{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,8]],"date-time":"2024-07-08T22:29:32Z","timestamp":1720477772060},"reference-count":15,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[2010,4,1]],"date-time":"2010-04-01T00:00:00Z","timestamp":1270080000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Neural Networks"],"published-print":{"date-parts":[[2010,4]]},"DOI":"10.1016\/j.neunet.2009.12.008","type":"journal-article","created":{"date-parts":[[2009,12,29]],"date-time":"2009-12-29T09:07:10Z","timestamp":1262077630000},"page":"461-464","source":"Crossref","is-referenced-by-count":15,"title":["A simple linearization of the self-shrinking generator by means of cellular automata"],"prefix":"10.1016","volume":"23","author":[{"given":"Amparo","family":"F\u00faster-Sabater","sequence":"first","affiliation":[]},{"given":"M. Eugenia","family":"Pazo-Robles","sequence":"additional","affiliation":[]},{"given":"Pino","family":"Caballero-Gil","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.neunet.2009.12.008_b1","unstructured":"Bluetooth. Specifications of the Bluetooth system. Version 1.1. 2001. Retrieved from http:\/\/www.bluetooth.com\/"},{"issue":"4","key":"10.1016\/j.neunet.2009.12.008_b2","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1016\/j.ins.2003.06.002","article-title":"A wide family of nonlinear filter functions with a large linear span","volume":"164","author":"Caballero-Gil","year":"2004","journal-title":"Information Sciences"},{"issue":"3","key":"10.1016\/j.neunet.2009.12.008_b3","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1109\/43.489103","article-title":"Synthesis of one-dimensional linear hybrid cellular automata","volume":"15","author":"Cattell","year":"1996","journal-title":"IEEE Transactions on Computers-Aided Design"},{"key":"10.1016\/j.neunet.2009.12.008_b4","series-title":"Proc. 1997 ICICS, 2","first-page":"1124","article-title":"Some properties of maximum length cellular automaton sequences","author":"Chang","year":"1997"},{"key":"10.1016\/j.neunet.2009.12.008_b5","series-title":"Proc. ACRI\u201904","first-page":"31","article-title":"Computing phase shifts of maximum-length 90\/150 cellular automata sequences","volume":"Vol. 3305","author":"Cho","year":"2004"},{"key":"10.1016\/j.neunet.2009.12.008_b6","series-title":"The shrinking generator (Proc. CRYPTO\u201993)","first-page":"23","volume":"Vol. 773","author":"Coppersmith","year":"1993"},{"issue":"12","key":"10.1016\/j.neunet.2009.12.008_b7","doi-asserted-by":"crossref","first-page":"1427","DOI":"10.1016\/j.am1.2002.09.003","article-title":"Run distribution in nonlinear binary generators","volume":"17","author":"F\u00faster-Sabater","year":"2004","journal-title":"Applied Mathematics Letters"},{"key":"10.1016\/j.neunet.2009.12.008_b8","series-title":"Proc. ACRI \u201906","first-page":"611","article-title":"Concatenated automata in cryptanalysis of stream ciphers","volume":"Vol. 4173","author":"F\u00faster-Sabater","year":"2006"},{"key":"10.1016\/j.neunet.2009.12.008_b9","series-title":"Proc. HAIS 2008","first-page":"475","article-title":"On the use of linear cellular automata for the synthesis of cryptographic sequences","volume":"Vol. 5271","author":"F\u00faster-Sabater","year":"2008"},{"key":"10.1016\/j.neunet.2009.12.008_b10","series-title":"Shift-register sequence","author":"Golomb","year":"1982"},{"key":"10.1016\/j.neunet.2009.12.008_b11","unstructured":"GSM. (1999). Global Systems for Mobile Communications. Retrieved from http:\/\/cryptome.org\/gsm-a512.html"},{"issue":"3","key":"10.1016\/j.neunet.2009.12.008_b12","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/j.tcs.2004.11.021","article-title":"Theory of cellular automata: A survey","volume":"334","author":"Kari","year":"2005","journal-title":"Theoretical Computer Science"},{"key":"10.1016\/j.neunet.2009.12.008_b13","series-title":"Introduction to finite fields and their applications","author":"Lidl","year":"1986"},{"key":"10.1016\/j.neunet.2009.12.008_b14","series-title":"Proc. eurocrypt\u201994","first-page":"205","article-title":"The Self-Shrinking Generator","volume":"Vol. 950","author":"Meier","year":"1994"},{"key":"10.1016\/j.neunet.2009.12.008_b15","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1016\/0196-8858(86)90028-X","article-title":"Random sequences with cellular automata","volume":"7","author":"Wolfram","year":"1986","journal-title":"Advances in Applied Mathematics"}],"container-title":["Neural Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0893608009003268?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0893608009003268?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2018,12,14]],"date-time":"2018-12-14T07:53:49Z","timestamp":1544774029000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0893608009003268"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,4]]},"references-count":15,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2010,4]]}},"alternative-id":["S0893608009003268"],"URL":"https:\/\/doi.org\/10.1016\/j.neunet.2009.12.008","relation":{},"ISSN":["0893-6080"],"issn-type":[{"value":"0893-6080","type":"print"}],"subject":[],"published":{"date-parts":[[2010,4]]}}}