{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T06:03:35Z","timestamp":1757311415309,"version":"3.37.3"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2021,2,27]],"date-time":"2021-02-27T00:00:00Z","timestamp":1614384000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,2,27]],"date-time":"2021-02-27T00:00:00Z","timestamp":1614384000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"National Key R&D Program of China","award":["2017YFB0802500"],"award-info":[{"award-number":["2017YFB0802500"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972428"],"award-info":[{"award-number":["61972428"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003453","name":"Natural Science Foundation of Guangdong Province","doi-asserted-by":"publisher","award":["2018A030310080"],"award-info":[{"award-number":["2018A030310080"]}],"id":[{"id":"10.13039\/501100003453","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Major Program of Guangdong Basic and Applied Research","award":["2019B030302008"],"award-info":[{"award-number":["2019B030302008"]}]},{"name":"the Open Fund of State Key Laboratory of Information Security","award":["2020-ZD-02"],"award-info":[{"award-number":["2020-ZD-02"]}]},{"name":"National Social Science Fund of China","award":["14BXW031"],"award-info":[{"award-number":["14BXW031"]}]},{"name":"Guangdong Basic and Applied Basic Research Foundation","award":["2019A1515011797"],"award-info":[{"award-number":["2019A1515011797"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2021,3]]},"DOI":"10.1007\/s12095-021-00475-1","type":"journal-article","created":{"date-parts":[[2021,2,27]],"date-time":"2021-02-27T22:24:08Z","timestamp":1614464648000},"page":"343-359","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Trace representation of the binary pq2-periodic sequences derived from Euler quotients"],"prefix":"10.1007","volume":"13","author":[{"given":"Jingwei","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Chuangqiang","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Xiang","family":"Fan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1792-0589","authenticated-orcid":false,"given":"Chang-An","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,27]]},"reference":[{"issue":"1","key":"475_CR1","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1006\/jnth.1997.2162","volume":"66","author":"T Agoh","year":"1997","unstructured":"Agoh, T., Dilcher, K., Skula, L.: Fermat quotients for composite moduli. J. Number Theory 66(1), 29\u201350 (1997)","journal-title":"J. Number Theory"},{"issue":"11","key":"475_CR2","first-page":"1","volume":"57","author":"Z Chen","year":"2014","unstructured":"Chen, Z.: Trace representation and linear complexity of binary sequences derived from Fermat quotients. Sci. China Inform. Sci. 57(11), 1\u201310 (2014)","journal-title":"Sci. China Inform. Sci."},{"issue":"4","key":"475_CR3","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1007\/s12095-016-0185-6","volume":"9","author":"Z Chen","year":"2017","unstructured":"Chen, Z.: Linear complexity and trace representation of quaternary sequences over $\\mathbb {Z}_{4}$ based on generalized cyclotomic classes modulo pq. Cryptogr. Commun. 9(4), 445\u2013458 (2017)","journal-title":"Cryptogr. Commun."},{"issue":"3","key":"475_CR4","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1007\/s10623-012-9608-3","volume":"67","author":"Z Chen","year":"2013","unstructured":"Chen, Z., Du, X.: On the linear complexity of binary threshold sequences derived from Fermat quotients. Des. Codes Crypt. 67(3), 317\u2013323 (2013)","journal-title":"Des. Codes Crypt."},{"issue":"6","key":"475_CR5","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1007\/s00200-015-0265-4","volume":"26","author":"Z Chen","year":"2015","unstructured":"Chen, Z., Du, X., Marzouk, R.: Trace representation of pseudorandom binary sequences derived from Euler quotients. Appli. Alg. Eng. Commun. Comp. 26(6), 555\u2013570 (2015)","journal-title":"Appli. Alg. Eng. Commun. Comp."},{"issue":"4","key":"475_CR6","doi-asserted-by":"publisher","first-page":"805","DOI":"10.3934\/amc.2018047","volume":"12","author":"Z Chen","year":"2018","unstructured":"Chen, Z., Edemskiy, V., Ke, P., Wu, C.: On k-error linear complexity of pseudorandom binary sequences derived from Euler quotients. Adv. Math. Commun. 12(4), 805\u2013816 (2018)","journal-title":"Adv. Math. Commun."},{"issue":"9","key":"475_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11432-014-5220-7","volume":"58","author":"Z Chen","year":"2015","unstructured":"Chen, Z., Niu, Z., Wu, C.: On the k-error linear complexity of binary sequences derived from polynomial quotients. Sci. China Inform. Sci. 58(9), 1\u201315 (2015)","journal-title":"Sci. China Inform. Sci."},{"key":"475_CR8","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1090\/conm\/579\/11519","volume":"579","author":"Z Chen","year":"2012","unstructured":"Chen, Z., Winterhof, A.: Additive character sums of polynomial quotients. Contemp Math. 579, 67\u201373 (2012)","journal-title":"Contemp Math."},{"key":"475_CR9","doi-asserted-by":"publisher","first-page":"631","DOI":"10.1142\/S1793042112500352","volume":"8","author":"Z Chen","year":"2012","unstructured":"Chen, Z., Winterhof, A.: On the distribution of pseudorandom numbers and vectors derived from euler-Fermat quotients. Int. J. Number Theory 8, 631\u2013641 (2012)","journal-title":"Int. J. Number Theory"},{"key":"475_CR10","unstructured":"Cusick, T.W., Ding, C., Renvall, A.R.: Stream ciphers and number theory, vol. 66, Elsevier (2004)"},{"issue":"6","key":"475_CR11","doi-asserted-by":"publisher","first-page":"1517","DOI":"10.1016\/j.disc.2008.02.024","volume":"309","author":"Z Dai","year":"2009","unstructured":"Dai, Z., Gong, G., Song, H.Y.: A trace representation of binary Jacobi sequences. Discrete Math. 309(6), 1517\u20131527 (2009)","journal-title":"Discrete Math."},{"issue":"3","key":"475_CR12","doi-asserted-by":"publisher","first-page":"1530","DOI":"10.1109\/TIT.2010.2103757","volume":"57","author":"Z Dai","year":"2011","unstructured":"Dai, Z., Gong, G., Song, H.Y., Ye, D.: Trace representation and linear complexity of binary e th power residue sequences of period p. IEEE Trans. Inf. Theory 57(3), 1530\u20131547 (2011)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"2","key":"475_CR13","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1006\/ffta.1998.0207","volume":"4","author":"C Ding","year":"1998","unstructured":"Ding, C., Helleseth, T.: New generalized cyclotomy and its applications. Finite Fields and Their Applications 4(2), 140\u2013166 (1998)","journal-title":"Finite Fields and Their Applications"},{"key":"475_CR14","doi-asserted-by":"publisher","DOI":"10.1142\/3254","volume-title":"Chinese Remainder Theorem: Applications in Computing, Coding, Cryptography","author":"C Ding","year":"1996","unstructured":"Ding, C., Pei, D., Salomaa, A.: Chinese Remainder Theorem: Applications in Computing, Coding, Cryptography. World Scientific, Singapore (1996)"},{"key":"475_CR15","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-54973-0","volume-title":"The Stability Theory of Stream Ciphers","author":"C Ding","year":"1991","unstructured":"Ding, C., Xiao, G., Shan, W.: The Stability Theory of Stream Ciphers. Springer, Berlin (1991)"},{"issue":"219","key":"475_CR16","doi-asserted-by":"publisher","first-page":"1353","DOI":"10.1090\/S0025-5718-97-00843-0","volume":"66","author":"R Ernvall","year":"1997","unstructured":"Ernvall, R., Metsankyla, T.: On the p-divisibility of Fermat quotients. Mathematics of Computation of the American Mathematical Society 66 (219), 1353\u20131365 (1997)","journal-title":"Mathematics of Computation of the American Mathematical Society"},{"key":"475_CR17","volume-title":"Sequence Design for Communications Applications, vol. 1","author":"P Fan","year":"1996","unstructured":"Fan, P., Darnell, M.: Sequence Design for Communications Applications, vol. 1. Wiley, London (1996)"},{"key":"475_CR18","doi-asserted-by":"crossref","unstructured":"Golomb, S.W., Gong, G.: Signal Design for Good Correlation for Wireless Communication, Cryptography and Radar. Cambridge University Press (2005)","DOI":"10.1017\/CBO9780511546907"},{"issue":"2","key":"475_CR19","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/s10998-012-3747-1","volume":"64","author":"D Gomez","year":"2012","unstructured":"Gomez, D., Winterhof, A.: Multiplicative character sums of Fermat quotients and pseudorandom sequences. Period. Math. Hung. 64(2), 161\u2013168 (2012)","journal-title":"Period. Math. Hung."},{"issue":"5","key":"475_CR20","doi-asserted-by":"publisher","first-page":"3944","DOI":"10.1109\/TIT.2018.2796127","volume":"64","author":"Y Jiang","year":"2018","unstructured":"Jiang, Y., Lin, D.: Lower and upper bounds on the density of irreducible NFSRs. IEEE Trans. Inform. Theory 64(5), 3944\u20133952 (2018)","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"3","key":"475_CR21","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1023\/A:1011287607979","volume":"24","author":"JH Kim","year":"2001","unstructured":"Kim, J.H., Song, H.Y.: Trace representation of Legendre sequences. Des. Codes Crypt. 24(3), 343\u2013348 (2001)","journal-title":"Des. Codes Crypt."},{"key":"475_CR22","volume-title":"Introduction to Finite Fields and Their Applications","author":"R Lidl","year":"1986","unstructured":"Lidl, R., Niederreiter, H.: Introduction to Finite Fields and Their Applications. Cambridge University Press, New York (1986)"},{"key":"475_CR23","unstructured":"Michael, A.: Algebra. Pearson Prentice Hall (2011)"},{"issue":"6","key":"475_CR24","doi-asserted-by":"publisher","first-page":"2254","DOI":"10.1109\/18.556617","volume":"42","author":"JS No","year":"1996","unstructured":"No, J.S., Lee, H.K., Chung, H., Song, H.Y., Yang, K.: Trace representation of Legendre sequences of Mersenne prime period. IEEE Trans. Inf. Theory 42(6), 2254\u20132255 (1996)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"475_CR25","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1137\/100798466","volume":"25","author":"A Ostafe","year":"2011","unstructured":"Ostafe, A., Shparlinski, I.E.: Pseudorandomness and dynamics of Fermat quotients. SIAM J. Discret. Math. 25(1), 50\u201371 (2011)","journal-title":"SIAM J. Discret. Math."},{"issue":"2","key":"475_CR26","doi-asserted-by":"publisher","first-page":"1076","DOI":"10.1109\/TIT.2015.2511780","volume":"62","author":"K Park","year":"2016","unstructured":"Park, K., Song, H., Kim, D.S., Golomb, S.W.: Optimal families of perfect polyphase sequences from the array structure of Fermat-quotient sequences. IEEE Trans. Inf. Theory 62(2), 1076\u20131086 (2016)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"4","key":"475_CR27","doi-asserted-by":"publisher","first-page":"1031","DOI":"10.1093\/qmath\/haq028","volume":"62","author":"IE Shparlinski","year":"2011","unstructured":"Shparlinski, I.E.: Characters sums with Fermat quotients. Quart. J. Math 62(4), 1031\u20131043 (2011)","journal-title":"Quart. J. Math"},{"issue":"2","key":"475_CR28","first-page":"022,308:1","volume":"61","author":"W Su","year":"2017","unstructured":"Su, W., Yang, Y., Zhou, Z., Tang, X.: New quaternary sequences of even length with optimal auto-correlation. Sci. China Inform. Sci. 61(2), 022,308:1\u2013022,308:13 (2017)","journal-title":"Sci. China Inform. Sci."},{"issue":"1","key":"475_CR29","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1109\/TIT.2017.2767076","volume":"64","author":"Y Yang","year":"2018","unstructured":"Yang, Y., Tang, X.: Generic construction of binary sequences of period 2n with optimal odd correlation magnitude based on quaternary sequences of odd period N. IEEE Trans. Inform. Theory 64(1), 384\u2013392 (2018)","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"9","key":"475_CR30","doi-asserted-by":"publisher","first-page":"5774","DOI":"10.1109\/TIT.2020.2979838","volume":"66","author":"J Zhang","year":"2020","unstructured":"Zhang, J., Gao, S., Zhao, C.: Linear complexity of a family of binary pq2-periodic sequences from euler quotients. IEEE Trans. Inf. Theory 66(9), 5774\u20135780 (2020)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"2","key":"475_CR31","doi-asserted-by":"publisher","first-page":"1249","DOI":"10.1109\/TIT.2018.2858769","volume":"65","author":"J Zhang","year":"2019","unstructured":"Zhang, J., Tian, T., Qi, W., Zheng, Q.: A new method for finding affine sub-families of NFSR sequences. IEEE Trans. Inform. Theory 65(2), 1249\u20131257 (2019)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"475_CR32","doi-asserted-by":"crossref","unstructured":"Zhao, L., Du, X., Wu, C.: Trace representation of the sequences derived from polynomial quotient. In: Sun, X., Pan, Z., Bertino, E. (eds.) Cloud Computing and Security, pp 26\u201337. Springer International Publishing, Cham (2018)","DOI":"10.1007\/978-3-030-00015-8_3"},{"issue":"12","key":"475_CR33","doi-asserted-by":"publisher","first-page":"2775","DOI":"10.1007\/s10623-018-0473-6","volume":"86","author":"XX Zhao","year":"2018","unstructured":"Zhao, X.X., Tian, T., Qi, W.F.: A ring-like cascade connection and a class of NFSRs with the same cycle structures. Des. Codes Crypt. 86(12), 2775\u20132790 (2018)","journal-title":"Des. Codes Crypt."}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-021-00475-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12095-021-00475-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-021-00475-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,12]],"date-time":"2021-03-12T15:45:10Z","timestamp":1615563910000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12095-021-00475-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,27]]},"references-count":33,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,3]]}},"alternative-id":["475"],"URL":"https:\/\/doi.org\/10.1007\/s12095-021-00475-1","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"type":"print","value":"1936-2447"},{"type":"electronic","value":"1936-2455"}],"subject":[],"published":{"date-parts":[[2021,2,27]]},"assertion":[{"value":"18 October 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 February 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 February 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}