{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T10:33:18Z","timestamp":1651833198564},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2016,2,12]],"date-time":"2016-02-12T00:00:00Z","timestamp":1455235200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1007\/s12095-016-0183-8","type":"journal-article","created":{"date-parts":[[2016,2,12]],"date-time":"2016-02-12T17:26:12Z","timestamp":1455297972000},"page":"431-443","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Practical construction of ring LFSRs and ring FCSRs with low diffusion delay for hardware cryptographic applications"],"prefix":"10.1007","volume":"9","author":[{"given":"Zhiqiang","family":"Lin","sequence":"first","affiliation":[]},{"given":"Dongdai","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Dingyi","family":"Pei","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,2,12]]},"reference":[{"key":"183_CR1","doi-asserted-by":"crossref","unstructured":"Arnault, F., Berger, T.P.: F-FCSR: design of a new class of stream ciphers. In: Gilbert, H., Handschuh, H. (eds.) FSE. Lecture Notes in Computer Science, vol. 3557, pp. 83\u201397. Springer, New York (2005)","DOI":"10.1007\/11502760_6"},{"issue":"2","key":"183_CR2","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1007\/s12095-010-0041-z","volume":"3","author":"F Arnault","year":"2010","unstructured":"Arnault, F., Berger, T.P., Benjamin, P.: A Matrix Approach for FCSR Automata. Cryptogr. Commun. 3(2), 109\u2013139 (2010)","journal-title":"Cryptogr. Commun."},{"key":"183_CR3","unstructured":"Arnault, F., Berger, T.P., Lauradoux, C.: Update on F-FCSR Stream Cipher. ECRYPT-Network of Excellence in Cryptology (Call for stream Cipher Primitives-Phase 2 2006) (2006). [ http:\/\/www.ecrypt.eu.org\/stream\/ ]"},{"key":"183_CR4","doi-asserted-by":"crossref","unstructured":"Arnault, F., Berger, T.P., Lauradoux, C., Minier, M., Pousse, B.: A new approach for FCSRs. In: M.J.J. Jr., Rijmen, V., Safavi-Naini, R. (eds.) Selected Areas in Cryptography. Lecture Notes in Computer Science, vol. 5867, pp 433\u2013448. Springer, New York (2009)","DOI":"10.1007\/978-3-642-05445-7_27"},{"issue":"12","key":"183_CR5","doi-asserted-by":"crossref","first-page":"8095","DOI":"10.1109\/TIT.2011.2164234","volume":"57","author":"F Arnault","year":"2011","unstructured":"Arnault, F., Berger, T.P., Minier, M., Pousse, B.: Revisiting LFSRs for cryptographic applications. IEEE Trans. Inf. Theory 57(12), 8095\u20138113 (2011)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"183_CR6","doi-asserted-by":"crossref","unstructured":"Berger, T.P., Minier, M., Pousse, B.: Software oriented stream ciphers based upon FCSRs in diversified mode. In: Roy, B.K., Sendrier, N. (eds.) INDOCRYPT. Lecture Notes in Computer Science, vol. 5922, pp 119\u2013135. Springer, New York (2009)","DOI":"10.1007\/978-3-642-10628-6_8"},{"key":"183_CR7","first-page":"329","volume-title":"Random mapping statistics. Advances in cryptologyEUROCRYPT\u201989","author":"P Flajolet","year":"1990","unstructured":"Flajolet, P., Odlyzko, A.M.: Random mapping statistics. Advances in cryptologyEUROCRYPT\u201989, pp 329\u2013354. Springer, Berlin (1990)"},{"issue":"4","key":"183_CR8","doi-asserted-by":"crossref","first-page":"1342","DOI":"10.1109\/18.605605","volume":"43","author":"M Goresky","year":"1997","unstructured":"Goresky, M., Klapper, A.: Arithmetic crosscorrelations of feedback with carry shift register sequences. IEEE Trans. Inf. Theory 43(4), 1342\u20131345 (1997)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"11","key":"183_CR9","doi-asserted-by":"crossref","first-page":"2826","DOI":"10.1109\/TIT.2002.804048","volume":"48","author":"M Goresky","year":"2002","unstructured":"Goresky, M., Klapper, A.: Fibonacci and Galois representations of feedback-with-carry shift registers. IEEE Trans. Inf. Theory 48(11), 2826\u20132836 (2002)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"183_CR10","doi-asserted-by":"crossref","unstructured":"Hell, M., Johansson, T.: Breaking the F-FCSR-H Stream Cipher in Real Time. In: Pieprzyk, J. (ed.) ASIACRYPT. Lecture Notes in Computer Science, vol. 5350, pp 557\u2013569. Springer, New York (2008)","DOI":"10.1007\/978-3-540-89255-7_34"},{"issue":"6","key":"183_CR11","doi-asserted-by":"crossref","first-page":"439","DOI":"10.1109\/TC.1981.1675809","volume":"100","author":"M Imase","year":"1981","unstructured":"Imase, M., Itoh, M.: Design to minimize diameter on building-block network. IEEE Trans. Comput. 100(6), 439\u2013442 (1981)","journal-title":"IEEE Trans. Comput."},{"issue":"8","key":"183_CR12","doi-asserted-by":"crossref","first-page":"782","DOI":"10.1109\/TC.1983.1676323","volume":"32","author":"M Imase","year":"1983","unstructured":"Imase, M., Itoh, M.: A design for directed graphs with minimum diameter. IEEE Trans. Comput. 32(8), 782\u2013784 (1983)","journal-title":"IEEE Trans. Comput."},{"key":"183_CR13","doi-asserted-by":"crossref","unstructured":"Klapper, A., Goresky, M.: 2-adic shift registers. In: Anderson, R.J. (ed.) FSE. Lecture Notes in Computer Science, vol. 809, pp 174\u2013178. Springer, New York (1993)","DOI":"10.1007\/3-540-58108-1_21"},{"key":"183_CR14","first-page":"263","volume-title":"Large Period Nearly deBruijn FCSR Sequences. Advances in Cryptology-EUROCRYPT\u201995","author":"A Klapper","year":"1995","unstructured":"Klapper, A., Goresky, M.: Large Period Nearly deBruijn FCSR Sequences. Advances in Cryptology-EUROCRYPT\u201995, pp 263\u2013273. Springer, Berlin (1995)"},{"issue":"1","key":"183_CR15","doi-asserted-by":"crossref","first-page":"434","DOI":"10.1587\/transfun.E98.A.434","volume":"98","author":"Z Lin","year":"2015","unstructured":"Lin, Z., Ke, L., Lin, D., Gao, J.: On the LFSRization of a Class of FCSR Automata. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98(1), 434\u2013440 (2015)","journal-title":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci."},{"key":"183_CR16","unstructured":"Lin, Z., Pei, D., Lin, D.: Construction of Transition Matrices for Binary FCSRs. Tech. Rep. 2015\/1181. Available: http:\/\/eprint.iacr.org\/"},{"issue":"9","key":"183_CR17","doi-asserted-by":"crossref","first-page":"1306","DOI":"10.1109\/TCAD.2004.831584","volume":"23","author":"G Mruglaski","year":"2004","unstructured":"Mruglaski, G., Rajski, J., Tyszer, J.: Ring generators-new devices for embedded test applications. Computer-Aided Design of Integrated Circuits and Systems. IEEE Trans. Comput.-Aided Design 23(9), 1306\u20131320 (2004)","journal-title":"IEEE Trans. Comput.-Aided Design"},{"key":"183_CR18","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1007\/s10623-009-9280-4","volume":"52","author":"T Tian","year":"2009","unstructured":"Tian, T., Qi, W.F.: Linearity properties of binary FCSR sequences. Des. Codes Cryptography 52, 249\u2013262 (2009)","journal-title":"Des. Codes Cryptography"},{"issue":"1","key":"183_CR19","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1007\/s10623-013-9845-0","volume":"74","author":"H Wang","year":"2015","unstructured":"Wang, H., Stankovski, P., Johansson, T.: A generalized birthday approach for efficiently finding linear relations in l-sequences. Des. Codes Cryptography 74(1), 41\u201357 (2015)","journal-title":"Des. Codes Cryptography"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-016-0183-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12095-016-0183-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-016-0183-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-016-0183-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,4]],"date-time":"2019-09-04T10:21:05Z","timestamp":1567592465000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12095-016-0183-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,2,12]]},"references-count":19,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,7]]}},"alternative-id":["183"],"URL":"https:\/\/doi.org\/10.1007\/s12095-016-0183-8","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"value":"1936-2447","type":"print"},{"value":"1936-2455","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,2,12]]}}}