265 resultados para messages
Resumo:
Predicate encryption (PE) is a new primitive which supports exible control over access to encrypted data. In PE schemes, users' decryption keys are associated with predicates f and ciphertexts encode attributes a that are specified during the encryption procedure. A user can successfully decrypt if and only if f(a) = 1. In this thesis, we will investigate several properties that are crucial to PE. We focus on expressiveness of PE, Revocable PE and Hierarchical PE (HPE) with forward security. For all proposed systems, we provide a security model and analysis using the widely accepted computational complexity approach. Our first contribution is to explore the expressiveness of PE. Existing PE supports a wide class of predicates such as conjunctions of equality, comparison and subset queries, disjunctions of equality queries, and more generally, arbitrary combinations of conjunctive and disjunctive equality queries. We advance PE to evaluate more expressive predicates, e.g., disjunctive comparison or disjunctive subset queries. Such expressiveness is achieved at the cost of computational and space overhead. To improve the performance, we appropriately revise the PE to reduce the computational and space cost. Furthermore, we propose a heuristic method to reduce disjunctions in the predicates. Our schemes are proved in the standard model. We then introduce the concept of Revocable Predicate Encryption (RPE), which extends the previous PE setting with revocation support: private keys can be used to decrypt an RPE ciphertext only if they match the decryption policy (defined via attributes encoded into the ciphertext and predicates associated with private keys) and were not revoked by the time the ciphertext was created. We propose two RPE schemes. Our first scheme, termed Attribute- Hiding RPE (AH-RPE), offers attribute-hiding, which is the standard PE property. Our second scheme, termed Full-Hiding RPE (FH-RPE), offers even stronger privacy guarantees, i.e., apart from possessing the Attribute-Hiding property, the scheme also ensures that no information about revoked users is leaked from a given ciphertext. The proposed schemes are also proved to be secure under well established assumptions in the standard model. Secrecy of decryption keys is an important pre-requisite for security of (H)PE and compromised private keys must be immediately replaced. The notion of Forward Security (FS) reduces damage from compromised keys by guaranteeing confidentiality of messages that were encrypted prior to the compromise event. We present the first Forward-Secure Hierarchical Predicate Encryption (FS-HPE) that is proved secure in the standard model. Our FS-HPE scheme offers some desirable properties: time-independent delegation of predicates (to support dynamic behavior for delegation of decrypting rights to new users), local update for users' private keys (i.e., no master authority needs to be contacted), forward security, and the scheme's encryption process does not require knowledge of predicates at any level including when those predicates join the hierarchy.
Resumo:
Authenticated Encryption (AE) is the cryptographic process of providing simultaneous confidentiality and integrity protection to messages. This approach is more efficient than applying a two-step process of providing confidentiality for a message by encrypting the message, and in a separate pass providing integrity protection by generating a Message Authentication Code (MAC). AE using symmetric ciphers can be provided by either stream ciphers with built in authentication mechanisms or block ciphers using appropriate modes of operation. However, stream ciphers have the potential for higher performance and smaller footprint in hardware and/or software than block ciphers. This property makes stream ciphers suitable for resource constrained environments, where storage and computational power are limited. There have been several recent stream cipher proposals that claim to provide AE. These ciphers can be analysed using existing techniques that consider confidentiality or integrity separately; however currently there is no existing framework for the analysis of AE stream ciphers that analyses these two properties simultaneously. This thesis introduces a novel framework for the analysis of AE using stream cipher algorithms. This thesis analyzes the mechanisms for providing confidentiality and for providing integrity in AE algorithms using stream ciphers. There is a greater emphasis on the analysis of the integrity mechanisms, as there is little in the public literature on this, in the context of authenticated encryption. The thesis has four main contributions as follows. The first contribution is the design of a framework that can be used to classify AE stream ciphers based on three characteristics. The first classification applies Bellare and Namprempre's work on the the order in which encryption and authentication processes take place. The second classification is based on the method used for accumulating the input message (either directly or indirectly) into the into the internal states of the cipher to generate a MAC. The third classification is based on whether the sequence that is used to provide encryption and authentication is generated using a single key and initial vector, or two keys and two initial vectors. The second contribution is the application of an existing algebraic method to analyse the confidentiality algorithms of two AE stream ciphers; namely SSS and ZUC. The algebraic method is based on considering the nonlinear filter (NLF) of these ciphers as a combiner with memory. This method enables us to construct equations for the NLF that relate the (inputs, outputs and memory of the combiner) to the output keystream. We show that both of these ciphers are secure from this type of algebraic attack. We conclude that using a keydependent SBox in the NLF twice, and using two different SBoxes in the NLF of ZUC, prevents this type of algebraic attack. The third contribution is a new general matrix based model for MAC generation where the input message is injected directly into the internal state. This model describes the accumulation process when the input message is injected directly into the internal state of a nonlinear filter generator. We show that three recently proposed AE stream ciphers can be considered as instances of this model; namely SSS, NLSv2 and SOBER-128. Our model is more general than a previous investigations into direct injection. Possible forgery attacks against this model are investigated. It is shown that using a nonlinear filter in the accumulation process of the input message when either the input message or the initial states of the register is unknown prevents forgery attacks based on collisions. The last contribution is a new general matrix based model for MAC generation where the input message is injected indirectly into the internal state. This model uses the input message as a controller to accumulate a keystream sequence into an accumulation register. We show that three current AE stream ciphers can be considered as instances of this model; namely ZUC, Grain-128a and Sfinks. We establish the conditions under which the model is susceptible to forgery and side-channel attacks.
Resumo:
The research reported here addresses the problem of athlete off-field behaviours as they influence sports’ sponsors, particularly the achievement of sponsorship objectives. The question arises because of incidents of sponsorship contract cancellation following news-media reporting of athletes’ off-field behaviours. Two studies are used to investigate the research question; the first establishes the content of news-media reports, and the second tests the effects of news’ reports on athlete, team and sponsor evaluations using an experimental design. Key assumptions of the research are that sponsorship objectives are principally consumer-based and mediated. Models of sponsorship argue that sponsors aim to reach and influence consumers through sponsees. Assuming this pathway exists is central to sponsorship activities. A corollary is that other mediators, in this case the news-media, may also communicate (uncontrollable) messages such that a consumer audience may be told of negative news that may then be associated with the sponsor. When sponsors cancel contracts it is assumed that their goal is to control the links between their brand and a negative referent. Balance theory is used to discuss the potential effects of negative off-field behaviours of athletes on sponsor’s objectives. Heider’s balance theory (1958) explains that individuals prefer to evaluate linked individuals or entities consistently. In the sponsorship context this presents the possibility that a negative evaluation of the athlete’s behaviour will contribute to correspondingly negative evaluations of the athlete’s team and sponsors. A content analysis (Study 1) was used to survey the types of athlete off-field behaviours commonly reported in a newspaper. In order to provide a local context for the research, articles from the Courier Mail were sampled and teams in the National Rugby League (NRL) competition were the focus of the research. The study identified nearly 2000 articles referring to the NRL competition; 258 of those refer to off-field incidents involving athletes. The various types of behaviours reported include assault, sexual assault allegations, driving under the influence of alcohol, illicit drug use, breaches of club rules, and positive off-field activities (i.e., charitable activities). An experiment (Study 2) tested three news’ article stimuli developed from the behaviours identified in Study 1 in a between-subjects design. A measure of Identification with the Team was used as a covariate variable in the Multivariate Analysis of Covariance analysis. Social identity theory suggests that when an individual identifies with a group, their attitudes and behaviours towards both in- and out-group members are modified. Use of Identification with the Team as a covariate acknowledges that respondents will evaluate behaviours differently according to the attribution of those behaviours to an in- or out-group member. Findings of the research suggest that the news’ article stimuli have significant, large effects on evaluations of athlete off-field behaviour and athlete Likability. Consistent with pretest results, charitable fundraising is regarded as extremely positive; the athlete, correspondingly, is likable. Assault is evaluated as extremely negative, and the athlete as unlikable. DUI scores reveal that the athlete’s behaviour is very negative; however, the athlete’s likability was evaluated as neutral. Treatment group does not produce any significant effects on team or sponsor variables. This research also finds that Identification with the Team has significant, large effects on team variables (Attitude toward the Brand and Corporate Image). Identification also has a significant large effect on athlete Likability, but not on Attitude toward the Act. Identification with the Team does not produce any significant effects on sponsor variables. The results of this research suggest that sponsor’s consumer-based objectives are not threatened by newspaper reports linking athlete off-field behaviour with their brand. Evaluations of sponsor variables (Attitude toward the Sponsor’s Brand and Corporate Image) were consistently positive. Variance in that data, however, cannot be attributed to experimental stimuli or Identification with the Team. These results argue that respondents may regard sponsorships, in principle, as good. Although it is good news for sponsors that negative evaluations of athletes will not produce correspondingly negative evaluations of consumer-based sponsorship objectives, the results indicate problems for sponsorship managers. The failure of Identification with the Team to explain sponsor variable variance indicates that the sponsor has not been evaluated as a linked entity in a relationship with the sporting team and athlete in this research. This result argues that the sponsee-mediated affective communication path that sponsors aim use to communicate with desirable publics is not necessarily a path available to them.
Resumo:
Several randomized trials have found behavior change programs delivered via text messaging to be efficacious to improve preventive health behaviors such as physical activity and stopping smoking; however few have assessed its value in skin cancer prevention or early detection. The HealthyTexts study enrolled 678 participants 18–42 years, and assigned them to receive 21 text messages about skin cancer prevention, skin self-examination or physical activity(attention control) over the course of one year. Baseline data have been collected and outcomes will be assessed at three months and twelve months post intervention. The trial aims to increase the mean overall sun protection habits index score from 2.3 to 2.7 with a standard deviation of 0.5 (effect size of 0.5) and the proportion of people who conduct a whole-body skin self-examination by an absolute 10%. This paper describes the study design and participants' baseline characteristics. In addition, participants' goals for their health, and strategies they apply to achieve those goals are summarized.
Resumo:
The use of intelligent transport systems is proliferating across the Australian road network, particularly on major freeways. New technology allows a greater range of signs and messages to be displayed to drivers. While there has been a long history of human factors analyses of signage, no evaluation has been conducted on this novel, sometimes dynamic, signage or potential interactions when co-located. The purpose of this driving simulator study was to investigate drivers’ behavioural changes and comprehension resulting from the co-location of Lane Use Management Systems with static signs and (Enhanced) Variable Message Signs on Queensland motorways. A section of motorway was simulated, and nine scenarios were developed which presented a combination of signage cases across levels of driving task complexity. Two higher-risk road user groups were targeted for this research on an advanced driving simulator: older (65+ years, N=21) and younger (18-22 years, N=20) drivers. Changes in sign co-location and task complexity had small effect on driver comprehension of the signs and vehicle dynamics variables, including difference with the posted speed limit, headway, standard deviation of lane keeping and brake jerks. However, increasing the amount of information provided to drivers at a given location (by co-locating several signs) increased participants’ gaze duration on the signs. With co-location of signs and without added task complexity, a single gaze was over 2s for more than half of the population tested for both groups, and up to 6 seconds for some individuals.
Resumo:
Purpose – The purpose of this paper is to investigate information communications technologies (ICT)-mediated inclusion and exclusion in terms of sexuality through a study of a commercial social networking web site for gay men. Design/methodology/approach – The paper uses an approach based on technological inscription and the commodification of difference to study Gaydar, a commercial social networking site. Findings – Through the activities, events and interactions offered by Gaydar, the study identifies a series of contrasting identity constructions and market segmentations that are constructed through the cyclic commodification of difference. These are fuelled by a particular series of meanings attached to gay male sexualities which serve to keep gay men positioned as a niche market. Research limitations/implications – The research centres on the study of one, albeit widely used, web site with a very specific set of purposes. The study offers a model for future research on sexuality and ICTs. Originality/value – This study places sexuality centre stage in an ICT-mediated environment and provides insights into the contemporary phenomenon of social networking. As a sexualised object, Gaydar presents a semiosis of politicised messages that question heteronormativity while simultaneously contributing to the definition of an increasingly globalised, commercialised and monolithic form of gay male sexuality defined against ICT
Resumo:
Mechanisms of intervention and the contexts they are used in interact in complex ways. This helps explain why we can’t overgeneralize about what works in respect of models of service designed to prevent or respond to homelessness. This said there are some key messages from the totality of evidence that has been accumulated to date. First homelessness would be a lot easier to prevent for first or subsequent episodes if adequate and appropriate (developmentally/ culturally) housing was available. Second (and often dependent on the first) timely support of a particular character ‘works’ both in a preventive sense and in periods when people experience ongoing challenges which may render them vulnerable to further homelessness. This paper reflects on some of the critical features of how we can generate and use evidence, and how these complement each other in important ways.
Supporting transition to law school and student well-being : the role of professional legal identity
Resumo:
The empirically established decline in law student well being during the first year of law school is a red-flagged imprimatur for first year curriculum change. This article suggests that by engaging law students with the concept of a positive professional identity, student engagement and intrinsic motivation will increase because they are working towards a career goal that has meaning and purpose. Law school is a time of professional transformation and the legal academy can take steps to ensure that this transformation is inculcated with positive messages. Literature from the fields of law and psychology is analysed in this article, to explain how a positive conception of the legal profession (and a student’s future role within it) can increase a student’s psychological well-being – at law school and beyond.
Resumo:
The empirically established decline in law student well-being during the first year of law school is a red-flagged imprimatur for first year curriculum change. This article suggests that by engaging law students with the concept of a positive professional identity, student engagement and intrinsic motivation will increase because they are working towards a career goal that has meaning and purpose. Law school is a time of professional transformation and the legal academy can take steps to ensure that this transformation is inculcated with positive messages. Literature from the fields of law and psychology is analysed in this article, to explain how a positive conception of the legal profession (and a student’s future role within it) can increase a student’s psychological well-being – at law school and beyond.
Resumo:
While previous research clearly shows that handwashing with soap can prevent many serious illnesses and deaths among children in developing countries, handwashing rates remain low in countries like Kenya. This PhD study explored conditions needed for a successful handwashing with soap initiatives in primary schools in Kenya. It explored the use of puppetry as an approach in communicating hygiene messages as a form of interactive, community-driven method. The research considered a range of conditions that affect such interventions including infrastructure; hardware and software; policy that influence health programs; different actors who have a role to play; and factors affecting sustainability.
Resumo:
Dedicated Short Range Communication (DSRC) is the emerging key technology supporting cooperative road safety systems within Intelligent Transportation Systems (ITS). The DSRC protocol stack includes a variety of standards such as IEEE 802.11p and SAE J2735. The effectiveness of the DSRC technology depends on not only the interoperable cooperation of these standards, but also on the interoperability of DSRC devices manufactured by various manufacturers. To address the second constraint, the SAE defines a message set dictionary under the J2735 standard for construction of device independent messages. This paper focuses on the deficiencies of the SAE J2735 standard being developed for deployment in Vehicular Ad-hoc Networks (VANET). In this regard, the paper discusses the way how a Basic Safety Message (BSM) as the fundamental message type defined in SAE J2735 is constructed, sent and received by safety communication platforms to provide a comprehensive device independent solution for Cooperative ITS (C-ITS). This provides some insight into the technical knowledge behind the construction and exchange of BSMs within VANET. A series of real-world DSRC data collection experiments was conducted. The results demonstrate that the reliability and throughput of DSRC highly depend on the applications utilizing the medium. Therefore, an active application-dependent medium control measure, using a novel message-dissemination frequency controller, is introduced. This application level message handler improves the reliability of both BSM transmissions/receptions and the Application layer error handling which is extremely vital to decentralized congestion control (DCC) mechanisms.
Resumo:
The QUT Outdoor Worker Sun Protection (OWSP) project undertook a comprehensive applied health promotion project to demonstrate the effectiveness of sun protection measures which influence high risk outdoor workers in Queensland to adopt sun safe behaviours. The three year project (2010-2013) was driven by two key concepts: 1) The hierarchy of control, which is used to address risks in the workplace, advocates for six control measures that need to be considered in order of priority (refer to Section 3.4.2); and 2) the Ottawa Charter which recommends five action means to achieve health promotion (refer to Section 2.1). The project framework was underpinned by a participatory action research approach that valued peoples’ input, took advantage of existing skills and resources, and stimulated innovation (refer to Section 4.2). Fourteen workplaces (small and large) with a majority outdoor workforce were recruited across regional Queensland (Darling Downs, Northwest, Mackay and Cairns) from four industries types: 1) building and construction, 2) rural and farming, 3) local government, and 4) public sector. A workplace champion was identified at each workplace and was supported (through resource provision, regular contact and site visits) over a 14 to 18 month intervention period to make sun safety a priority in their workplace. Employees and employers were independently assessed for pre- and postintervention sun protection behaviours. As part of the intervention, an individualised sun safety action plan was developed in conjunction with each workplace to guide changes across six key strategy areas including: 1) Policy (e.g., adopt sun safety practices during all company events); 2) Structural and environmental (e.g., shade on worksites; eliminate or minimise reflective surfaces); 3) Personal protective equipment (PPE) (e.g., trial different types of sunscreens, or wide-brimmed hats); 4) Education and awareness (e.g., include sun safety in inductions and toolbox talks; send reminder emails or text messages to workers);5) Role modelling (e.g., by managers, supervisors, workplace champions and mentors); and 6) Skin examinations (e.g., allow time off work for skin checks). The participatory action process revealed that there was no “one size fits all” approach to sun safety in the workplace; a comprehensive, tailored approach was fundamental. This included providing workplaces with information, resources, skills, know how, incentives and practical help. For example, workplaces engaged in farming complete differing seasonal tasks across the year and needed to prepare for optimal sun safety of their workers during less labour intensive times. In some construction workplaces, long pants were considered a trip hazard and could not be used as part of a PPE strategy. Culture change was difficult to achieve and workplace champions needed guidance on the steps to facilitate this (e.g., influencing leaders through peer support, mentoring and role modelling). With the assistance of the project team the majority of workplaces were able to successfully implement the sun safety strategies contained within their action plans, up skilling them in the evidence for sun safety, how to overcome barriers, how to negotiate with all relevant parties and assess success. The most important enablers to the implementation of a successful action plan were a pro-active workplace champion, strong employee engagement, supportive management, the use of highly visual educational resources, and external support (provided by the project team through regular contact either directly through phone calls or indirectly through emails and e-newsletters). Identified barriers included a lack of time, the multiple roles of workplace champions, (especially among smaller workplaces), competing issues leading to a lack of priority for sun safety, the culture of outdoor workers, and costs or budgeting constraints. The level of sun safety awareness, knowledge, and sun protective behaviours reported by the workers increased between pre-and post-intervention. Of the nine sun protective behaviours that were assessed, the largest changes reported included a 26% increase in workers who “usually or always” wore a broad-brimmed hat, a 20% increase in the use of natural shade, a 19% increase in workers wearing long-sleeved collared shirts, and a 16% increase in workers wearing long trousers.
Resumo:
We have previously reported a preliminary taxonomy of patient error. However, approaches to managing patients' contribution to error have received little attention in the literature. This paper aims to assess how patients and primary care professionals perceive the relative importance of different patient errors as a threat to patient safety. It also attempts to suggest what these groups believe may be done to reduce the errors, and how. It addresses these aims through original research that extends the nominal group analysis used to generate the error taxonomy. Interviews were conducted with 11 purposively selected groups of patients and primary care professionals in Auckland, New Zealand, during late 2007. The total number of participants was 83, including 64 patients. Each group ranked the importance of possible patient errors identified through the nominal group exercise. Approaches to managing the most important errors were then discussed. There was considerable variation among the groups in the importance rankings of the errors. Our general inductive analysis of participants' suggestions revealed the content of four inter-related actions to manage patient error: Grow relationships; Enable patients and professionals to recognise and manage patient error; be Responsive to their shared capacity for change; and Motivate them to act together for patient safety. Cultivation of this GERM of safe care was suggested to benefit from 'individualised community care'. In this approach, primary care professionals individualise, in community spaces, population health messages about patient safety events. This approach may help to reduce patient error and the tension between personal and population health-care.
Resumo:
Anthropomorphism is a cognitive bias, which occurs when individuals see human characteristics in a non-human agent, object or animal. Anthropomorphism is especially interesting to marketers, because once anthropomorphic bias has been triggered, it can lead to a greater feeling of connectedness to a non-human agent (Tam, Lee and Chao, 2013), the emulation of behaviours (Aggarwal and McGill, 2012) or greater attribution of brand personality and brand liking (Delbaere, McQuarrie and Phillips, 2011). Importantly, research now shows that levels of this tendency vary between individuals (Waytz, Cacioppo and Epley, 2010), but research to date has failed to focus on how anthropomorphic tendency influences individual responses to marketing communications messages. Spokes-characters present an ideal context through which to examine this gap, given that they function as personified brands, designed to trigger consumer anthropomorphic tendency. Further, little is understood about how spokes-characters operate and which consumers will prefer them to their human counterparts. Like anthropomorphic research, much empirical work to date has focused on design and outcomes, examining the sender’s encoding process and the feedback generated, but ignoring the individual decoding process that is so important to understanding individual differences and message effectiveness. The current research employs three experiments using an online survey with stimulus exposure to show that anthropomorphic tendency, personality similarity and spokes-character type all have relevance to the understanding of this complex relationship. Study one and two indicate that while a human spokesperson is still preferred by many, higher levels of anthropomorphic tendency increase likeability of cartoon spokes characters. Study three highlights the importance of personality similarity, which further increases likability. Additional analyses provide key findings concerning the nature of anthropomorphic tendency as an individual difference and trait. This research contributes to a greater understanding of anthropomorphism theory and fills existing gaps in the consumer psychology and marketing communications literature.
Resumo:
Streamciphers are common cryptographic algorithms used to protect the confidentiality of frame-based communications like mobile phone conversations and Internet traffic. Streamciphers are ideal cryptographic algorithms to encrypt these types of traffic as they have the potential to encrypt them quickly and securely, and have low error propagation. The main objective of this thesis is to determine whether structural features of keystream generators affect the security provided by stream ciphers.These structural features pertain to the state-update and output functions used in keystream generators. Using linear sequences as keystream to encrypt messages is known to be insecure. Modern keystream generators use nonlinear sequences as keystream.The nonlinearity can be introduced through a keystream generator's state-update function, output function, or both. The first contribution of this thesis relates to nonlinear sequences produced by the well-known Trivium stream cipher. Trivium is one of the stream ciphers selected in a final portfolio resulting from a multi-year project in Europe called the ecrypt project. Trivium's structural simplicity makes it a popular cipher to cryptanalyse, but to date, there are no attacks in the public literature which are faster than exhaustive keysearch. Algebraic analyses are performed on the Trivium stream cipher, which uses a nonlinear state-update and linear output function to produce keystream. Two algebraic investigations are performed: an examination of the sliding property in the initialisation process and algebraic analyses of Trivium-like streamciphers using a combination of the algebraic techniques previously applied separately by Berbain et al. and Raddum. For certain iterations of Trivium's state-update function, we examine the sets of slid pairs, looking particularly to form chains of slid pairs. No chains exist for a small number of iterations.This has implications for the period of keystreams produced by Trivium. Secondly, using our combination of the methods of Berbain et al. and Raddum, we analysed Trivium-like ciphers and improved on previous on previous analysis with regards to forming systems of equations on these ciphers. Using these new systems of equations, we were able to successfully recover the initial state of Bivium-A.The attack complexity for Bivium-B and Trivium were, however, worse than exhaustive keysearch. We also show that the selection of stages which are used as input to the output function and the size of registers which are used in the construction of the system of equations affect the success of the attack. The second contribution of this thesis is the examination of state convergence. State convergence is an undesirable characteristic in keystream generators for stream ciphers, as it implies that the effective session key size of the stream cipher is smaller than the designers intended. We identify methods which can be used to detect state convergence. As a case study, theMixer streamcipher, which uses nonlinear state-update and output functions to produce keystream, is analysed. Mixer is found to suffer from state convergence as the state-update function used in its initialisation process is not one-to-one. A discussion of several other streamciphers which are known to suffer from state convergence is given. From our analysis of these stream ciphers, three mechanisms which can cause state convergence are identified.The effect state convergence can have on stream cipher cryptanalysis is examined. We show that state convergence can have a positive effect if the goal of the attacker is to recover the initial state of the keystream generator. The third contribution of this thesis is the examination of the distributions of bit patterns in the sequences produced by nonlinear filter generators (NLFGs) and linearly filtered nonlinear feedback shift registers. We show that the selection of stages used as input to a keystream generator's output function can affect the distribution of bit patterns in sequences produced by these keystreamgenerators, and that the effect differs for nonlinear filter generators and linearly filtered nonlinear feedback shift registers. In the case of NLFGs, the keystream sequences produced when the output functions take inputs from consecutive register stages are less uniform than sequences produced by NLFGs whose output functions take inputs from unevenly spaced register stages. The opposite is true for keystream sequences produced by linearly filtered nonlinear feedback shift registers.