{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,16]],"date-time":"2024-11-16T05:27:50Z","timestamp":1731734870848,"version":"3.28.0"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,4,8]],"date-time":"2024-04-08T00:00:00Z","timestamp":1712534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,4,8]],"date-time":"2024-04-08T00:00:00Z","timestamp":1712534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Syst Sci Complex"],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.1007\/s11424-024-2295-0","type":"journal-article","created":{"date-parts":[[2024,4,8]],"date-time":"2024-04-08T02:05:37Z","timestamp":1712541937000},"page":"1326-1350","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Fibonacci View on the Galois NFSR Used in Trivium"],"prefix":"10.1007","volume":"37","author":[{"given":"Hongyu","family":"Wang","sequence":"first","affiliation":[]},{"given":"Qunxiong","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Wenfeng","family":"Qi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,8]]},"reference":[{"key":"2295_CR1","first-page":"345","volume-title":"Algebraic Attacks on Stream Ciphers with Linear Feedback","author":"N T Courtois","year":"2003","unstructured":"Courtois N T and Meier W, Algebraic Attacks on Stream Ciphers with Linear Feedback, Springer, Berlin, 2003, 345\u2013359."},{"issue":"3","key":"2295_CR2","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/BF02252874","volume":"1","author":"W Meier","year":"1989","unstructured":"Meier W and Staffelbach O, Fast correlation attacks on certain stream ciphers, Journal of Cryptology, 1989, 1(3): 159\u2013176.","journal-title":"Journal of Cryptology"},{"key":"2295_CR3","volume-title":"New Stream Cipher Designs: The eSTREAM Finalists","author":"C De Canni\u00e8re","year":"2008","unstructured":"De Canni\u00e8re C and Preneel B T, New Stream Cipher Designs: The eSTREAM Finalists, Springer, Berlin\/Heidelberg, 2008."},{"issue":"1","key":"2295_CR4","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1504\/IJWMC.2011.044106","volume":"5","author":"M \u00c5gren","year":"2011","unstructured":"\u00c5gren M, Hell M, Johansson T, et al., Grain-128a: A new version of grain-128 with optional authentication, International Journal of Wireless and Mobile Computing, 2011, 5(1): 48\u201359.","journal-title":"International Journal of Wireless and Mobile Computing"},{"issue":"3","key":"2295_CR5","doi-asserted-by":"publisher","first-page":"885","DOI":"10.1007\/s00145-017-9273-9","volume":"31","author":"A Canteaut","year":"2018","unstructured":"Canteaut A, Carpov S, Fontaine C, et al., Stream ciphers: A practical solution for efficient homomorphic-ciphertext compression, Journal of Cryptology, 2018, 31(3): 885\u2013916.","journal-title":"Journal of Cryptology"},{"key":"2295_CR6","unstructured":"Bernstein D J, Caesar: Cryptographic competition for authenticated encryption: Security, applicability, and robustness, 2014, https:\/\/competitions.cr.yp.to."},{"key":"2295_CR7","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/978-3-540-68351-3_14","volume-title":"New Stream Cipher Designs","author":"M Hell","year":"2008","unstructured":"Hell M, Johansson T, Maximov A, et al., The grain family of stream ciphers, New Stream Cipher Designs, Springer, Berlin\/Heidelberg, 2008, 179\u2013190."},{"key":"2295_CR8","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/978-3-642-10868-6_9","volume-title":"Cryptography and Coding","author":"J Borghoff","year":"2009","unstructured":"Borghoff J, Knudsen L R, and Stolpe M, bivium as a mixed-integer linear programming problem, Cryptography and Coding, Springer, Berlin, 2009, 133\u2013152."},{"key":"2295_CR9","first-page":"278","volume-title":"Advances in Cryptology","author":"I Dinur","year":"2009","unstructured":"Dinur I and Shamir A, Cube attacks on tweakable black box polynomials, Advances in Cryptology, Springer, Berlin, 2009, 278\u2013299."},{"key":"2295_CR10","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/978-3-540-77360-3_3","volume-title":"Selected Areas in Cryptography","author":"A Maximov","year":"2007","unstructured":"Maximov A and Biryukov A, Two trivial attacks on trivium, Selected Areas in Cryptography, Springer, Berlin, 2007, 36\u201355."},{"issue":"2","key":"2295_CR11","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1007\/s10623-020-00822-y","volume":"89","author":"C D Ye","year":"2021","unstructured":"Ye C D, Tian T, and Zeng F Y, The MILP-aided conditional differential attack and its application to trivium, Designs, Codes and Cryptography, 2021, 89(2): 317\u2013339.","journal-title":"Designs, Codes and Cryptography"},{"issue":"6","key":"2295_CR12","doi-asserted-by":"publisher","first-page":"1317","DOI":"10.1142\/S0129054111008738","volume":"22","author":"H G Hu","year":"2011","unstructured":"Hu H G and Gong G, Periods on two kinds of nonlinear feedback shift registers with time varying feedback functions, International Journal of Foundations of Computer Science, 2011, 22(6): 1317\u20131329.","journal-title":"International Journal of Foundations of Computer Science"},{"key":"2295_CR13","unstructured":"Lechtaler A C, Cipriano M, Garc\u00eda E, et al., Trivium vs. trivium toy, Proceedings of the 20th Argentinean Congress on Computer Science \u2014 III Workshop Computer Security, Buenos Aires, 2014, 161\u2013172."},{"issue":"1","key":"2295_CR14","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/s10623-018-0493-2","volume":"87","author":"S Y Zhang","year":"2019","unstructured":"Zhang S Y and Chen G L, New results on the state cycles of trivium, Designs, Codes and Cryptography, 2019, 87(1): 149\u2013162.","journal-title":"Designs, Codes and Cryptography"},{"issue":"2","key":"2295_CR15","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/s12095-015-0173-2","volume":"9","author":"E Dubrova","year":"2017","unstructured":"Dubrova E and Hell M E, A stream cipher for 5G wireless communication systems, Cryptography and Communications, 2017, 9(2): 273\u2013289.","journal-title":"Cryptography and Communications"},{"issue":"1","key":"2295_CR16","first-page":"91","volume":"3","author":"J M Zhang","year":"2016","unstructured":"Zhang J M and Qi W F, Cryptanalysis of an equivalent model of stream cipher espresso, Journal of Cryptologic Research, 2016, 3(1): 91\u2013100.","journal-title":"Journal of Cryptologic Research"},{"issue":"5","key":"2295_CR17","doi-asserted-by":"publisher","first-page":"847","DOI":"10.1007\/s12095-021-00511-0","volume":"13","author":"Y Ge","year":"2021","unstructured":"Ge Y and Parampalli U, Cryptanalysis of the class of maximum period galois nLFSR-based stream ciphers, Cryptography and Communications, 2021, 13(5): 847\u2013864.","journal-title":"Cryptography and Communications"},{"issue":"10","key":"2295_CR18","doi-asserted-by":"publisher","first-page":"2267","DOI":"10.1007\/s10623-019-00617-w","volume":"87","author":"T Tian","year":"2019","unstructured":"Tian T, Zhang J M, and Qi W F, On the uniqueness of a type of cascade connection representations for NFSRs, Designs, Codes and Cryptography, 2019, 87(10): 2267\u20132294.","journal-title":"Designs, Codes and Cryptography"},{"key":"2295_CR19","first-page":"184","volume-title":"Selected Areas in Cryptography","author":"C Berbain","year":"2008","unstructured":"Berbain C, Gilbert H, and Joux A, Algebraic and correlation attacks against linearly filtered non linear feedback shift registers, Selected Areas in Cryptography, Springer, Berlin, 2008, 184\u2013198."},{"issue":"4","key":"2295_CR20","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1515\/jmc-2013-5009","volume":"7","author":"M A Orumiehchiha","year":"2013","unstructured":"Orumiehchiha M A, Pieprzyk J, Steinfeld R, et al., Security analysis of linearly filtered NLFSRs, Journal of Mathematical Cryptology, 2013, 7(4): 313\u2013332.","journal-title":"Journal of Mathematical Cryptology"},{"issue":"11","key":"2295_CR21","doi-asserted-by":"publisher","first-page":"5263","DOI":"10.1109\/TIT.2009.2030467","volume":"55","author":"E Dubrova","year":"2009","unstructured":"Dubrova E, A transformation from the fibonacci to the galois NLFSRs, IEEE Transactions on Information Theory, 2009, 55(11): 5263\u20135271.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"4","key":"2295_CR22","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1109\/TIT.1964.1053690","volume":"10","author":"J L Massey","year":"1964","unstructured":"Massey J L and Liu R W, Equivalence of nonlinear shift-registers, IEEE Transactions on Information Theory, 1964, 10(4): 378\u2013379.","journal-title":"IEEE Transactions on Information Theory"},{"key":"2295_CR23","doi-asserted-by":"crossref","unstructured":"Lin Z Q, The transformation from the galois NLFSR to the fibonacci configuration, Proceeding of the Fourth International Conference on Emerging Intelligent Data and Web Technologies, Guiyang, 2013, 335\u2013339.","DOI":"10.1109\/EIDWT.2013.64"},{"key":"2295_CR24","volume-title":"Shift Register Sequences","author":"S W Golomb","year":"1967","unstructured":"Golomb S W, Shift Register Sequences, Holden-Dan Inc, San Francisco, 1967."},{"key":"2295_CR25","volume-title":"Encyclopaedia of Mathematics and Its Applications","author":"R Lidl","year":"1997","unstructured":"Lidl R and Niederreiter H, Finite fields, Encyclopaedia of Mathematics and Its Applications, Cambridge University Press, Cambridge, 1997."},{"key":"2295_CR26","volume-title":"Topics in Algebra","author":"I N Herstein","year":"1991","unstructured":"Herstein I N, Topics in Algebra, John Wiley and Sons, New York, 1991."},{"key":"2295_CR27","unstructured":"Zhong J H, Pan Y Y, Kong W H, et al., Necessary and sufficient conditions for galois NFSRs equivalent to fibonacci ones and their application to stream cipher trivium, Cryptology ePrint Archive, 2021, 928, https:\/\/eprint.iacr.org\/2021\/928."}],"container-title":["Journal of Systems Science and Complexity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11424-024-2295-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11424-024-2295-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11424-024-2295-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,15]],"date-time":"2024-11-15T21:17:26Z","timestamp":1731705446000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11424-024-2295-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,8]]},"references-count":27,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,6]]}},"alternative-id":["2295"],"URL":"https:\/\/doi.org\/10.1007\/s11424-024-2295-0","relation":{},"ISSN":["1009-6124","1559-7067"],"issn-type":[{"type":"print","value":"1009-6124"},{"type":"electronic","value":"1559-7067"}],"subject":[],"published":{"date-parts":[[2024,4,8]]},"assertion":[{"value":"9 July 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 September 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 April 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare no conflict of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}]}}