{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T08:54:17Z","timestamp":1766048057050},"publisher-location":"New York, NY","reference-count":11,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9780387973173"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/0-387-34805-0_56","type":"book-chapter","created":{"date-parts":[[2007,11,8]],"date-time":"2007-11-08T21:05:53Z","timestamp":1194555953000},"page":"612-615","source":"Crossref","is-referenced-by-count":48,"title":["Good S-Boxes Are Easy To Find"],"prefix":"10.1007","author":[{"given":"Carlisle","family":"Adams","sequence":"first","affiliation":[]},{"given":"Stafford","family":"Tavares","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"56_CR1","unstructured":"C. M. Adams and S. E. Tavares, A Note on the Generation and Counting of Bent Sequences, tech. rep., Department of Electrical Engineering, Queens\u2019s University, July 1989 (submitted to IEEE Transactions on Information Theory)."},{"key":"56_CR2","unstructured":"\u2014, The Structured Design of Cryptographically Good S-Boxes, tech. rep., Department of Electrical Engineering, Queens\u2019s University, Mar. 1989 (submitted to the Journal of Cryptology)."},{"key":"56_CR3","doi-asserted-by":"crossref","unstructured":"D. K. Branstad, J. Gait, and S. Katzke, Report of the workshop on cryptography in support of computer security, Tech. Rep. NBSIR 77-1291, National Bureau of Standards, Sept 1976.","DOI":"10.6028\/NBS.IR.77-1291"},{"key":"56_CR4","first-page":"3","volume-title":"Advances in Cryptology: Proc. of CRYPTO\u2019 86","author":"E. F. Brickell","year":"1987","unstructured":"E. F. Brickell, J. H. Moore, and M. R. Purtill, Structure in the S-boxes of the DES (extended abstract), in Advances in Cryptology: Proc. of CRYPTO\u2019 86, Springer-Verlag, Berlin, 1987, pp. 3\u20138."},{"key":"56_CR5","doi-asserted-by":"publisher","first-page":"1545","DOI":"10.1109\/PROC.1975.10005","volume":"63","author":"H. Feistel","year":"1975","unstructured":"H. Feistel, W. Notz, and J. L. Smith, Some Cryptographic Techniques for Machine-to-Machine Data Communications, Proceedings of the IEEE, 63 (1975), pp. 1545\u20131554.","journal-title":"Proceedings of the IEEE"},{"key":"56_CR6","volume-title":"Advances in Cryptology: Proc. of CRYPTO\u2019 88","author":"R. Forre","year":"1989","unstructured":"R. Forre, The Strict Avalanche Criterion: Spectral Properties of Boolean Functions and an Extended Definition, in Advances in Cryptology: Proc. of CRYPTO\u2019 88, Springer-Verlag, Berlin, 1989."},{"key":"56_CR7","unstructured":"W. Meier and O. Staffelbach, Nonlinearity Criteria for Cryptographic Functions, in Advances in Cryptology: Proc. of EUROCRYPT\u2019 89, to appear."},{"key":"56_CR8","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1049\/ip-e.1988.0044","volume":"135","author":"J. Pieprzyk","year":"1988","unstructured":"J. Pieprzyk and G. Finkelstein, Towards effective nonlinear cryptosystem design, TEE Proceedings, Part E: Computers and Digital Techniques, 135 (1988), pp. 325\u2013335.","journal-title":"Proceedings, Part E: Computers and Digital Techniques"},{"issue":"A","key":"56_CR9","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1016\/0097-3165(76)90024-8","volume":"20","author":"O. S. Rothaus","year":"1976","unstructured":"O. S. Rothaus, On \u2018Bent\u2019 Functions, Journal of Combinatorial Theory, 20(A) (1976), pp. 300\u2013305.","journal-title":"Journal of Combinatorial Theory"},{"key":"56_CR10","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-82865-2","volume-title":"Analysis and Design of Stream Ciphers","author":"R. A. Rueppel","year":"1986","unstructured":"R. A. Rueppel, Analysis and Design of Stream Ciphers, Springer-Verlag, Heidelberg and New York, 1986."},{"key":"56_CR11","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1007\/3-540-39799-X_41","volume-title":"Advances in Cryptology: Proc. of CRYPTO\u2019 85","author":"A. F. Webster","year":"1986","unstructured":"A. F. Webster and S. E. Tavares, On the Design of S-Boxes, in Advances in Cryptology: Proc. of CRYPTO\u2019 85, Springer-Verlag, Berlin, 1986, pp. 523\u2013534."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO\u2019 89 Proceedings"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-387-34805-0_56.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T01:28:32Z","timestamp":1619486912000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-387-34805-0_56"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387973173"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/0-387-34805-0_56","relation":{},"subject":[]}}