{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T20:31:59Z","timestamp":1770841919625,"version":"3.50.1"},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2021,7,7]],"date-time":"2021-07-07T00:00:00Z","timestamp":1625616000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,7,7]],"date-time":"2021-07-07T00:00:00Z","timestamp":1625616000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2022,3]]},"DOI":"10.1007\/s12095-021-00500-3","type":"journal-article","created":{"date-parts":[[2021,7,7]],"date-time":"2021-07-07T01:02:26Z","timestamp":1625619746000},"page":"229-258","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Improved transformation algorithms for generalized Galois NLFSRs"],"prefix":"10.1007","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4523-8816","authenticated-orcid":false,"given":"Ge","family":"Yao","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9798-0134","authenticated-orcid":false,"given":"Udaya","family":"Parampalli","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,7]]},"reference":[{"issue":"1","key":"500_CR1","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1504\/IJWMC.2007.013798","volume":"2","author":"M Hell","year":"2007","unstructured":"Hell, M., Johansson, T., Meier, W.: Grain: a stream cipher for constrained environments. Int. J. Wirel. Mob. Comput. 2(1), 86\u201393 (2007)","journal-title":"Int. J. Wirel. Mob. Comput."},{"key":"500_CR2","doi-asserted-by":"crossref","unstructured":"Hell, M., Johansson, T., Maximov, A., Meier, W.: A stream cipher proposal: Grain-128. In: 2006 IEEE International Symposium on Information Theory, pp 1614\u20131618. IEEE (2006)","DOI":"10.1109\/ISIT.2006.261549"},{"issue":"1","key":"500_CR3","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1504\/IJWMC.2011.044106","volume":"5","author":"M A\u0307gren","year":"2011","unstructured":"A\u0307gren, M., Hell, M., Johansson, T., Meier, W.: Grain-128a: a new version of Grain-128 with optional authentication. Int. J. Wirel. Mob. Comput. 5 (1), 48\u201359 (2011)","journal-title":"Int. J. Wirel. Mob. Comput."},{"key":"500_CR4","doi-asserted-by":"crossref","unstructured":"Armknecht, F., Mikhalev, V.: On lightweight stream ciphers with shorter internal states. In: International Workshop on Fast Software Encryption, pp 451\u2013470. Springer, Berlin (2015)","DOI":"10.1007\/978-3-662-48116-5_22"},{"key":"500_CR5","doi-asserted-by":"crossref","unstructured":"Mikhalev, V., Armknecht, F., M\u00fcller, C.: On ciphers that continuously access the non-volatile key. IACR Trans. on Symmetric Cryptol. ,52\u201379 (2016)","DOI":"10.46586\/tosc.v2016.i2.52-79"},{"key":"500_CR6","doi-asserted-by":"crossref","unstructured":"De Canni\u00e8re, C.: Trivium: A stream cipher construction inspired by block cipher design principles. In: International Conference on Information Security, pp 171\u2013186. Springer, Berlin (2006)","DOI":"10.1007\/11836810_13"},{"issue":"2","key":"500_CR7","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/s12095-015-0173-2","volume":"9","author":"E Dubrova","year":"2017","unstructured":"Dubrova, E., Hell, M.: Espresso: A stream cipher for 5G wireless communication systems. Cryptogr. Commun. 9(2), 273\u2013289 (2017)","journal-title":"Cryptogr. Commun."},{"key":"500_CR8","unstructured":"Ertaul, L., Woodall, A.: IoT security: Performance evaluation of grain, mickey, and trivium-lightweight stream ciphers. In: Proceedings of the International Conference on Security and Management (SAM). The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp), pp 32\u201338 (2017)"},{"key":"500_CR9","doi-asserted-by":"crossref","unstructured":"Mansouri, S.S., Dubrova, E.: An improved hardware implementation of the grain stream cipher. In: 2010 13th Euromicro Conference on Digital System Design: Architectures, Methods and Tools, pp 433\u2013440. IEEE (2010)","DOI":"10.1109\/DSD.2010.49"},{"key":"500_CR10","doi-asserted-by":"crossref","unstructured":"Mansouri, S.S., Dubrova, E.: An improved hardware implementation of the Grain-128a stream cipher. In: International Conference on Information Security and Cryptology, pp 278\u2013292. Springer, Berlin (2012)","DOI":"10.1007\/978-3-642-37682-5_20"},{"issue":"4","key":"500_CR11","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1109\/TIT.1964.1053690","volume":"10","author":"J Massey","year":"1964","unstructured":"Massey, J., Liu, Ruey-Wen: Equivalence of nonlinear shift-registers. IEEE Trans. Inf. Theory 10(4), 378\u2013379 (1964)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"11","key":"500_CR12","doi-asserted-by":"publisher","first-page":"5263","DOI":"10.1109\/TIT.2009.2030467","volume":"55","author":"E Dubrova","year":"2009","unstructured":"Dubrova, E.: A transformation from the Fibonacci to the Galois NLFSRs. IEEE Trans. Inf. Theory 55(11), 5263\u20135271 (2009)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"6","key":"500_CR13","doi-asserted-by":"publisher","first-page":"2961","DOI":"10.1109\/TIT.2010.2046250","volume":"56","author":"E Dubrova","year":"2010","unstructured":"Dubrova, E.: Finding matching initial states for equivalent NLFSRs in the Fibonacci and the Galois configurations. IEEE Trans. Inf. Theory 56(6), 2961\u20132966 (2010)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"500_CR14","doi-asserted-by":"crossref","unstructured":"Zhiqiang, L.: The transformation from the Galois NLFSR to the Fibonacci configuration. In: Fourth International Conference on Emerging Intelligent Data and Web Technologies, p 2013 (2013)","DOI":"10.1109\/EIDWT.2013.64"},{"key":"500_CR15","doi-asserted-by":"crossref","unstructured":"Dubrova, E.: An equivalence-preserving transformation of shift registers. In: International Conference on Sequences and Their Applications, pp 187\u2013199. Springer, Cham (2014)","DOI":"10.1007\/978-3-319-12325-7_16"},{"key":"500_CR16","first-page":"1045","volume":"2015","author":"G Li","year":"2015","unstructured":"Li, G., Yarom, Y., Ranasinghe, D.C.: Exploiting transformations of the galois configuration to improve guess-and-determine attacks on NFSRs. IACR Cryptol. ePrint Arch. 2015, 1045 (2015)","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"500_CR17","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1016\/j.automatica.2018.07.011","volume":"96","author":"J Lu","year":"2018","unstructured":"Lu, J., Li, M., Huang, T., Liu, Y., Cao, J.: The transformation between the Galois NLFSRs and the Fibonacci NLFSRs via semi-tensor product of matrices. Automatica 96, 393\u2013397 (2018)","journal-title":"Automatica"},{"key":"500_CR18","doi-asserted-by":"crossref","unstructured":"Yao, G., Udaya, P.: Cryptanalysis of the class of maximum period Galois NLFSR-based stream ciphers. Submitted to Cryptography and Communications (2020)","DOI":"10.1007\/s12095-021-00511-0"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-021-00500-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12095-021-00500-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-021-00500-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,3]],"date-time":"2022-03-03T07:15:48Z","timestamp":1646291748000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12095-021-00500-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,7]]},"references-count":18,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,3]]}},"alternative-id":["500"],"URL":"https:\/\/doi.org\/10.1007\/s12095-021-00500-3","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"value":"1936-2447","type":"print"},{"value":"1936-2455","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,7,7]]},"assertion":[{"value":"28 October 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 June 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 July 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}