{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:34:49Z","timestamp":1725543289299},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540354376"},{"type":"electronic","value":"9783540354383"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11767480_29","type":"book-chapter","created":{"date-parts":[[2006,7,4]],"date-time":"2006-07-04T01:21:27Z","timestamp":1151976087000},"page":"421-432","source":"Crossref","is-referenced-by-count":2,"title":["Results on Almost Resilient Functions"],"prefix":"10.1007","author":[{"given":"Pinhui","family":"Ke","sequence":"first","affiliation":[]},{"given":"Jie","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Qiaoyan","family":"Wen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"29_CR1","first-page":"396","volume":"26","author":"B. Chor","year":"1985","unstructured":"Chor, B., Goldreich, O., H\u00e5stad, J., Friedman, J., Rudich, S., Smoledsky, R.: The bit extraction problem or t-resilient functions. IEEE Symp. on Foundations of Computer Science\u00a026, 396\u2013407 (1985)","journal-title":"IEEE Symp. on Foundations of Computer Science"},{"issue":"4","key":"29_CR2","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/s00145-001-0010-y","volume":"14","author":"K. Kurosawa","year":"2001","unstructured":"Kurosawa, K., Johansson, T., Stinson, D.: Almost k-wise independent sample spaces and their applications. J.Cryptology\u00a014(4), 231\u2013253 (2001)","journal-title":"J.Cryptology"},{"key":"29_CR3","doi-asserted-by":"publisher","first-page":"838","DOI":"10.1137\/0222053","volume":"22","author":"J. Naor","year":"1993","unstructured":"Naor, J., Naor, M.: Small bias probality spaces:efficient constructions and applications. SIAM Journal on Computing\u00a022, 838\u2013856 (1993)","journal-title":"SIAM Journal on Computing"},{"issue":"1","key":"29_CR4","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1109\/TIT.2004.839524","volume":"51","author":"K.C. Gupta","year":"2005","unstructured":"Gupta, K.C., Sarkar, P.: Improved construction of nonlinear resilient S - Boxes. IEEE Tran. on Info. Theory\u00a051(1), 339\u2013348 (2005)","journal-title":"IEEE Tran. on Info. Theory"},{"key":"29_CR5","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1016\/0022-0000(81)90033-7","volume":"22","author":"M.N. Wegman","year":"1981","unstructured":"Wegman, M.N., Carter, J.L.: New hash functions and their use in authentication and set equality. Journal of Computer and System Sciences\u00a022, 265\u2013279 (1981)","journal-title":"Journal of Computer and System Sciences"},{"issue":"11","key":"29_CR6","doi-asserted-by":"publisher","first-page":"2752","DOI":"10.1109\/TIT.2004.836684","volume":"50","author":"K. Kurosawa","year":"2004","unstructured":"Kurosawa, K., Matsumoto, R.: Almost security of cryptographic Boolean functions. IEEE Tran. on Info. Theory\u00a050(11), 2752\u20132761 (2004)","journal-title":"IEEE Tran. on Info. Theory"},{"key":"29_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1007\/11599371_20","volume-title":"Cryptology and Network Security","author":"P.-H. Ke","year":"2005","unstructured":"Ke, P.-H., Liu, T.-L., Wen, Q.-Y.: Constructions of Almost Resilient Functions. In: Desmedt, Y.G., Wang, H., Mu, Y., Li, Y. (eds.) CANS 2005. LNCS, vol.\u00a03810, pp. 236\u2013246. Springer, Heidelberg (2005)"},{"key":"29_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/BFb0023289","volume-title":"Information Security and Privacy","author":"C. Wu","year":"1996","unstructured":"Wu, C., Dawson, E.: On construction of resilient functions. In: Pieprzyk, J.P., Seberry, J. (eds.) ACISP 1996. LNCS, vol.\u00a01172, pp. 79\u201386. Springer, Heidelberg (1996)"},{"issue":"5","key":"29_CR9","doi-asserted-by":"publisher","first-page":"1740","DOI":"10.1109\/18.623184","volume":"43","author":"X. Zhang","year":"1997","unstructured":"Zhang, X., Zheng, Y.: Cryptographically resilient functions. IEEE Tran. on Info. theory\u00a043(5), 1740\u20131747 (1997)","journal-title":"IEEE Tran. on Info. theory"},{"key":"29_CR10","doi-asserted-by":"publisher","first-page":"569","DOI":"10.1109\/18.6037","volume":"34","author":"G. Xiao","year":"1988","unstructured":"Xiao, G., Massey, J.: A special characterization of correlation immune combining functions. IEEE Tran. on Info. theory\u00a034, 569\u2013571 (1988)","journal-title":"IEEE Tran. on Info. theory"},{"unstructured":"Yan, Y., Lin, X.: Coding theory and cryptography. People post and telecomunication publisher (1992) (in chinese)","key":"29_CR11"}],"container-title":["Lecture Notes in Computer Science","RoboCup 2005: Robot Soccer World Cup IX"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11767480_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,11]],"date-time":"2019-03-11T22:08:22Z","timestamp":1552342102000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11767480_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540354376","9783540354383"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/11767480_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}