cambridge: Cambridge University Press, 1991"},{"key":"4364_CR42","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1007\/978-3-030-88323-2_16","volume-title":"Proceedings of International Conference on Information Security and Cryptology (Inscrypt), Shandong","author":"W Kong","year":"2021","unstructured":"Kong W, Zhong J, Lin D. Isomorphism and equivalence of Galois nonlinear feedback shift registers. In: Proceedings of International Conference on Information Security and Cryptology (Inscrypt), Shandong, 2021. 13007: 301\u2013315"},{"key":"4364_CR43","doi-asserted-by":"publisher","first-page":"039110","DOI":"10.1007\/s11432-017-9460-4","volume":"62","author":"J H Zhong","year":"2019","unstructured":"Zhong J H, Lin D D. Decomposition of nonlinear feedback shift registers based on Boolean networks. Sci China Inf Sci, 2019, 62: 039110","journal-title":"Sci China Inf Sci"},{"key":"4364_CR44","volume-title":"Shift Register Sequences","author":"S W Golomb","year":"1967","unstructured":"Golomb S W. Shift Register Sequences. Laguna Hills: Holden-Day, 1967"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-024-4364-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11432-024-4364-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-024-4364-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T06:02:21Z","timestamp":1750831341000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11432-024-4364-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,20]]},"references-count":44,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2025,11]]}},"alternative-id":["4364"],"URL":"https:\/\/doi.org\/10.1007\/s11432-024-4364-4","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,20]]},"assertion":[{"value":"13 June 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 December 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 March 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 June 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"212203"}}