{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T13:05:58Z","timestamp":1774098358960,"version":"3.50.1"},"reference-count":24,"publisher":"Oxford University Press (OUP)","issue":"4","license":[{"start":{"date-parts":[[2019,12,10]],"date-time":"2019-12-10T00:00:00Z","timestamp":1575936000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/open_access\/funder_policies\/chorus\/standard_publication_model"}],"funder":[{"DOI":"10.13039\/501100001807","name":"Funda\u00e7\u00e3o de Amparo \u00e0 Pesquisa do Estado de S\u00e3o Paulo","doi-asserted-by":"publisher","award":["2015\/07246-0"],"award-info":[{"award-number":["2015\/07246-0"]}],"id":[{"id":"10.13039\/501100001807","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001807","name":"Funda\u00e7\u00e3o de Amparo \u00e0 Pesquisa do Estado de S\u00e3o Paulo","doi-asserted-by":"publisher","award":["2016\/50476-0"],"award-info":[{"award-number":["2016\/50476-0"]}],"id":[{"id":"10.13039\/501100001807","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010198","name":"Ministerio de Econom\u00eda, Industria y Competitividad, Gobierno de Espa\u00f1a","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100010198","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100005910","name":"Albert Ellis Institute","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100005910","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008530","name":"European Regional Development Fund","doi-asserted-by":"publisher","award":["TIN2017-84844-C2-1-R"],"award-info":[{"award-number":["TIN2017-84844-C2-1-R"]}],"id":[{"id":"10.13039\/501100008530","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,7,24]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>The sequences produced by the cryptographic sequence generator known as the shrinking generator can be modelled as the output sequences of linear elementary cellular automata (CA). These sequences are composed of interleaved m-sequences produced by linear structures based on feedback shifts. This profitable characteristic can be used in the cryptanalysis of this generator. In this work we propose an algorithm that takes advantage of the inherent linearity of these CA and the interleaved m-sequences. Although irregularly decimated generators have been conceived and designed as non-linear ones, in practice they can be easily analysed in terms of simple linear structures.<\/jats:p>","DOI":"10.1093\/jigpal\/jzz051","type":"journal-article","created":{"date-parts":[[2019,10,21]],"date-time":"2019-10-21T19:20:09Z","timestamp":1571685609000},"page":"430-448","source":"Crossref","is-referenced-by-count":6,"title":["Recovering Decimation-Based Cryptographic Sequences by Means of Linear CAs"],"prefix":"10.1093","volume":"28","author":[{"given":"Sara D","family":"Cardell","sequence":"first","affiliation":[{"name":"IMECC, University of Campinas, Campinas, Brazil"}]},{"given":"Diego F","family":"Aranha","sequence":"additional","affiliation":[{"name":"Aarhus University, Denmark; University of Campinas, Campinas, Brazil"}]},{"given":"Amparo","family":"F\u00faster-Sabater","sequence":"additional","affiliation":[{"name":"ITEFI, Consejo Superior de Investigaciones Cient\u00edficas, Madrid, Spain"}]}],"member":"286","published-online":{"date-parts":[[2019,12,10]]},"reference":[{"key":"2020080108270539000_ref1","first-page":"1","article-title":"A heuristic quasi-polynomial algorithm for discrete logarithm in finite fields of small characteristic","volume-title":"Advances in Cryptology\u2014EUROCRYPT\u201904, vol. 8441 of Lecture Notes in Computer Science","author":"Barbulescu","year":"2014"},{"key":"2020080108270539000_ref2","first-page":"195","article-title":"Linear models for the self-shrinking generator based on CA","volume":"11","author":"Cardell","year":"2016","journal-title":"Journal of Cellular Automata"},{"key":"2020080108270539000_ref3","doi-asserted-by":"crossref","first-page":"797","DOI":"10.3934\/amc.2016041","article-title":"Modelling the shrinking generator in terms of linear CA","volume":"10","author":"Cardell","year":"2016","journal-title":"Advances in Mathematics of Communications"},{"key":"2020080108270539000_ref4","doi-asserted-by":"crossref","first-page":"646","DOI":"10.1515\/math-2018-0058","article-title":"Linearity in decimation-based generators: an improved cryptanalysis on the shrinking generator","volume":"16","author":"Cardell","year":"2018","journal-title":"Open Mathematics"},{"key":"2020080108270539000_ref5","first-page":"23","article-title":"The shrinking generator","volume-title":"Advances in Cryptology\u2014CRYPTO\u201993, vol. 773 of Lecture Notes in Computer Science","author":"Coppersmith","year":"1993"},{"key":"2020080108270539000_ref6","first-page":"330","article-title":"Predicting the shrinking generator with fixed connections","volume-title":"Advances in Cryptology\u2014EUROCRYPT\u20192003, vol. 2656 of Lecture Notes in Computer Science","author":"Ekdahl","year":"2003"},{"key":"2020080108270539000_ref7","doi-asserted-by":"crossref","first-page":"530","DOI":"10.1016\/j.tcs.2008.09.030","article-title":"Strategic attack on the shrinking generator","volume":"409","author":"F\u00faster-Sabater","year":"2008","journal-title":"Theoretical Computer Science"},{"key":"2020080108270539000_ref8","doi-asserted-by":"crossref","first-page":"461","DOI":"10.1016\/j.neunet.2009.12.008","article-title":"A simple linearization of the self-shrinking generator by means of linear cellular automata","volume":"23","author":"F\u00faster-Sabater","year":"2010","journal-title":"Neural Networks"},{"key":"2020080108270539000_ref9","doi-asserted-by":"crossref","first-page":"1876","DOI":"10.1016\/j.asoc.2010.06.002","article-title":"Chaotic modelling of the generalized self-shrinking generator","volume":"11","author":"F\u00faster-Sabater","year":"2011","journal-title":"Applied Soft Computing"},{"key":"2020080108270539000_ref10","first-page":"230","article-title":"Embedding and probabilistic correlation attacks on clock-controlled shift registers","volume-title":"Advances in Cryptology\u2014EUROCRYPT\u201994, vol. 950 of Lecture Notes in Computer Science","author":"Goli\u0107","year":"1994"},{"key":"2020080108270539000_ref11","first-page":"440","article-title":"Correlation analysis of the shrinking generator","volume-title":"Advances in Cryptology-Crypto\u20192001, vol. 2139 of Lecture Notes in Computer Science","author":"Goli\u0107","year":"2001"},{"key":"2020080108270539000_ref12","volume-title":"Shift Register-Sequences","author":"Golomb","year":"1982"},{"key":"2020080108270539000_ref13","first-page":"61","article-title":"Fault cryptanalysis and the shrinking generator","volume":"4007","author":"Gomulkiewicz","year":"2006","journal-title":"5th International Workshop on Experimetal Algorithms (WEA 2006)"},{"key":"2020080108270539000_ref14","doi-asserted-by":"crossref","first-page":"946","DOI":"10.1109\/18.53764","article-title":"Some comments on Zech\u2019s logarithms","volume":"36","author":"Huber","year":"1990","journal-title":"IEEE Transactions on Information Theory"},{"key":"2020080108270539000_ref15","first-page":"166","article-title":"\u00dcber die kreisteilung und ihre anwendung auf die zahlentheorie","author":"Jacobi","year":"1846","journal-title":"Journal f\u00fcr die Reine und Angewandte Mathematik"},{"key":"2020080108270539000_ref16","first-page":"342","article-title":"Reduced complexity correlation attacks on two clock-controlled generators","volume-title":"Advances in Cryptology\u2014ASIACRYPT\u201998, vol. 1514 of Lecture Notes in Computer Science","author":"Johansson","year":"1998"},{"key":"2020080108270539000_ref17","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1109\/TIT.1969.1054260","article-title":"Shift-register synthesis and BCH decoding","volume":"15","author":"Massey","year":"1969","journal-title":"IEEE Transactions on Information Theory"},{"key":"2020080108270539000_ref18","first-page":"109","article-title":"Improved linear consistency attack on irregular clocked keystream generators","volume-title":"Fast Software Encryption-FSE\u20192004, vol. 3017 of Lecture Notes in Computer Science","author":"Molland","year":"2004"},{"key":"2020080108270539000_ref19","volume-title":"Theory of Self-Reproducing Automata","author":"Von Neumann","year":"1966"},{"key":"2020080108270539000_ref20","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-04101-3","volume-title":"Understanding Cryptography","author":"Paar","year":"2010"},{"key":"2020080108270539000_ref21","first-page":"147","article-title":"A probabilistic correlation attack on the shrinking generator","volume-title":"Third Australasian Conference on Information Security and Privacy-ACISP\u20191998, vol. 1438 of Lecture Notes in Computer Science","author":"Simpson","year":"1998"},{"key":"2020080108270539000_ref22","first-page":"72","article-title":"A fast correlation attack on the shrinking generator","volume-title":"Topics in Cryptology-CT-RSA\u20192005, vol. 537 of Lecture Notes in Computer Science","author":"Zhang","year":"2005"},{"key":"2020080108270539000_ref23","volume-title":"Parallel Cryptanalysis","author":"Niederhagen","year":"2012"},{"key":"2020080108270539000_ref24","volume-title":"Parallel (Public-Key) Cryptanalysis","author":"Bos","year":"2015"}],"container-title":["Logic Journal of the IGPL"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/jigpal\/article-pdf\/28\/4\/430\/33554826\/jzz051.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"http:\/\/academic.oup.com\/jigpal\/article-pdf\/28\/4\/430\/33554826\/jzz051.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T12:27:30Z","timestamp":1596284850000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/jigpal\/article\/28\/4\/430\/5666186"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,10]]},"references-count":24,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2019,12,10]]},"published-print":{"date-parts":[[2020,7,24]]}},"URL":"https:\/\/doi.org\/10.1093\/jigpal\/jzz051","relation":{},"ISSN":["1367-0751","1368-9894"],"issn-type":[{"value":"1367-0751","type":"print"},{"value":"1368-9894","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2020,8]]},"published":{"date-parts":[[2019,12,10]]}}}