{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T06:56:59Z","timestamp":1648882619744},"reference-count":9,"publisher":"Institution of Engineering and Technology (IET)","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEE Proc., Comput. Digit. Tech."],"published-print":{"date-parts":[[1997]]},"DOI":"10.1049\/ip-cdt:19970764","type":"journal-article","created":{"date-parts":[[2002,7,26]],"date-time":"2002-07-26T11:03:57Z","timestamp":1027681437000},"page":"33","source":"Crossref","is-referenced-by-count":0,"title":["Global linear complexity analysis of filter keystream generators"],"prefix":"10.1049","volume":"144","author":[{"given":"A.","family":"Fuster-Sabater","sequence":"first","affiliation":[]},{"given":"P.","family":"Caballero-Gil","sequence":"additional","affiliation":[]}],"member":"265","reference":[{"key":"10.1049\/ip-cdt:19970764_r1","doi-asserted-by":"crossref","unstructured":"Fu\u0301ster-Sabater, A., and Caballero-Gil, P.: \u2018On the linear complexity of nonlinearly filtered PN-sequences\u2019, Advances in cryptology-ASIACRYPT'94, Lecture Notes in Computer Science, vol.917, (Springer-Verlag 1995)","DOI":"10.1007\/BFb0000426"},{"key":"10.1049\/ip-cdt:19970764_r2","volume":"IT\u201317","author":"Groth","year":"1971"},{"key":"10.1049\/ip-cdt:19970764_r3","first-page":"732","volume":"IT\u201322","author":"Key","year":"1976"},{"key":"10.1049\/ip-cdt:19970764_r4","unstructured":"Knuth, D.E.: \u2018The art of computer programming, vol.2: seminumerical algorithms\u2019, (Addison-Wesley 1981)"},{"key":"10.1049\/ip-cdt:19970764_r5","first-page":"854","volume":"IT\u201329","author":"Kumar","year":"1983"},{"key":"10.1049\/ip-cdt:19970764_r6","first-page":"122","volume":"IT\u201315","author":"Massey","year":"1969"},{"key":"10.1049\/ip-cdt:19970764_r7","doi-asserted-by":"crossref","unstructured":"Massey, J.L., and Serconek, S.: \u2018A Fourier transform approach to the linear complexity of nonlinearly filtered sequences\u2019, Advances in cryptology-CRYPTO'94, Lecture Notes in Computer Science vol. 839, (Springer-Verlag 1994), p. 332\u2013340","DOI":"10.1007\/3-540-48658-5_31"},{"key":"10.1049\/ip-cdt:19970764_r8","doi-asserted-by":"crossref","unstructured":"Rueppel, R.A.: \u2018Analysis and design of stream ciphers\u2019, (Springer-Verlag New York 1986)","DOI":"10.1007\/978-3-642-82865-2"},{"key":"10.1049\/ip-cdt:19970764_r9","unstructured":"Simmons, G.J., \u2018Contemporary cryptology: The science of information integrity\u2019, (IEEE Press 1991)"}],"container-title":["IEE Proceedings - Computers and Digital Techniques"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/digital-library.theiet.org\/content\/journals\/10.1049\/ip-cdt_19970764?crawler=true&mimetype=application\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T02:58:20Z","timestamp":1609469900000},"score":1,"resource":{"primary":{"URL":"https:\/\/digital-library.theiet.org\/content\/journals\/10.1049\/ip-cdt_19970764"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997]]},"references-count":9,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1997]]}},"URL":"https:\/\/doi.org\/10.1049\/ip-cdt:19970764","relation":{},"ISSN":["1350-2387"],"issn-type":[{"value":"1350-2387","type":"print"}],"subject":[],"published":{"date-parts":[[1997]]}}}