{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T18:44:18Z","timestamp":1729622658072,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,6]]},"DOI":"10.1109\/isit.2009.5206025","type":"proceedings-article","created":{"date-parts":[[2009,8,24]],"date-time":"2009-08-24T11:09:52Z","timestamp":1251112192000},"page":"1120-1124","source":"Crossref","is-referenced-by-count":2,"title":["Extended windmill polynomials"],"prefix":"10.1109","author":[{"given":"Cedric","family":"Lauradoux","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"crossref","first-page":"174","DOI":"10.1007\/3-540-58108-1_21","article-title":"2-adic shift registers","volume":"809","author":"klapper","year":"1993","journal-title":"ser Lecture Notes in Computer Science"},{"key":"16","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1007\/3-540-39200-9_21","article-title":"algebraic attacks on stream ciphers with linear feedback","volume":"2656","author":"courtois","year":"2003","journal-title":"ser Lecture Notes in Computer Science"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2004.833361"},{"year":"0","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28628-8_23"},{"journal-title":"Analyse et conception de chiffrements clef secre?te","year":"2006","author":"canteaut","key":"12"},{"key":"3","doi-asserted-by":"crossref","first-page":"503","DOI":"10.1007\/3-540-46885-4_49","article-title":"parallel generation of recurring sequences","volume":"434","author":"gunther","year":"1989","journal-title":"ser Lecture Notes in Computer Science"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45961-8_30"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45961-8_28"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30564-4_3"},{"journal-title":"Shift Register Sequences","year":"1981","author":"golomb","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/BF01517357"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1049\/ip-e.1989.0054"},{"key":"4","article-title":"bluetooth security - the story behind it","author":"smeets","year":"2006","journal-title":"Operation Polar Bear - Workshop held on the occasion of Rolf Johannesson's 60th birthday"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/18.133246"},{"journal-title":"Finite Fields","year":"1983","author":"lidl","key":"8"}],"event":{"name":"2009 IEEE International Symposium on Information Theory - ISIT","start":{"date-parts":[[2009,6,28]]},"location":"Seoul, South Korea","end":{"date-parts":[[2009,7,3]]}},"container-title":["2009 IEEE International Symposium on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5179947\/5205248\/05206025.pdf?arnumber=5206025","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T19:05:17Z","timestamp":1497812717000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5206025\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/isit.2009.5206025","relation":{},"subject":[],"published":{"date-parts":[[2009,6]]}}}