{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:33:30Z","timestamp":1772120010198,"version":"3.50.1"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,1,17]],"date-time":"2024-01-17T00:00:00Z","timestamp":1705449600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,17]],"date-time":"2024-01-17T00:00:00Z","timestamp":1705449600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1007\/s12095-024-00694-2","type":"journal-article","created":{"date-parts":[[2024,1,17]],"date-time":"2024-01-17T01:01:56Z","timestamp":1705453316000},"page":"679-698","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["GL-S-NFSR: A new NFSR structure and its period properties"],"prefix":"10.1007","volume":"16","author":[{"given":"Xiao-Juan","family":"Wang","sequence":"first","affiliation":[]},{"given":"Tian","family":"Tian","sequence":"additional","affiliation":[]},{"given":"Wen-Feng","family":"Qi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,17]]},"reference":[{"key":"694_CR1","unstructured":"Johansson, T., J\u00f6nsson, F.: Fast correlation attacks through reconstruction of linear polynomials. In: Bellare, M. ed. Advances in Cryptology - CRYPTO 2000, 20th annual international cryptology conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings, vol. 1880 of Lecture Notes in Computer Science, pp.\u00a0300\u2013315. Springer, (2000)"},{"key":"694_CR2","unstructured":"Canteaut, A., Trabbia, M.: Improved fast correlation attacks using parity-check equations of weight 4 and 5. In: Preneel, B. ed. Advances in Cryptology - EUROCRYPT 2000, International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000, Proceeding, vol. 1807 of Lecture Notes in Computer Science, pp.\u00a0573\u2013588. Springer, (2000)"},{"key":"694_CR3","unstructured":"Chose, P., Joux, A., Mitton, M.: Fast correlation attacks: An algorithmic point of view. In: Knudsen, L.R. ed. Advances in cryptology - EUROCRYPT 2002, international conference on the theory and applications of cryptographic techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings, vol. 2332 of Lecture Notes in Computer Science, pp.\u00a0209\u2013221. Springer, (2002)"},{"key":"694_CR4","unstructured":"Chepyzhov, V.V., Johansson, T., Smeets, BJM.: A simple algorithm for fast correlation attacks on stream ciphers. In: Schneier B. ed. Fast Software Encryption, 7th international workshop, FSE 2000, New York, NY, USA, April 10-12, 2000, Proceedings, vol. 1978 of Lecture Notes in Computer Science, pp.\u00a0181\u2013195. Springer, (2000)"},{"key":"694_CR5","unstructured":"Courtois, N.T.: Fast algebraic attacks on stream ciphers with linear feedback. In: Boneh, D. ed. Advances in Cryptology - CRYPTO 2003, 23rd annual international cryptology conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings, vol. 2729 of lecture notes in computer science, pp.\u00a0176\u2013194. Springer, (2003)"},{"key":"694_CR6","unstructured":"Courtois, N., Meier, W.: Algebraic attacks on stream ciphers with linear feedback. In: Advances in Cryptology - EUROCRYPT 2003, international conference on the theory and applications of cryptographic techniques, Warsaw, Poland, May 4-8, 2003, Proceedings, pp.\u00a0345\u2013359, (2003)"},{"issue":"3","key":"694_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.46586\/tosc.v2019.i3.1-42","volume":"2019","author":"P Ekdahl","year":"2019","unstructured":"Ekdahl, P., Johansson, T., Maximov, A., Yang, J.: A new SNOW stream cipher called SNOW-V. IACR Trans. Symmetric Cryptol. 2019(3), 1\u201342 (2019)","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"694_CR8","unstructured":"Shi, Z., Jin, C., Zhang, J., Cui, T., Ding, L., Jin, Y.: A correlation attack on full SNOW-V and SNOW-Vi. In: Dunkelman, O., Dziembowski, S. ed. Advances in Cryptology - EUROCRYPT 2022 - 41st Annual international conference on the theory and applications of cryptographic techniques, trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part III, vol. 13277 of lecture notes in computer science, pp.\u00a034\u201356. Springer, (2022)"},{"key":"694_CR9","unstructured":"Zhou, Z., Feng, D., Zhang, B.: Efficient and extensive search linear approximations with high for precise correlations of full SNOW-V. IACR Cryptol. ePrint Arch., pp.\u00a01607, (2021)"},{"key":"694_CR10","doi-asserted-by":"crossref","unstructured":"Hell, M., Maximov, A., Meier, W.: The Grain family of stream cipher. In: Robshaw, M.J.B., and Billet, O. ed. New Stream Cipher Designs - The eSTREAM Finalists, vol. 4986 of lecture notes in computer science, pp. 179\u2013190. (2008)","DOI":"10.1007\/978-3-540-68351-3_14"},{"key":"694_CR11","unstructured":"Babbage, S., Dodd, M.: The MICKEY stream ciphers. In: Robshaw, M.J.B., and Billet, O. eds. New Stream Cipher Designs - The eSTREAM Finalists, vol. 4986 of lecture notes in computer science, pp. 191\u2013209. Springer, (2008)"},{"key":"694_CR12","doi-asserted-by":"crossref","unstructured":"De Canniere, C., Preneel, B.: Trivium. In: New stream cipher designs - The eSTREAM Finalists, pp.\u00a0244\u2013266. (2008)","DOI":"10.1007\/978-3-540-68351-3_18"},{"key":"694_CR13","unstructured":"Wu, H.: ACORN: a lightweight authenticated cipher (v3). In: CAESAR Competition, (2016). https:\/\/competitions.cr.yp.to\/round3\/acornv3.pdf"},{"key":"694_CR14","unstructured":"Lechtaler, A.C., Cipriano, M., Garc\u00eda, E., Liporace, J., Maiorano, A., Malvacio, E.: Trivium vs. Trivium toy. 10 (2014)"},{"issue":"3\u20134","key":"694_CR15","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/s12095-012-0066-6","volume":"4","author":"L Simpson","year":"2012","unstructured":"Simpson, L., Boztas, S.: State cycles, initialization and the Trivium stream cipher. Cryptogr. Commun. 4(3\u20134), 245\u2013258 (2012)","journal-title":"Cryptogr. Commun."},{"issue":"1","key":"694_CR16","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/s10623-018-0493-2","volume":"87","author":"S Zhang","year":"2019","unstructured":"Zhang, S., Chen, G.: New results on the state cycles of Trivium. Des. Codes Cryptogr. 87(1), 149\u2013162 (2019)","journal-title":"Des. Codes Cryptogr."},{"issue":"3","key":"694_CR17","doi-asserted-by":"publisher","first-page":"885","DOI":"10.1007\/s00145-017-9273-9","volume":"31","author":"A Canteaut","year":"2018","unstructured":"Canteaut, A., Carpov, S., Fontaine, C., Lepoint, T., Naya-Plasencia, M., Paillier, P., Sirdey, R.: Stream ciphers: A practical solution for efficient homomorphic-ciphertext compression. J. Cryptol. 31(3), 885\u2013916 (2018)","journal-title":"J. Cryptol."},{"issue":"2","key":"694_CR18","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1007\/s10623-021-00982-5","volume":"90","author":"XJ Wang","year":"2022","unstructured":"Wang, X.J., Tian, T., Qi, W.F.: A generic method for investigating nonsingular Galois NFSRs. Des. Codes Cryptogr. 90(2), 387\u2013408 (2022)","journal-title":"Des. Codes Cryptogr."},{"key":"694_CR19","unstructured":"Lidl, R., Niederreiter, H.: Finite Fields. Encyclopedia of Mathematics and Its Applications, (1983)"},{"key":"694_CR20","unstructured":"Roitman, M.: On Zsigmondy primes. Am. Math. Soc. 125(7), 1913\u20131919 (1997)"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-024-00694-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12095-024-00694-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-024-00694-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,8]],"date-time":"2024-11-08T00:22:30Z","timestamp":1731025350000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12095-024-00694-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,17]]},"references-count":20,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,7]]}},"alternative-id":["694"],"URL":"https:\/\/doi.org\/10.1007\/s12095-024-00694-2","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-2584106\/v1","asserted-by":"object"}]},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"value":"1936-2447","type":"print"},{"value":"1936-2455","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1,17]]},"assertion":[{"value":"14 February 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 January 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 January 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing of interest"}}]}}