{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T13:38:15Z","timestamp":1725457095626},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540607595"},{"type":"electronic","value":"9783540493631"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1996]]},"DOI":"10.1007\/bfb0032353","type":"book-chapter","created":{"date-parts":[[2005,12,11]],"date-time":"2005-12-11T01:40:51Z","timestamp":1134265251000},"page":"132-143","source":"Crossref","is-referenced-by-count":3,"title":["Randomness measures related to subset occurrence"],"prefix":"10.1007","author":[{"given":"H. M.","family":"Gustafson","sequence":"first","affiliation":[]},{"given":"E. P.","family":"Dawson","sequence":"additional","affiliation":[]},{"given":"J. Dj.","family":"Goli\u0107","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,28]]},"reference":[{"unstructured":"H. Beker and F. Piper Cipher Systems: The Protection of Communications, Wiley, 1982.","key":"11_CR1"},{"key":"11_CR2","volume-title":"CRYPT-X Package","author":"W. Caelli","year":"1992","unstructured":"W. Caelli, E. Dawson, H. Gustafson and L. Nielsen CRYPT-X Package, Office of Commercial Services, Queensland University of Technology, Australia, 1992. ISBN 0 86856 8090."},{"key":"11_CR3","volume-title":"Technical Report No. 223","author":"J. Carroll","year":"1988","unstructured":"J. Carroll and L. Robins, Computer Cryptanalysis, Technical Report No. 223, 1988, Deptartment of Computer Science, The University of Western Ontario, London, Ontario."},{"unstructured":"W. Feller, An Introduction to Probability Theory and Its Applications, 1, 2nd edition, Wiley, 1968.","key":"11_CR4"},{"doi-asserted-by":"crossref","unstructured":"L. J. Folks, Combination of Independent Tests, Handbook of Statistics, 4, Elsevier, 1984, 113\u2013121.","key":"11_CR5","DOI":"10.1016\/S0169-7161(84)04008-6"},{"doi-asserted-by":"crossref","unstructured":"J. Dj. Goli\u0107, On the Security of Shift Register Based Keystream Generators, Fast Software Encryption '93, Lecture Notes in Computer Science, 803, R. J. Anderson ed., Springer-Verlag, 1994, 90\u2013100.","key":"11_CR6","DOI":"10.1007\/3-540-58108-1_12"},{"unstructured":"N. L. Johnson and S. Kotz, Urn Models and Their Application, Wiley, 1977.","key":"11_CR7"},{"unstructured":"D. Knuth, The Art of Computer Programming: Seminumerical Algorithms, 2, Addison Wesley, 1973.","key":"11_CR8"},{"unstructured":"D. Knuth, The Art of Computer Programming: Sorting and Searching, 3, Addison Wesley, 1973.","key":"11_CR9"},{"key":"11_CR10","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1137\/1111009","volume":"11","author":"V. F. Kolchin","year":"1966","unstructured":"V. F. Kolchin, The Speed of Convergence to Limit Distributions in the Classical Ball Problem, Theory of Probability and its Applications, 11, 1966, 128\u2013140.","journal-title":"Theory of Probability and its Applications"},{"key":"11_CR11","volume-title":"Cryptography \u2014 A Primer","author":"A. G. Konheim","year":"1981","unstructured":"A. G. Konheim, Cryptography \u2014 A Primer, Wiley, New York, 1981."},{"key":"11_CR12","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1109\/TIT.1976.1055501","volume":"IT-22","author":"A. Lempel","year":"1976","unstructured":"A. Lempel and J. Ziv, On the Complexity of Finite Sequences, IEEE Transactions on Information Theory, IT-22, 1976, 75\u201381.","journal-title":"IEEE Transactions on Information Theory"},{"key":"11_CR13","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1109\/TIT.1969.1054260","volume":"IT-15","author":"J. L. Massey","year":"1969","unstructured":"J. L. Massey, Shift Register Synthesis and BCH Decoding, IEEE Transactions on Information Theory, IT-15, 1969, 122\u2013127.","journal-title":"IEEE Transactions on Information Theory"},{"key":"11_CR14","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1007\/BF00193563","volume":"5","author":"U. M. Maurer","year":"1992","unstructured":"U. M. Maurer, A Universal Statistical Test for Random Bit Generators, Journal of Cryptology, 5, 1992, 89\u2013105.","journal-title":"Journal of Cryptology"},{"key":"11_CR15","volume-title":"Cryptography \u2014 A New Dimension in Data Security","author":"C. H. Meyer","year":"1982","unstructured":"C. H. Meyer and S. M. Matyas, Cryptography \u2014 A New Dimension in Data Security, John Wiley & Sons, New York, 1982."},{"issue":"No.2","key":"11_CR16","doi-asserted-by":"crossref","first-page":"126","DOI":"10.2307\/2346729","volume":"28","author":"A. N. Pettitt","year":"1979","unstructured":"A. N. Pettitt, A Non-parametric Approach to the Change-point Problem, Applied Statistics, 28, No. 2, 1979, 126\u2013135.","journal-title":"Applied Statistics"},{"doi-asserted-by":"crossref","unstructured":"R. A. Rueppel Analysis and Design of Stream Ciphers, Springer-Verlag, 1986.","key":"11_CR17","DOI":"10.1007\/978-3-642-82865-2"},{"key":"11_CR18","first-page":"65","volume-title":"Contemporary Cryptology: The Science of Information Integrity","author":"R. A. Rueppel","year":"1992","unstructured":"R. A. Rueppel, Stream Ciphers, Contemporary Cryptology: The Science of Information Integrity, G. J. Simmons ed., IEEE Press, New York, 1992, 65\u2013134."},{"key":"11_CR19","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C. E. Shannon","year":"1949","unstructured":"C. E. Shannon, Communication Theory of Secrecy Systems, Bell System Technical Journal, 28, 1949, 656\u2013715.","journal-title":"Bell System Technical Journal"},{"issue":"No.7","key":"11_CR20","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1002\/scj.4690190703","volume":"19","author":"A. Shimizu","year":"1988","unstructured":"A. Shimizu and S. Miyaguchi, FEAL \u2014 Fast Data Encryption Algorithm, Systems and Computers in Japan, 19, No. 7, 1988, 20\u201334.","journal-title":"Systems and Computers in Japan"},{"doi-asserted-by":"crossref","unstructured":"M. A. Stephens and R. B. D'Agostino, Tests Based on EDF Statistics, Goodness of Fit Techniques, Statistics, Textbooks and Monographs, 68, Marcel Dekker Inc., 1986, 97\u2013193.","key":"11_CR21","DOI":"10.1201\/9780203753064-4"}],"container-title":["Lecture Notes in Computer Science","Cryptography: Policy and Algorithms"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0032353","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,11]],"date-time":"2020-04-11T09:48:14Z","timestamp":1586598494000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0032353"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1996]]},"ISBN":["9783540607595","9783540493631"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/bfb0032353","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1996]]}}}