{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T16:10:03Z","timestamp":1749053403450,"version":"3.41.0"},"reference-count":17,"publisher":"Oxford University Press (OUP)","issue":"6","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Logic Jnl IGPL"],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1093\/jigpal\/jzw050","type":"journal-article","created":{"date-parts":[[2016,8,6]],"date-time":"2016-08-06T02:23:31Z","timestamp":1470450211000},"page":"933-943","source":"Crossref","is-referenced-by-count":2,"title":["Optimal modes of operation of pseudorandom sequence generators based on DLFSRs"],"prefix":"10.1093","volume":"24","author":[{"given":"A.","family":"Peinado","sequence":"first","affiliation":[]},{"given":"J.","family":"Munilla","sequence":"additional","affiliation":[]},{"given":"A.","family":"F\u00faster-Sabater","sequence":"additional","affiliation":[]}],"member":"286","published-online":{"date-parts":[[2016,8,5]]},"reference":[{"key":"2016120907301192000_24.6.933.1","unstructured":"Golomb. S. W. Shift-Register Sequences, revised ed. Aegean Park Press, Laguna Hill, CA, 1982."},{"key":"2016120907301192000_24.6.933.2","doi-asserted-by":"crossref","unstructured":"Che W. Deng H. Tan X. Wang. J. Networked RFID systems and lightweight cryptography. In A Random Number Generator for Application in RFID Tags, Chapter 16, pp. 279\u2013287. Springer, Berlin\/Heidelberg, Germany, 2008.","DOI":"10.1007\/978-3-540-71641-9_16"},{"key":"2016120907301192000_24.6.933.3","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1007\/s11277-010-0187-1","article-title":"A practical implementation attack on weak pseudorandom number generator designs for EPC Gen2 Tags.","volume":"59","author":"Meli\u00e1-Segu\u00ed","year":"2011","journal-title":"Wireless Personal Communication"},{"key":"2016120907301192000_24.6.933.4","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1109\/12.364534","article-title":"Built-in test for circuits with scan based on reseeding of multiple-polynomial linear feedback shift registers.","volume":"44","author":"Hellebrand","year":"1995","journal-title":"IEEE Transactions on Computers"},{"key":"2016120907301192000_24.6.933.5","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1049\/ip-cdt:20030666","article-title":"Dual multiple-polynomial LFSR for low-power mixed-mode BIST.","volume":"150","author":"Rosinger","year":"2003","journal-title":"IEEE Proceedings\u2014Computers and Digital Techniques"},{"key":"2016120907301192000_24.6.933.6","doi-asserted-by":"crossref","first-page":"1097","DOI":"10.1049\/el:20020750","article-title":"Pseudorandom bit generator based on dynamic linear feedback topology.","volume":"38","author":"Mita","year":"2002","journal-title":"Electronic Letters"},{"key":"2016120907301192000_24.6.933.7","first-page":"191","article-title":"The MICKEY Stream Ciphers.","volume":"4986","author":"Babbage","year":"2008","journal-title":"LNCS"},{"key":"2016120907301192000_24.6.933.8","doi-asserted-by":"crossref","first-page":"396","DOI":"10.1002\/sec.637","article-title":"Cryptanalysis of Mickey family of stream ciphers.","volume":"6","author":"Ding","year":"2013","journal-title":"Security and Communication Networks"},{"key":"2016120907301192000_24.6.933.9","doi-asserted-by":"crossref","unstructured":"Kiyomoto S. Tanaka T. and Sakurai. K. K2: a stream cipher algorithm using dynamic feedback control. In SECRYPT, Hernando J. Fern\u00e1ndez-Medina E. and Malek M. eds, pp. 204\u2013213. INSTICC Press, 2007.","DOI":"10.5220\/0002122302040213"},{"key":"2016120907301192000_24.6.933.10","unstructured":"Bogdanov A. Preneel B. and Rijmen. V. Security evaluation of the K2 Stream Cipher. Internal report. Katholieke Universiteit Leuven, ESAT\/SCD-COSIC, March 2011."},{"key":"2016120907301192000_24.6.933.11","first-page":"32","article-title":"The RAKAPOSHI Stream Cipher. Information and Communications Security.","volume":"5927[C]","author":"Cid","year":"2009","journal-title":"LNCS"},{"key":"2016120907301192000_24.6.933.12","doi-asserted-by":"crossref","unstructured":"Orumiehchiha M. A. , Pieprzyk J. Shakour E. and Steinfeld. R. Security evaluation of Rakaposhi Stream Cipher. LNCS, 7863, 361\u2013371.","DOI":"10.1007\/978-3-642-38033-4_26"},{"key":"2016120907301192000_24.6.933.13","doi-asserted-by":"crossref","unstructured":"Meli\u00e1-Segu\u00ed J. Garc\u00eda-Alfaro J. and Herrera-Joancomart\u00ed. J. J3Gen: a PRNG for low-cost passive RFID. Sensors, 13, 3816\u20133830.","DOI":"10.3390\/s130303816"},{"key":"2016120907301192000_24.6.933.14","doi-asserted-by":"crossref","first-page":"2596","DOI":"10.1016\/j.mcm.2011.07.023","article-title":"Generation of pseudorandom binary sequences by means of LFSRs with dynamic feedback.","volume":"57","author":"Peinado","year":"2013","journal-title":"Mathematical and Computer Modelling"},{"key":"2016120907301192000_24.6.933.15","doi-asserted-by":"crossref","first-page":"400","DOI":"10.1109\/18.370141","article-title":"Theory and applications of q-ary interleaved sequences.","volume":"41","author":"Gong.","year":"1995","journal-title":"IEEE Transactions on Information Theory"},{"key":"2016120907301192000_24.6.933.16","doi-asserted-by":"crossref","first-page":"397","DOI":"10.1007\/978-3-319-07995-0_39","article-title":"Improving the period and linear span of the sequences generated by DLFSRs.","volume":"299","author":"Peinado","year":"2014.","journal-title":"Advances in Intelligent Systems and Computing"},{"key":"2016120907301192000_24.6.933.17","doi-asserted-by":"crossref","first-page":"6500","DOI":"10.3390\/s140406500","article-title":"EPCGen2 Pseudorandom number generators: Analysis of J3Gen.","volume":"14","author":"Peinado","year":"2014","journal-title":"Sensors"}],"container-title":["Logic Journal of IGPL"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/jigpal\/article-pdf\/24\/6\/933\/8357698\/jzw050.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T15:38:09Z","timestamp":1749051489000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/jigpal\/article-lookup\/doi\/10.1093\/jigpal\/jzw050"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,5]]},"references-count":17,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2016,12,9]]},"published-print":{"date-parts":[[2016,12]]}},"alternative-id":["10.1093\/jigpal\/jzw050"],"URL":"https:\/\/doi.org\/10.1093\/jigpal\/jzw050","relation":{},"ISSN":["1367-0751","1368-9894"],"issn-type":[{"type":"print","value":"1367-0751"},{"type":"electronic","value":"1368-9894"}],"subject":[],"published":{"date-parts":[[2016,8,5]]}}}