{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T11:26:01Z","timestamp":1649071561960},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2015,7,30]],"date-time":"2015-07-30T00:00:00Z","timestamp":1438214400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Syst Sci Complex"],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1007\/s11424-015-3072-x","type":"journal-article","created":{"date-parts":[[2015,7,28]],"date-time":"2015-07-28T23:10:33Z","timestamp":1438125033000},"page":"1231-1242","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A note on determine the greatest common subfamily of two NFSRs by Gr\u00f6bner basis"],"prefix":"10.1007","volume":"28","author":[{"given":"Zhongxiao","family":"Wang","sequence":"first","affiliation":[]},{"given":"Wenfeng","family":"Qi","sequence":"additional","affiliation":[]},{"given":"Tian","family":"Tian","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,30]]},"reference":[{"issue":"3","key":"3072_CR1","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1007\/BF02252874","volume":"1","author":"W Meier","year":"1989","unstructured":"Meier W and Staffelbach O, Fast correlation attacks on certain stream ciphers, Journal of Cryptology, 1989, 1(3): 159\u2013176.","journal-title":"Journal of Cryptology"},{"key":"3072_CR2","volume-title":"Advances in Cryptology-EUROCRYPT 2000","author":"A Canteaut","year":"2000","unstructured":"Canteaut A and Trabbia M, Improved fast correlation attacks using parity-check equations of weight 4 and 5, Advances in Cryptology-EUROCRYPT 2000 (ed. by Preneel B), Bruges, 2000."},{"key":"3072_CR3","volume-title":"Advances in Cryptology-EUROCRYPT 2003","author":"N Courtois","year":"2003","unstructured":"Courtois N and Meier W, Algebraic attacks on stream ciphers with linear feedback, Advances in Cryptology-EUROCRYPT 2003 (ed. by Biham E), Warsaw, 2003."},{"key":"3072_CR4","volume-title":"Advances in Cryptology-CRYPTO 2003","author":"N Courtois","year":"2003","unstructured":"Courtois N, Fast algebraic attacks on stream ciphers with linear feedback, Advances in Cryptology-CRYPTO 2003 (ed. by Boneh D), California, 2003."},{"key":"3072_CR5","volume-title":"New Stream Cipher Designs: The Grain Family of Stream Ciphers","author":"M Hell","year":"2008","unstructured":"Hell M, Johansson T, and Meier W, New Stream Cipher Designs: The Grain Family of Stream Ciphers, Springer-Verlag, Berlin, 2008."},{"key":"3072_CR6","volume-title":"New Stream Cipher Designs: The MICKEY Stream Ciphers","author":"S Babbage","year":"2008","unstructured":"Babbage S and Dodd M, New Stream Cipher Designs: The MICKEY Stream Ciphers, Springer-Verlag, Berlin, 2008."},{"key":"3072_CR7","volume-title":"New Stream Cipher Designs: Trivium","author":"C D Canni\u00e8re","year":"2008","unstructured":"Canni\u00e8re C D and Preneel B, New Stream Cipher Designs: Trivium, Springer-Verlag Berlin, 2008."},{"issue":"3","key":"3072_CR8","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1016\/0097-3165(76)90013-3","volume":"1","author":"K Kjeldsen","year":"1976","unstructured":"Kjeldsen K, On the cycle of structure of a set of nonlinear shift registers with symmetric feedback functions, Journal of Combinatorial Theory Series A, 1976, 1(3): 154\u2013169.","journal-title":"Journal of Combinatorial Theory Series A"},{"issue":"6","key":"3072_CR9","doi-asserted-by":"crossref","first-page":"1317","DOI":"10.1142\/S0129054111008738","volume":"22","author":"H Hu","year":"2011","unstructured":"Hu H and Gong G, Periods on two kinds of nonlinear feedback shift registers with time varying feedback functions, International Journal of Foundations of Computer Science, 2011, 22(6): 1317\u20131329.","journal-title":"International Journal of Foundations of Computer Science"},{"issue":"2","key":"3072_CR10","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/12.565596","volume":"46","author":"F S Annexstein","year":"1997","unstructured":"Annexstein F S, Generating De Bruijn sequences: An efficient implementation, IEEE Transactions on Computers, 1997, 46(2): 198\u2013200.","journal-title":"IEEE Transactions on Computers"},{"key":"3072_CR11","volume-title":"Investigations on nonlinear streamcipher systems: Construction and evaluation methods","author":"C J Jansen","year":"1989","unstructured":"Jansen C J, Investigations on nonlinear streamcipher systems: Construction and evaluation methods, Doctor\u2019s degree thesis, Technical University of Delft, Netherlands, 1989."},{"issue":"4","key":"3072_CR12","first-page":"1555","volume":"10","author":"D Erdmann","year":"2005","unstructured":"Erdmann D and Murphy S, An approximate distribution for the maximum order complexity, Designs, Codes and Cryptography, 2005, 10(4): 1555\u20131563.","journal-title":"Designs, Codes and Cryptography"},{"issue":"11","key":"3072_CR13","doi-asserted-by":"crossref","first-page":"5263","DOI":"10.1109\/TIT.2009.2030467","volume":"55","author":"E Dubrova","year":"2009","unstructured":"Dubrova E, A transformation from the Fibonacci to the Galois NLFSRs, IEEE Transactions on Information Theory, 2009, 55(11): 5263\u20135271.","journal-title":"IEEE Transactions on Information Theory"},{"key":"3072_CR14","volume-title":"Finite Fields","author":"R Lidl","year":"1997","unstructured":"Lidl R and Niederreiter H, Finite Fields, Cambridge University Press Oxford, 1997."},{"key":"3072_CR15","volume-title":"Ideals, Varieties and Algorithms","author":"D Cox","year":"1996","unstructured":"Cox D, Little J, and O\u2019Shea D, Ideals, Varieties and Algorithms, Springer-Verlag, Berlin, 1996."},{"issue":"6","key":"3072_CR16","doi-asserted-by":"crossref","first-page":"655","DOI":"10.1016\/j.jsc.2011.12.025","volume":"47","author":"X S Gao","year":"2012","unstructured":"Gao X S and Huang Z, Characteristic set algorithms for equation solving in finite fields, Journal of Symbolic Computation, 2012, 47(6): 655\u2013679.","journal-title":"Journal of Symbolic Computation"},{"key":"3072_CR17","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4613-0041-0","volume-title":"Algebra","author":"S Lang","year":"2002","unstructured":"Lang S, Algebra, Springer-Verlag Berlin, 2002."},{"key":"3072_CR18","volume-title":"Gr\u00f6bner Bases, a Computationnal Approach to Commutative Algebra","author":"T Becker","year":"1993","unstructured":"Becker T and Weispfenning V, Gr\u00f6bner Bases, a Computationnal Approach to Commutative Algebra, Springer-Verlag, Berlin, 1993."},{"key":"3072_CR19","volume-title":"Shift Register Sequences","author":"S W Golomb","year":"1982","unstructured":"Golomb S W, Shift Register Sequences, Aegean Park Press California, 1982."}],"container-title":["Journal of Systems Science and Complexity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11424-015-3072-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11424-015-3072-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11424-015-3072-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T14:54:09Z","timestamp":1559400849000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11424-015-3072-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7,30]]},"references-count":19,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2015,10]]}},"alternative-id":["3072"],"URL":"https:\/\/doi.org\/10.1007\/s11424-015-3072-x","relation":{},"ISSN":["1009-6124","1559-7067"],"issn-type":[{"value":"1009-6124","type":"print"},{"value":"1559-7067","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,7,30]]}}}