{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T04:49:26Z","timestamp":1743396566120},"reference-count":13,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[2003,2,1]],"date-time":"2003-02-01T00:00:00Z","timestamp":1044057600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2013,8,22]],"date-time":"2013-08-22T00:00:00Z","timestamp":1377129600000},"content-version":"vor","delay-in-days":3855,"URL":"https:\/\/www.elsevier.com\/open-access\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Complexity"],"published-print":{"date-parts":[[2003,2]]},"DOI":"10.1016\/s0885-064x(02)00009-2","type":"journal-article","created":{"date-parts":[[2003,1,30]],"date-time":"2003-01-30T17:32:20Z","timestamp":1043947940000},"page":"61-72","source":"Crossref","is-referenced-by-count":34,"title":["The expected value of the joint linear complexity of periodic multisequences"],"prefix":"10.1016","volume":"19","author":[{"given":"Wilfried","family":"Meidl","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Harald","family":"Niederreiter","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"78","reference":[{"key":"10.1016\/S0885-064X(02)00009-2_BIB1","doi-asserted-by":"crossref","unstructured":"C. Ding, G. Xiao, W. Shan, The Stability Theory of Stream Ciphers, Lecture Notes in Computer Science, Vol. 561, Springer, Berlin, 1991.","DOI":"10.1007\/3-540-54973-0"},{"key":"10.1016\/S0885-064X(02)00009-2_BIB2","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1515\/crll.1936.175.50","article-title":"Theorie der h\u00f6heren Differentiale in einem algebraischen Funktionenk\u00f6rper mit vollkommenem Konstantenk\u00f6rper bei beliebiger Charakteristik","volume":"175","author":"Hasse","year":"1936","journal-title":"J. Reine Angew. Math."},{"year":"1993","series-title":"Finite Fields: Structure and Arithmetics","author":"Jungnickel","key":"10.1016\/S0885-064X(02)00009-2_BIB3"},{"year":"1983","series-title":"Finite Fields","author":"Lidl","key":"10.1016\/S0885-064X(02)00009-2_BIB4"},{"key":"10.1016\/S0885-064X(02)00009-2_BIB5","series-title":"Advances in Cryptology\u2014Crypto \u201994","first-page":"332","article-title":"A Fourier transform approach to the linear complexity of nonlinearly filtered sequences","volume":"Vol. 839","author":"Massey","year":"1994"},{"key":"10.1016\/S0885-064X(02)00009-2_BIB6","series-title":"Advances in Cryptology\u2014CRYPTO \u201996","first-page":"358","article-title":"Linear complexity of periodic sequences: a general theory","volume":"Vol. 1109","author":"Massey","year":"1996"},{"key":"10.1016\/S0885-064X(02)00009-2_BIB7","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1006\/jcom.2001.0621","article-title":"Linear complexity, k-error linear complexity, and the discrete Fourier transform","volume":"18","author":"Meidl","year":"2002","journal-title":"J. Complexity"},{"key":"10.1016\/S0885-064X(02)00009-2_BIB8","doi-asserted-by":"crossref","first-page":"2817","DOI":"10.1109\/TIT.2002.804050","article-title":"On the expected value of the linear complexity and the k-error linear complexity of periodic sequences","volume":"48","author":"Meidl","year":"2002","journal-title":"IEEE Trans. Inform. Theory"},{"key":"10.1016\/S0885-064X(02)00009-2_BIB9","series-title":"Sequences and their Applications","first-page":"67","article-title":"Some computable complexity measures for binary sequences","author":"Niederreiter","year":"1999"},{"year":"1986","series-title":"Analysis and Design of Stream Ciphers","author":"Rueppel","key":"10.1016\/S0885-064X(02)00009-2_BIB10"},{"key":"10.1016\/S0885-064X(02)00009-2_BIB11","series-title":"Contemporary Cryptology: The Science of Information Integrity","first-page":"65","article-title":"Stream ciphers","author":"Rueppel","year":"1992"},{"key":"10.1016\/S0885-064X(02)00009-2_BIB12","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1016\/0890-5401(90)90039-K","article-title":"Extension of the Berlekamp-Massey algorithm to N dimensions","volume":"84","author":"Sakata","year":"1990","journal-title":"Inform. and Comput."},{"key":"10.1016\/S0885-064X(02)00009-2_BIB13","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1006\/jcom.2000.0560","article-title":"Multi-sequences with almost perfect linear complexity profile and function fields over finite fields","volume":"16","author":"Xing","year":"2000","journal-title":"J. Complexity"}],"container-title":["Journal of Complexity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0885064X02000092?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0885064X02000092?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2023,4,25]],"date-time":"2023-04-25T17:04:02Z","timestamp":1682442242000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0885064X02000092"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,2]]},"references-count":13,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2003,2]]}},"alternative-id":["S0885064X02000092"],"URL":"https:\/\/doi.org\/10.1016\/s0885-064x(02)00009-2","relation":{},"ISSN":["0885-064X"],"issn-type":[{"type":"print","value":"0885-064X"}],"subject":[],"published":{"date-parts":[[2003,2]]}}}