{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T09:47:32Z","timestamp":1764841652616},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2011,1,15]],"date-time":"2011-01-15T00:00:00Z","timestamp":1295049600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2011,6]]},"DOI":"10.1007\/s12095-010-0041-z","type":"journal-article","created":{"date-parts":[[2011,1,14]],"date-time":"2011-01-14T12:31:48Z","timestamp":1295008308000},"page":"109-139","source":"Crossref","is-referenced-by-count":13,"title":["A matrix approach for FCSR automata"],"prefix":"10.1007","volume":"3","author":[{"given":"Fran\u00e7ois","family":"Arnault","sequence":"first","affiliation":[]},{"given":"Thierry P.","family":"Berger","sequence":"additional","affiliation":[]},{"given":"Benjamin","family":"Pousse","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,1,15]]},"reference":[{"issue":"11","key":"41_CR1","doi-asserted-by":"crossref","first-page":"1374","DOI":"10.1109\/TC.2005.181","volume":"54","author":"F Arnault","year":"2005","unstructured":"Arnault, F., Berger, T.P.: Design and properties of a new pseudorandom generator based on a filtered FCSR automaton. IEEE Trans Comput 54(11), 1374\u20131383 (2005)","journal-title":"IEEE Trans Comput"},{"key":"41_CR2","first-page":"83","volume-title":"FSE. Lecture Notes in Computer Science, vol. 3557","author":"F Arnault","year":"2005","unstructured":"Arnault, F., Berger, T.P.: F-FCSR: design of a new class of stream ciphers. In: Gilbert, H., Handschuh, H. (eds.) FSE. Lecture Notes in Computer Science, vol. 3557, pp. 83\u201397. Springer, New York (2005)"},{"key":"41_CR3","unstructured":"Arnault, F., Berger, T.P., Lauradoux, C.: The FCSR: primitive specification and supporting documentation. ECRYPT - Network of Excellence in Cryptology. http:\/\/www.ecrypt.eu.org\/stream\/ (2005)"},{"key":"41_CR4","unstructured":"Arnault, F., Berger, T.P., Lauradoux, C.: Update on F-FCSR stream cipher. ECRYPT - Network of Excellence in Cryptology. http:\/\/www.ecrypt.eu.org\/stream\/ (2006)"},{"key":"41_CR5","first-page":"341","volume-title":"INDOCRYPT. Lecture Notes in Computer Science, vol. 4859","author":"F Arnault","year":"2007","unstructured":"Arnault, F., Berger, T.P., Lauradoux, C., Minier, M.: X-FCSR\u2014a new software oriented stream cipher based upon FCSRs. In: Srinathan, K., Rangan, C.P., Yung, M. (eds.) INDOCRYPT. Lecture Notes in Computer Science, vol. 4859, pp. 341\u2013350. Springer, New York (2007)"},{"key":"41_CR6","first-page":"433","volume-title":"Selected Areas in Cryptography. Lecture Notes in Computer Science, vol. 5867","author":"F Arnault","year":"2009","unstructured":"Arnault, F., Berger, T.P., Lauradoux, C., Minier, M., Pousse, B.: A new approach for FCSRs. In: M.J.J. Jr., Rijmen, V., Safavi-Naini, R., (eds.) Selected Areas in Cryptography. Lecture Notes in Computer Science, vol. 5867, pp. 433\u2013448. Springer, New York (2009)"},{"issue":"2","key":"41_CR7","doi-asserted-by":"crossref","first-page":"836","DOI":"10.1109\/TIT.2007.913244","volume":"54","author":"F Arnault","year":"2008","unstructured":"Arnault, F., Berger, T.P., Minier, M.: Some results on FCSR automata with applications to the security of FCSR-Based pseudorandom generators. IEEE Trans. Inf. Theory 54(2), 836\u2013840 (2008)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"5","key":"41_CR8","doi-asserted-by":"crossref","first-page":"910","DOI":"10.1109\/TIT.2004.826651","volume":"50","author":"F Arnault","year":"2004","unstructured":"Arnault, F., Berger, T.P., Necer, A.: Feedback with carry shift registers synthesis with the Euclidean algorithm. IEEE Trans. Inf. Theory 50(5), 910\u2013917 (2004)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"41_CR9","first-page":"119","volume-title":"INDOCRYPT. Lecture Notes in Computer Science, vol. 5922","author":"TP Berger","year":"2009","unstructured":"Berger, T.P., Minier, M., Pousse, B.: Software oriented stream ciphers based upon FCSRs in diversified mode. In: Roy, B.K., Sendrier, N. (eds.) INDOCRYPT. Lecture Notes in Computer Science, vol. 5922, pp. 119\u2013135. Springer, New York (2009)"},{"issue":"1","key":"41_CR10","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1007\/s10623-006-9014-9","volume":"42","author":"NM Ebeid","year":"2007","unstructured":"Ebeid, N.M., Hasan, A.: On binary signed digit representations of integers. Des. Codes Cryptography 42(1), 43\u201365 (2007)","journal-title":"Des. Codes Cryptography"},{"key":"41_CR11","unstructured":"Fischer, S., Meier, W., Stegemann, D.: Equivalent representations of the F-FCSR keystream generator. In: ECRYPT Network of Excellence\u2014SASC Workshop, pp. 87\u201394. Available at http:\/\/www.ecrypt.eu.org\/stvl\/sasc2008\/ (2008)"},{"issue":"4","key":"41_CR12","doi-asserted-by":"crossref","first-page":"1342","DOI":"10.1109\/18.605605","volume":"43","author":"M Goresky","year":"1997","unstructured":"Goresky, M., Klapper, A.: Arithmetic crosscorrelations of feedback with carry shift register sequences. IEEE Trans. Inf. Theory 43(4), 1342\u20131345 (1997)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"11","key":"41_CR13","doi-asserted-by":"crossref","first-page":"2826","DOI":"10.1109\/TIT.2002.804048","volume":"48","author":"M Goresky","year":"2002","unstructured":"Goresky, M., Klapper, A.: Fibonacci and Galois representations of feedback-with-carry shift registers. IEEE Trans. Inf. Theory 48(11), 2826\u20132836 (2002)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"41_CR14","first-page":"334","volume-title":"SETA. Lecture Notes in Computer Science, vol. 4086","author":"M Goresky","year":"2006","unstructured":"Goresky, M., Klapper, A.: Periodicity and distribution properties of combined FCSR sequences. In: Gong, G., Helleseth, T., Song, H.Y., Yang, K., (eds.) SETA. Lecture Notes in Computer Science, vol. 4086, pp. 334\u2013341. Springer, New York (2006)"},{"key":"41_CR15","doi-asserted-by":"crossref","unstructured":"Goresky, M., Klapper, A.: Algebraic shift register sequences. Available at http:\/\/cs.engr.uky.edu\/~klapper\/algebraic.html (2009)","DOI":"10.1017\/CBO9781139057448"},{"key":"41_CR16","volume-title":"Guide to Elliptic Curve Cryptography","author":"D Hankerson","year":"2004","unstructured":"Hankerson, D., Vanstone, S., Menezes, A.: Guide to Elliptic Curve Cryptography. Springer, New York (2004)"},{"key":"41_CR17","first-page":"557","volume-title":"ASIACRYPT. Lecture Notes in Computer Science, vol. 5350","author":"M Hell","year":"2008","unstructured":"Hell, M., Johansson, T.: Breaking the F-FCSR-H Stream Cipher in Real Time. In: Pieprzyk, J. (ed.) ASIACRYPT. Lecture Notes in Computer Science, vol. 5350, pp. 557\u2013569. Springer, New York (2008)"},{"key":"41_CR18","first-page":"436","volume-title":"Progress in Cryptology\u2014INDOCRYPT 2006. Lecture Notes in Computer Science 4329","author":"A Joux","year":"2006","unstructured":"Joux, A., Delaunay, P.: Galois LFSR, embedded devices and side channel weaknesses. In: Progress in Cryptology\u2014INDOCRYPT 2006. Lecture Notes in Computer Science 4329, pp. 436\u2013451. Springer, New York (2006)"},{"key":"41_CR19","first-page":"174","volume-title":"FSE. Lecture Notes in Computer Science, vol. 809","author":"A Klapper","year":"1993","unstructured":"Klapper, A., Goresky, M.: 2-adic shift registers. In: Anderson, R.J. (ed.) FSE. Lecture Notes in Computer Science, vol. 809, pp. 174\u2013178. Springer, New York (1993)"},{"issue":"2","key":"41_CR20","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1007\/s001459900024","volume":"10","author":"A Klapper","year":"1997","unstructured":"Klapper, A., Goresky, M.: Feedback shift registers, 2-adic span, and combiners with memory. J. Cryptol. 10(2), 111\u2013147 (1997)","journal-title":"J. Cryptol."},{"issue":"1\u20132","key":"41_CR21","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1016\/S0304-3975(99)00066-3","volume":"226","author":"A Klapper","year":"1999","unstructured":"Klapper, A., Xu, J.: Algebraic feedback shift registers. Theor. Comput. Sci. 226(1\u20132), 61\u201392 (1999)","journal-title":"Theor. Comput. Sci."},{"key":"41_CR22","doi-asserted-by":"crossref","unstructured":"Lauradoux, C.: Extended windmill polynomials. In: ISIT\u201909: Proceedings of the 2009 IEEE International Conference on Symposium on Information Theory, pp. 1120\u20131124. IEEE Press, Piscataway, NJ, USA (2009)","DOI":"10.1109\/ISIT.2009.5206025"},{"issue":"14","key":"41_CR23","doi-asserted-by":"crossref","first-page":"1","DOI":"10.18637\/jss.v008.i14","volume":"8","author":"G Marsaglia","year":"2003","unstructured":"Marsaglia, G.: Xorshift RNGs. J. Stat. Softw. 8(14), 1\u20136 (2003)","journal-title":"J. Stat. Softw."},{"issue":"4","key":"41_CR24","doi-asserted-by":"crossref","first-page":"346","DOI":"10.1145\/1113316.1113319","volume":"15","author":"F Panneton","year":"2005","unstructured":"Panneton, F., L\u2019Ecuyer, P.: On the xorshift random number generators. ACM Trans. Model. Comput. Simul. 15(4), 346\u2013361 (2005)","journal-title":"ACM Trans. Model. Comput. Simul."},{"key":"41_CR25","doi-asserted-by":"crossref","unstructured":"Smeets, B.J.M., Chambers, W.G.: Windmill generators: a generalization and an observation of how many there are. In: EUROCRYPT, pp. 325\u2013330 (1988)","DOI":"10.1007\/3-540-45961-8_30"},{"key":"41_CR26","first-page":"23","volume-title":"FSE. Lecture notes in computer science, vol. 5665","author":"P Stankovski","year":"2009","unstructured":"Stankovski, P., Hell, M., Johansson, T.: An efficient state recovery attack on X-FCSR-256. In: Dunkelman, O. (ed.) FSE. Lecture notes in computer science, vol. 5665, pp. 23\u201337. Springer, New York (2009)"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-010-0041-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12095-010-0041-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-010-0041-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T21:17:46Z","timestamp":1559942266000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12095-010-0041-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,1,15]]},"references-count":26,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2011,6]]}},"alternative-id":["41"],"URL":"https:\/\/doi.org\/10.1007\/s12095-010-0041-z","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"value":"1936-2447","type":"print"},{"value":"1936-2455","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,1,15]]}}}