{"id":"https://openalex.org/W3197008673","doi":"https://doi.org/10.1109/isit45174.2021.9517929","title":"On Galois NFSRs with Terminal Bits","display_name":"On Galois NFSRs with Terminal Bits","publication_year":2021,"publication_date":"2021-07-12","ids":{"openalex":"https://openalex.org/W3197008673","doi":"https://doi.org/10.1109/isit45174.2021.9517929","mag":"3197008673"},"language":"en","primary_location":{"id":"doi:10.1109/isit45174.2021.9517929","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit45174.2021.9517929","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5017515353","display_name":"Yingyin Pan","orcid":null},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4391768012","display_name":"State Key Laboratory of Information Security","ror":"https://ror.org/012cr4033","country_code":null,"type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404","https://openalex.org/I4391768012"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yingyin Pan","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences,State Key Laboratory of Information Security,Beijing,China,100093","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China; State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences,State Key Laboratory of Information Security,Beijing,China,100093","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366","https://openalex.org/I4391768012"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China; State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100704772","display_name":"Jianghua Zhong","orcid":"https://orcid.org/0000-0001-5576-6319"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4391768012","display_name":"State Key Laboratory of Information Security","ror":"https://ror.org/012cr4033","country_code":null,"type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404","https://openalex.org/I4391768012"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianghua Zhong","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences,State Key Laboratory of Information Security,Beijing,China,100093"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences,State Key Laboratory of Information Security,Beijing,China,100093","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366","https://openalex.org/I4391768012"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008820992","display_name":"Dongdai Lin","orcid":"https://orcid.org/0000-0002-3951-7889"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4391768012","display_name":"State Key Laboratory of Information Security","ror":"https://ror.org/012cr4033","country_code":null,"type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404","https://openalex.org/I4391768012"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dongdai Lin","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences,State Key Laboratory of Information Security,Beijing,China,100093"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences,State Key Laboratory of Information Security,Beijing,China,100093","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366","https://openalex.org/I4391768012"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5017515353"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210156404","https://openalex.org/I4210165038","https://openalex.org/I4391768012"],"apc_list":null,"apc_paid":null,"fwci":0.5594,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.73418711,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"3062","last_page":"3067"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11321","display_name":"Error Correcting Code Techniques","score":0.9940999746322632,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fibonacci-number","display_name":"Fibonacci number","score":0.8269360065460205},{"id":"https://openalex.org/keywords/stream-cipher","display_name":"Stream cipher","score":0.6913325190544128},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.6112111210823059},{"id":"https://openalex.org/keywords/terminal","display_name":"Terminal (telecommunication)","score":0.5839530825614929},{"id":"https://openalex.org/keywords/galois-theory","display_name":"Galois theory","score":0.513172447681427},{"id":"https://openalex.org/keywords/invertible-matrix","display_name":"Invertible matrix","score":0.45558226108551025},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.44452473521232605},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.4153003692626953},{"id":"https://openalex.org/keywords/galois-group","display_name":"Galois group","score":0.4151299297809601},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.31197112798690796},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.2629074454307556},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.22638851404190063},{"id":"https://openalex.org/keywords/pure-mathematics","display_name":"Pure mathematics","score":0.15852397680282593}],"concepts":[{"id":"https://openalex.org/C173734053","wikidata":"https://www.wikidata.org/wiki/Q47577","display_name":"Fibonacci number","level":2,"score":0.8269360065460205},{"id":"https://openalex.org/C92950451","wikidata":"https://www.wikidata.org/wiki/Q864718","display_name":"Stream cipher","level":3,"score":0.6913325190544128},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.6112111210823059},{"id":"https://openalex.org/C2779664074","wikidata":"https://www.wikidata.org/wiki/Q3518405","display_name":"Terminal (telecommunication)","level":2,"score":0.5839530825614929},{"id":"https://openalex.org/C94398972","wikidata":"https://www.wikidata.org/wiki/Q92552","display_name":"Galois theory","level":2,"score":0.513172447681427},{"id":"https://openalex.org/C96442724","wikidata":"https://www.wikidata.org/wiki/Q242188","display_name":"Invertible matrix","level":2,"score":0.45558226108551025},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.44452473521232605},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.4153003692626953},{"id":"https://openalex.org/C67536143","wikidata":"https://www.wikidata.org/wiki/Q730384","display_name":"Galois group","level":2,"score":0.4151299297809601},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.31197112798690796},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2629074454307556},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.22638851404190063},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.15852397680282593},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isit45174.2021.9517929","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit45174.2021.9517929","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4174504177","display_name":null,"funder_award_id":"61772029,61872359","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W641446768","https://openalex.org/W2013826204","https://openalex.org/W2041749201","https://openalex.org/W2076397729","https://openalex.org/W2113688179","https://openalex.org/W2141060521","https://openalex.org/W2910291694","https://openalex.org/W2971505607","https://openalex.org/W4254948851","https://openalex.org/W6669469872","https://openalex.org/W6765053193"],"related_works":["https://openalex.org/W2730690530","https://openalex.org/W2189024741","https://openalex.org/W329225561","https://openalex.org/W2899204428","https://openalex.org/W4300952403","https://openalex.org/W2952351442","https://openalex.org/W2560116635","https://openalex.org/W2957052640","https://openalex.org/W2952169589","https://openalex.org/W2066449478"],"abstract_inverted_index":{"Nonlinear":[0],"feedback":[1],"shift":[2],"registers":[3],"(NFSRs)":[4],"are":[5,37,68,167],"generally":[6],"classified":[7],"as":[8,97],"Fibonacci":[9,26,117,148,173],"NFSRs":[10,13,21,45,67,75,111,160,187],"and":[11,88,99,112,132],"Galois":[12,20,74,110,139,159,186],"according":[14],"to":[15,25,48,63,121,145,169],"their":[16,32,58,65,122],"implementation":[17],"configurations.":[18],"Some":[19],"can":[22],"be":[23],"equivalent":[24,44,144,168],"ones":[27,118],"in":[28,92],"the":[29,40,49,73,81,154,162,176,183],"sense":[30],"that":[31,166],"sets":[33,123],"of":[34,42,51,57,108,124,185],"output":[35,125],"sequences":[36],"equal.":[38],"Finding":[39],"characterization":[41],"those":[43,157],"is":[46,62],"helpful":[47],"design":[50],"NFSR-based":[52],"stream":[53,94],"ciphers.":[54],"Moreover,":[55],"one":[56],"design's":[59],"security":[60],"criteria":[61],"assure":[64],"used":[66,91],"nonsingular.":[69],"This":[70],"paper":[71,102,155,177],"considers":[72],"with":[76,116,119,141,161,188],"terminal":[77,142,164,189],"bits,":[78],"which":[79],"have":[80,89],"first":[82,103],"several":[83],"bits":[84],"involved":[85],"only":[86],"shifts":[87],"been":[90],"many":[93],"ciphers":[95],"such":[96,109],"Grain":[98],"Trivium.":[100],"The":[101],"gives":[104,178],"a":[105,130,170,179],"special":[106],"class":[107],"reveals":[113],"its":[114],"relation":[115],"respect":[120],"sequences.":[126],"It":[127],"then":[128],"presents":[129],"necessary":[131],"sufficient":[133],"condition":[134,181],"for":[135,182],"an":[136,146],"n-":[137],"stage":[138],"NFSR":[140],"bit":[143,165],"n-stage":[147,158,172],"NFSR.":[149,174],"Based":[150],"on":[151],"this":[152],"condition,":[153],"enumerates":[156],"same":[163],"given":[171],"Finally,":[175],"necessary/sufficient":[180],"nonsingularity":[184],"bits.":[190]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1}],"updated_date":"2026-03-14T06:41:57.775601","created_date":"2025-10-10T00:00:00"}
