{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T16:04:39Z","timestamp":1648569879638},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2017,5,25]],"date-time":"2017-05-25T00:00:00Z","timestamp":1495670400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2018,4]]},"DOI":"10.1007\/s10623-017-0370-4","type":"journal-article","created":{"date-parts":[[2017,5,25]],"date-time":"2017-05-25T14:19:20Z","timestamp":1495721960000},"page":"939-953","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Fast construction of binary ring FCSRs for hardware stream ciphers"],"prefix":"10.1007","volume":"86","author":[{"given":"Zhiqiang","family":"Lin","sequence":"first","affiliation":[]},{"given":"Dingyi","family":"Pei","sequence":"additional","affiliation":[]},{"given":"Dongdai","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Xiaolei","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,25]]},"reference":[{"key":"370_CR1","doi-asserted-by":"crossref","first-page":"174","DOI":"10.1007\/3-540-58108-1_21","volume-title":"Fast Software Encryption","author":"A Klapper","year":"1994","unstructured":"Klapper A., Goresky M.: 2-adic shift registers. In: Anderson R. (ed.) Fast Software Encryption, vol. 809, pp. 174\u2013178. Springer, Berlin (1994)."},{"issue":"2","key":"370_CR2","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1007\/s001459900024","volume":"10","author":"A Klapper","year":"1997","unstructured":"Klapper A., Goresky M.: Feedback shift registers, 2-adic span, and combiners with memory. J. Cryptol. 10(2), 111\u2013147 (1997).","journal-title":"J. Cryptol."},{"key":"370_CR3","first-page":"56","volume-title":"Sequences and Their Applications (Lecture Notes in Computer Science)","author":"A Klapper","year":"2005","unstructured":"Klapper A.: A survey of feedback with carry shift registers. In: Helleseth T., Sarwate D., Song H.-Y., Yang K. (eds.) Sequences and Their Applications (Lecture Notes in Computer Science), vol. 3486, pp. 56\u201371. Springer, Berlin (2005)."},{"key":"370_CR4","first-page":"263","volume-title":"Large Period Nearly Debruijn FCSR Sequences, Advances in Cryptologyeurocrypt\u201995","author":"A Klapper","year":"1995","unstructured":"Klapper A., Goresky M.: Large Period Nearly Debruijn FCSR Sequences, Advances in Cryptologyeurocrypt\u201995, pp. 263\u2013273. Springer, Berlin (1995)."},{"issue":"11","key":"370_CR5","doi-asserted-by":"crossref","first-page":"2826C2836","DOI":"10.1109\/TIT.2002.804048","volume":"48","author":"M Goresky","year":"2002","unstructured":"Goresky M., Klapper A.M.: Fibonacci and Galois representations of feedback-with-carry shift registers. IEEE Trans. Inf. Theory 48(11), 2826C2836 (2002).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"370_CR6","doi-asserted-by":"crossref","unstructured":"Arnault F., Berger T.P.: F-FCSR: Design of a new class of stream ciphers. In: Fast Software Encryption, pp. 83\u201397. Springer, Berlin (2005)","DOI":"10.1007\/11502760_6"},{"issue":"3","key":"370_CR7","doi-asserted-by":"crossref","first-page":"427","DOI":"10.1007\/s00145-009-9053-2","volume":"24","author":"M Hell","year":"2011","unstructured":"Hell M., Johansson T.: Breaking the stream ciphers F-FCSR-H and F-FCSR-16 in real time. J. Cryptol. 24(3), 427\u2013445 (2011).","journal-title":"J. Cryptol."},{"issue":"1","key":"370_CR8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s00145-012-9130-9","volume":"27","author":"P Stankovski","year":"2014","unstructured":"Stankovski P., Hell M., Johansson T.: An efficient state recovery attack on the X-FCSR family of stream ciphers. J. Cryptol. 27(1), 1\u201322 (2014).","journal-title":"J. Cryptol."},{"key":"370_CR9","doi-asserted-by":"crossref","first-page":"433","DOI":"10.1007\/978-3-642-05445-7_27","volume-title":"Selected Areas in Cryptography (Lecture Notes in Computer Science)","author":"F Arnault","year":"2009","unstructured":"Arnault F., Berger T., Lauradoux C., Minier M., Pousse B.: A new approach for FCSRs. In: Jacobson Jr. M.J., Rijmen V., Safavi-Naini R. (eds.) Selected Areas in Cryptography (Lecture Notes in Computer Science), vol. 5867, pp. 433\u2013448. Springer, New York, NY (2009)."},{"issue":"2","key":"370_CR10","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1007\/s12095-010-0041-z","volume":"3","author":"F Arnault","year":"2011","unstructured":"Arnault F., Berger T.P., Pousse B.: A matrix approach for FCSR automata. Cryptogr. Commun. 3(2), 109\u2013139 (2011).","journal-title":"Cryptogr. Commun."},{"issue":"12","key":"370_CR11","doi-asserted-by":"crossref","first-page":"8095","DOI":"10.1109\/TIT.2011.2164234","volume":"57","author":"F Arnault","year":"2011","unstructured":"Arnault F., Berger T., Minier M., Pousse B.: Revisiting LFSRs for cryptographic applications. IEEE Trans. Inf. Theory 57(12), 8095\u20138113 (2011).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"370_CR12","unstructured":"Zhiqiang L., Dingyi P.: Constructing a ternary FCSR with a given connection integer. Tech. Rep. 2011\/358. \n http:\/\/eprint.iacr.org\/2011\/358\/"},{"issue":"5","key":"370_CR13","first-page":"2042","volume":"61","author":"P Dingyi","year":"2015","unstructured":"Dingyi P., Zhiqiang L., Xiaolei Z.: Construction of transition matrices for ternary ring feedback with carry shift registers. IEEE Trans. Inf. Theory 61(5), 2042\u20132951 (2015).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"370_CR14","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1007\/s10623-013-9845-0","volume":"74","author":"H Wang","year":"2015","unstructured":"Wang H., Stankovski P., Johansson T.: A generalized birthday approach for efficiently finding linear relations in \n $$\\ell $$\n \n \n \u2113\n \n \n -sequences. Des. Codes Cryptogr. 74(1), 41\u201357 (2015).","journal-title":"Des. Codes Cryptogr."},{"issue":"3","key":"370_CR15","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1007\/s10623-009-9280-4","volume":"52","author":"T Tian","year":"2009","unstructured":"Tian T., Qi W.-F.: Linearity properties of binary FCSR sequences. Des. Codes Cryptogr. 52(3), 249\u2013262 (2009).","journal-title":"Des. Codes Cryptogr."},{"issue":"1","key":"370_CR16","first-page":"434","volume":"98","author":"L Zhiqiang","year":"2015","unstructured":"Zhiqiang L., Lishan K., Dongdai L., Jian G.: On the LFSRization of a class of FCSR automata. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98(1), 434\u2013440 (2015).","journal-title":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-017-0370-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-017-0370-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-017-0370-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,3,3]],"date-time":"2018-03-03T09:30:34Z","timestamp":1520069434000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-017-0370-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,25]]},"references-count":16,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,4]]}},"alternative-id":["370"],"URL":"https:\/\/doi.org\/10.1007\/s10623-017-0370-4","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,5,25]]}}}