{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T20:32:42Z","timestamp":1770841962844,"version":"3.50.1"},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2021,7,19]],"date-time":"2021-07-19T00:00:00Z","timestamp":1626652800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,7,19]],"date-time":"2021-07-19T00:00:00Z","timestamp":1626652800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2021,9]]},"DOI":"10.1007\/s12095-021-00511-0","type":"journal-article","created":{"date-parts":[[2021,7,19]],"date-time":"2021-07-19T17:03:11Z","timestamp":1626714191000},"page":"847-864","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Cryptanalysis of the class of maximum period galois NLFSR-based stream ciphers"],"prefix":"10.1007","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4523-8816","authenticated-orcid":false,"given":"Ge","family":"Yao","sequence":"first","affiliation":[]},{"given":"Udaya","family":"Parampalli","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,19]]},"reference":[{"key":"511_CR1","doi-asserted-by":"crossref","unstructured":"Biryukov, A., Shamir, A.: Cryptanalytic time\/memory\/data tradeoffs for stream ciphers. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 1\u201313. Springer, Berlin (2000)","DOI":"10.1007\/3-540-44448-3_1"},{"issue":"2","key":"511_CR2","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/s12095-015-0173-2","volume":"9","author":"E Dubrova","year":"2017","unstructured":"Dubrova, E., Hell, M.: Espresso: A stream cipher for 5G wireless communication systems. Cryptogr. Commun. 9(2), 273\u2013289 (2017)","journal-title":"Cryptogr. Commun."},{"issue":"1","key":"511_CR3","doi-asserted-by":"publisher","first-page":"703","DOI":"10.1109\/TIT.2012.2214204","volume":"59","author":"E Dubrova","year":"2012","unstructured":"Dubrova, E.: A Scalable Method for Constructing Galois NLFSRs With Period 2n \u2212\u20091 Using Cross-Join Pairs. IEEE Trans. Inf. Theory 59(1), 703\u2013709 (2012)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"11","key":"511_CR4","doi-asserted-by":"publisher","first-page":"5263","DOI":"10.1109\/TIT.2009.2030467","volume":"55","author":"E Dubrova","year":"2009","unstructured":"Dubrova, E.: A transformation from the Fibonacci to the Galois NLFSRs. IEEE Trans. Inf. Theory 55(11), 5263\u20135271 (2009)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"511_CR5","doi-asserted-by":"crossref","unstructured":"Courtois, N.T: Fast algebraic attacks on stream ciphers with linear feedback. In: Annual International Cryptology Conference, pp. 176\u2013194. Springer, Berlin (2003)","DOI":"10.1007\/978-3-540-45146-4_11"},{"key":"511_CR6","doi-asserted-by":"crossref","unstructured":"Hawkes, P., Rose, G.G.: Rewriting variables: The complexity of fast algebraic attacks on stream ciphers. In: Annual International Cryptology Conference, pp. 390\u2013406. Springer, Berlin (2004)","DOI":"10.1007\/978-3-540-28628-8_24"},{"issue":"5","key":"511_CR7","doi-asserted-by":"publisher","first-page":"1752","DOI":"10.1109\/TIT.2007.894690","volume":"53","author":"S Ronjom","year":"2007","unstructured":"Ronjom, S., Helleseth, T.: A new attack on the filter generator. IEEE Trans Inf Theory 53(5), 1752\u20131758 (2007)","journal-title":"IEEE Trans Inf Theory"},{"key":"511_CR8","unstructured":"Golomb, SW.: Shift register sequences. Aegean Park Press (1967)"},{"key":"511_CR9","doi-asserted-by":"crossref","unstructured":"Dubrova, E.: An equivalence-preserving transformation of shift registers. In: International Conference on Sequences and Their Applications, pp. 187\u2013199. Springer, Cham (2014)","DOI":"10.1007\/978-3-319-12325-7_16"},{"key":"511_CR10","doi-asserted-by":"crossref","unstructured":"Wang, L., Shen, B., Qiao, T.: Searching short recurrences of nonlinear shift registers via directed acyclic graphs. In: International Conference on Information Security and Cryptology, pp. 44\u201356. Springer, Berlin (2011)","DOI":"10.1007\/978-3-642-34704-7_4"},{"key":"511_CR11","doi-asserted-by":"crossref","unstructured":"Zhiqiang, L.: The transformation from the Galois NLFSR to the Fibonacci configuration. In: Fourth International Conference on Emerging Intelligent Data and Web Technologies, pp. 335\u2013339. IEEE (2013)","DOI":"10.1109\/EIDWT.2013.64"},{"key":"511_CR12","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1016\/j.automatica.2018.07.011","volume":"96","author":"J Lu","year":"2018","unstructured":"Lu, J., Li, M., Huang, T., Liu, Y., Cao, J.: The transformation between the Galois NLFSRs and the Fibonacci NLFSRs via semi-tensor product of matrices. Automatica 96, 393\u2013397 (2018)","journal-title":"Automatica"},{"key":"511_CR13","doi-asserted-by":"crossref","unstructured":"Courtois, N.T., Meier, W.: Algebraic attacks on stream ciphers with linear feedback. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 345\u2013359. Springer, Berlin (2003)","DOI":"10.1007\/3-540-39200-9_21"},{"issue":"6","key":"511_CR14","doi-asserted-by":"publisher","first-page":"732","DOI":"10.1109\/TIT.1976.1055626","volume":"22","author":"E Key","year":"1976","unstructured":"Key, E.: An analysis of the structure and complexity of nonlinear binary sequence generators. IEEE Trans. Inf. Theory 22(6), 732\u2013736 (1976)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"511_CR15","first-page":"91","volume":"3","author":"J Zhang","year":"2016","unstructured":"Zhang, J., Qi, W.: Cryptanalysis of an equivalent model of stream cipher espresso. J. Cryptol. Res. 3(1), 91\u2013100 (2016)","journal-title":"J. Cryptol. Res."},{"key":"511_CR16","doi-asserted-by":"crossref","unstructured":"Wang, M.X., Lin, D.D.: Related Key Chosen IV Attack on Stream Cipher Espresso Variant. In: IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), vol. 1, pp. 580\u2013587. IEEE (2017)","DOI":"10.1109\/CSE-EUC.2017.107"},{"issue":"4","key":"511_CR17","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1007\/BF02165411","volume":"13","author":"V Strassen","year":"1969","unstructured":"Strassen, V.: Gaussian elimination is not optimal. Numer. Math. 13(4), 354\u2013356 (1969)","journal-title":"Numer. Math."},{"key":"511_CR18","unstructured":"Ge, Y., Udaya, P.: Improved Transformation Algorithms for Generalized Galois NLFSRs Submitted to Cryptography and Communications (2020)"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-021-00511-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12095-021-00511-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-021-00511-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,10]],"date-time":"2021-10-10T05:44:26Z","timestamp":1633844666000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12095-021-00511-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,19]]},"references-count":18,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2021,9]]}},"alternative-id":["511"],"URL":"https:\/\/doi.org\/10.1007\/s12095-021-00511-0","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"value":"1936-2447","type":"print"},{"value":"1936-2455","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,7,19]]},"assertion":[{"value":"29 October 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 June 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 July 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}