{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,22]],"date-time":"2025-07-22T10:38:50Z","timestamp":1753180730464,"version":"3.37.3"},"reference-count":13,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,8,7]],"date-time":"2020-08-07T00:00:00Z","timestamp":1596758400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,7]],"date-time":"2020-08-07T00:00:00Z","timestamp":1596758400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2021,1]]},"DOI":"10.1007\/s12095-020-00451-1","type":"journal-article","created":{"date-parts":[[2020,8,7]],"date-time":"2020-08-07T10:03:03Z","timestamp":1596794583000},"page":"15-26","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Computing the 2-adic complexity of two classes of Ding-Helleseth generalized cyclotomic sequences of periods of twin prime products"],"prefix":"10.1007","volume":"13","author":[{"given":"Ming","family":"Yan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9647-503X","authenticated-orcid":false,"given":"Tongjiang","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,7]]},"reference":[{"key":"451_CR1","volume-title":"Stream Ciphers and Number Theory","author":"TW Cusick","year":"1998","unstructured":"Cusick, T.W., Ding, C., Renvall, A.: Stream Ciphers and Number Theory. Elsevier, Amsterdam (1998)"},{"key":"451_CR2","first-page":"262","volume":"963","author":"A Klapper","year":"1995","unstructured":"Klapper, A., Goresky, M.: Cryptanalysis based on 2-adic rational approximation. Advances in Cryptology-crypoto95 963, 262\u2013274 (1995)","journal-title":"Advances in Cryptology-crypoto95"},{"key":"451_CR3","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/s001459900024","volume":"10","author":"A Klapper","year":"1997","unstructured":"Klapper, A., Goresky, M.: Feedback shift registers, 2-adic span, and combiners with memory. J. Cryptol. 10, 111\u2013147 (1997)","journal-title":"J. Cryptol."},{"key":"451_CR4","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1109\/TIT.2009.2034904","volume":"56","author":"T Tian","year":"2010","unstructured":"Tian, T., Qi, W.: 2-Adic complexity of binary m-sequences. IEEE Trans. Inform. Theory 56, 450\u2013454 (2010)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"451_CR5","doi-asserted-by":"publisher","first-page":"5803","DOI":"10.1109\/TIT.2014.2336843","volume":"60","author":"H Hu","year":"2014","unstructured":"Hu, H.: Comments on \u201cA new method to compute the 2-adic complexity of binary sequences\u201d. IEEE Trans. Inform. Theory 60, 5803\u20135804 (2014)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"451_CR6","doi-asserted-by":"publisher","first-page":"2399","DOI":"10.1109\/TIT.2014.2304451","volume":"60","author":"H Xiong","year":"2014","unstructured":"Xiong, H., Qu, L., Li, C.: A new method to compute the 2-adic complexity of binary sequences. IEEE Trans. Inform. Theory 60, 2399\u20132406 (2014)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"451_CR7","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/j.ffa.2014.09.009","volume":"33","author":"H Xiong","year":"2015","unstructured":"Xiong, H., Qu, L., Li, C.: 2-Adic complexity of binary sequences with interleaved structure. Finite Fields and Their Appl. 33, 14\u201328 (2015)","journal-title":"Finite Fields and Their Appl."},{"key":"451_CR8","doi-asserted-by":"crossref","unstructured":"Hofer, R., Winterhof, A.: On the 2-adic complexity of the two-prime generator. IEEE Trans. Inform. Theory, pp 1\u20131 (2018)","DOI":"10.1109\/TIT.2018.2811507"},{"key":"451_CR9","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/s12095-018-0300-y","volume":"11","author":"Y Sun","year":"2019","unstructured":"Sun, Y., Wang, Q., Yan, T.: A lower bound on the 2-adic complexity of the modified Jacobi sequence. Cryptogr. Commun. 11, 337\u2013349 (2019)","journal-title":"Cryptogr. Commun."},{"key":"451_CR10","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1007\/s12095-017-0233-x","volume":"10","author":"Y Sun","year":"2018","unstructured":"Sun, Y., Wang, Q., Yan, T.: The exact autocorrelation distribution and 2-adic complexity of a class of binary sequences with almost optimal autocorrelation. Cryptogr. Commun. 10, 467\u2013477 (2018)","journal-title":"Cryptogr. Commun."},{"key":"451_CR11","doi-asserted-by":"publisher","first-page":"01005","DOI":"10.1051\/itmconf\/20170901005","volume":"9","author":"V Edemskiy","year":"2017","unstructured":"Edemskiy, V., Sokolovskiy, N.: Notes about the linear complexity of Ding-Helleseth generalized cyclotomic sequences of length pq over the finite field of order p or q. ITM Web of Conferences 9, 01005 (2017)","journal-title":"ITM Web of Conferences"},{"key":"451_CR12","doi-asserted-by":"publisher","first-page":"605","DOI":"10.1007\/s12095-015-0165-2","volume":"8","author":"Q Wang","year":"2016","unstructured":"Wang, Q., Lin, D.: Generalized cyclotomic numbers of order two and their applications. Cryptogr. Commun. 8, 605\u2013616 (2016)","journal-title":"Cryptogr. Commun."},{"key":"451_CR13","volume-title":"Gauss and Jacobi Sums","author":"BC Berndt","year":"1998","unstructured":"Berndt, B.C., Evans, R.J., Williams, K.S.: Gauss and Jacobi Sums. Wiley, New York (1998)"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-020-00451-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12095-020-00451-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-020-00451-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,6]],"date-time":"2021-08-06T23:39:08Z","timestamp":1628293148000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12095-020-00451-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,7]]},"references-count":13,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["451"],"URL":"https:\/\/doi.org\/10.1007\/s12095-020-00451-1","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"type":"print","value":"1936-2447"},{"type":"electronic","value":"1936-2455"}],"subject":[],"published":{"date-parts":[[2020,8,7]]},"assertion":[{"value":"9 December 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 July 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 August 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}