{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T19:33:21Z","timestamp":1766086401101},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540677420"},{"type":"electronic","value":"9783540450306"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/10718964_20","type":"book-chapter","created":{"date-parts":[[2006,12,29]],"date-time":"2006-12-29T16:04:09Z","timestamp":1167408249000},"page":"242-254","source":"Crossref","is-referenced-by-count":40,"title":["Two-Stage Optimisation in the Design of Boolean Functions"],"prefix":"10.1007","author":[{"given":"John A","family":"Clark","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jeremy L","family":"Jacob","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"issue":"4","key":"20_CR1","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1080\/0161-119391868033","volume":"XVII","author":"W.S. Forsyth","year":"1993","unstructured":"Forsyth, W.S., Safavi-Naini, R.: Automated Cryptanalysis of Substitution Ciphers. Cryptologia\u00a0XVII(4), 407\u2013418 (1993)","journal-title":"Cryptologia"},{"key":"20_CR2","doi-asserted-by":"crossref","unstructured":"Giddy, J.P., Safavi-Naini, R.: Automated Cryptanalysis of Transposition Ciphers. The Computer Journal\u00a04(XVII) (1994)","DOI":"10.1093\/comjnl\/37.5.429"},{"issue":"3","key":"20_CR3","first-page":"354","volume":"43","author":"X.-D. Hou","year":"1983","unstructured":"Hou, X.-D.: On the Norm and Covering Radius of First-order Reed Muller Codes. IEEE Transactions on Information Theory\u00a043(3), 354\u2013356 (1983)","journal-title":"IEEE Transactions on Information Theory"},{"key":"20_CR4","doi-asserted-by":"crossref","unstructured":"Kirkpatrick, S., Gelatt Jr., C.D., Vecchi, M.P.: Optimization by Simulated Annealing. Science, 671\u2013680 (May 1993)","DOI":"10.1126\/science.220.4598.671"},{"key":"20_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1007\/3-540-48910-X_25","volume-title":"Advances in Cryptology - EUROCRYPT \u201999","author":"L.R. Knudsen","year":"1999","unstructured":"Knudsen, L.R., Meier, W.: Cryptanalysis of an Identification Scheme Based on the Permuted Perceptron Problem. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol.\u00a01592, pp. 363\u2013374. Springer, Heidelberg (1999)"},{"key":"20_CR6","doi-asserted-by":"crossref","unstructured":"Mathews, R.A.J.: The Use of Genetic Algorithms in Cryptanalysis. Cryptologia\u00a0(XVII)2, 187\u2013201 (1993)","DOI":"10.1080\/0161-119391867863"},{"key":"20_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1007\/BFb0028471","volume-title":"Proceedings of the First International Conference on Information and Communications Security","author":"W. Millan","year":"1997","unstructured":"Millan, W., Clark, A., Dawson, E.: An Effective Genetic Algorithm for Finding Highly Non-linear Boolean Functions. In: Proceedings of the First International Conference on Information and Communications Security. LNCS, vol.\u00a01334, pp. 149\u2013158. Springer, Heidelberg (1997)"},{"key":"20_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1007\/BFb0054148","volume-title":"Advances in Cryptology - EUROCRYPT \u201998","author":"W. Millan","year":"1998","unstructured":"Millan, W., Clark, A., Dawson, E.: Heuristic Design of Cryptographically Strong Balanced Boolean Functions. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol.\u00a01403, pp. 489\u2013499. Springer, Heidelberg (1998)"},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"Millan, W., Clark, A., Dawson, E.: Boolean Function Design Using Hill-climbing Methods. In: Australian Conference on Information Security and Privacy (ACISP), pp. 1\u201311 (1999)","DOI":"10.1007\/3-540-48970-3_1"},{"key":"20_CR10","unstructured":"National Bureau of Standards. NBS FIPS PUB 46. Data Encryption Standard (1976)"},{"issue":"3","key":"20_CR11","first-page":"1025","volume":"29","author":"N.J. Patterson","year":"1997","unstructured":"Patterson, N.J., Weidermann, D.H.: The Covering Radius of the (215, 16) Reed-Muller Code is at Least 16276. IEEE Transactions on Information Theory\u00a029(3), 1025\u20131027 (1997)","journal-title":"IEEE Transactions on Information Theory"},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"Spillman, R., Janssen, M., Nelson, B., Kepner, M.: The Use of A Genetic Algorithm in the Cryptanalysis of Simple Substitution Ciphers. Cryptologia\u00a0(XVII)1, 187\u2013201 (1993)","DOI":"10.1080\/0161-119391867746"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/10718964_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,23]],"date-time":"2019-04-23T07:42:04Z","timestamp":1556005324000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/10718964_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540677420","9783540450306"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/10718964_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2000]]}}}