{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T13:05:58Z","timestamp":1774098358975,"version":"3.50.1"},"reference-count":22,"publisher":"American Institute of Mathematical Sciences (AIMS)","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["AMC"],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.3934\/amc.2016041","type":"journal-article","created":{"date-parts":[[2016,11,4]],"date-time":"2016-11-04T18:57:08Z","timestamp":1478285828000},"page":"797-809","source":"Crossref","is-referenced-by-count":15,"title":["Modelling the shrinking generator in terms of linear CA"],"prefix":"10.3934","volume":"10","author":[{"given":"Sara D.","family":"Cardell","sequence":"first","affiliation":[]},{"given":"Amparo","family":"F\u00faster-Sabater","sequence":"first","affiliation":[]}],"member":"2321","reference":[{"key":"1","doi-asserted-by":"crossref","first-page":"2893","DOI":"10.1016\/j.procs.2015.05.454","article-title":"Cryptanalysing the shrinking generator,","volume":"51","author":"S. D. Cardell","year":"2015","journal-title":"<em>Proc. Comp. Sci.<\/em>"},{"key":"2","first-page":"111","article-title":"Performance of the cryptanalysis over the shrinking generator,","author":"S. D. Cardell","year":"2015","journal-title":"in <em>Int. Joint Conf. CISIS'15 and ICEUTE'15<\/em> (eds. A.H. et al.)"},{"key":"3","first-page":"195","article-title":"Linear models for the self-shrinking generator based on CA,","volume":"11","author":"S. D. Cardell","year":"2016","journal-title":"<em>J. Cell. Autom.<\/em>"},{"key":"4","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1109\/12.508317","article-title":"One-dimensional linear hybrid cellular automata,","volume":"15","author":"K. Cattell","year":"1996","journal-title":"<em>IEEE Trans. Comp.-Aided Des.<\/em>"},{"key":"5","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/3-540-48329-2_3","article-title":"The shrinking generator,","author":"D. Coppersmith","year":"1993","journal-title":"in <em>Adv. Crypt. - CRYPTO '93<\/em>"},{"key":"6","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1049\/ip-e.1990.0008","article-title":"Efficient characterisation of cellular automata,","volume":"137","author":"A. K. Das","year":"1990","journal-title":"<em>IEEE Proc. Comp. Dig. Techn.<\/em>"},{"key":"7","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/s12095-012-0079-1","article-title":"Car30: A new scalable stream cipher with rule 30,","volume":"5","author":"S. Das","year":"2013","journal-title":"<em>Crypt. Commun.<\/em>"},{"key":"8","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1137\/0121039","article-title":"Decimation of periodic sequences,","volume":"21","author":"P. F. Duvall","year":"1971","journal-title":"<em>SIAM J. Appl. Math.<\/em>"},{"key":"9","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1063\/1.2827050","article-title":"Linear solutions for cryptographic nonlinear sequence generators,","volume":"369","author":"A. F\u00faster-Sabater","year":"2007","journal-title":"<em>Phys. Lett. A<\/em>"},{"key":"10","doi-asserted-by":"crossref","first-page":"461","DOI":"10.1016\/j.neunet.2009.12.008","article-title":"A simple linearization of the self-shrinking generator by means of cellular automata,","volume":"23","author":"A. F\u00faster-Sabater","year":"2010","journal-title":"<em>Neural Netw.<\/em>"},{"key":"11","article-title":"<em>Shift Register-Sequences<\/em>,","author":"S. W. Golomb","year":"1982","journal-title":"Aegean Park Press"},{"key":"12","first-page":"427","article-title":"Inapplicability of fault attacks against trivium on a cellular automata based stream cipher,","author":"J. Jose","year":"2014","journal-title":"in <em>11th Int. Conf. Cell. Autom. Res. Ind. ACRI 2014<\/em>"},{"key":"13","doi-asserted-by":"crossref","first-page":"993","DOI":"10.1016\/j.compeleceng.2010.02.004","article-title":"Modified self-shrinking generator,","volume":"36","author":"A. Kanso","year":"2010","journal-title":"<em>Comp. Electr. Engin.<\/em>"},{"key":"14","article-title":"<em>Introduction to Finite Fields and their Applications<\/em>,","author":"R. Lidl","year":"1986","journal-title":"Cambridge Univ. Press"},{"key":"15","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1109\/TIT.1969.1054260","article-title":"Shift-register synthesis and BCH decoding,","volume":"15","author":"J. L. Massey","year":"1969","journal-title":"<em>IEEE Trans. Inform. Theory<\/em>"},{"key":"16","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/3-540-46416-6_17","article-title":"Analysis of pseudo random sequences generated by cellular automata,","author":"W. Meier","year":"1991","journal-title":"in <em>Adv. Crypt. - EUROCRYPTO '91<\/em>"},{"key":"17","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/BFb0053436","article-title":"The self-shrinking generator,","author":"W. Meier","year":"1994","journal-title":"in <em>Adv. Crypt. - EUROCRYPT 1994<\/em>"},{"key":"18","article-title":"<em>Handbook of Applied Cryptography<\/em>,","author":"A. J. Menezes","year":"1996","journal-title":"CRC Press"},{"key":"19","doi-asserted-by":"crossref","first-page":"3250","DOI":"10.1109\/GLOCOM.1998.775806","article-title":"A fast and secure stream cipher based on cellular automata over GF(q),","author":"M. Mihaljevi\u0107","year":"1998","journal-title":"in <em>Proc. Global Telecomm. Conf. GLOBECOM 1998<\/em>"},{"key":"20","article-title":"<em>Understanding Cryptography<\/em>,","author":"C. Paar","year":"2010","journal-title":"Springer"},{"key":"21","first-page":"68","article-title":"Cellular automata as simple self-organizing system,","author":"S. Wolfram","year":"1982","journal-title":"Caltrech preprint"},{"key":"22","first-page":"429","article-title":"Cryptography with cellular automata,","author":"S. Wolfram","year":"1985","journal-title":"in <em>Adv. Crypt. - EUROCRYPT 1985<\/em>"}],"container-title":["Advances in Mathematics of Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.aimsciences.org\/journals\/displayArticlesnew.jsp?paperID=13239","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T02:53:05Z","timestamp":1498359185000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.aimsciences.org\/journals\/displayArticlesnew.jsp?paperID=13239"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11]]},"references-count":22,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2016,11]]}},"URL":"https:\/\/doi.org\/10.3934\/amc.2016041","relation":{},"ISSN":["1930-5346"],"issn-type":[{"value":"1930-5346","type":"print"}],"subject":[],"published":{"date-parts":[[2016,11]]}}}