{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T20:56:47Z","timestamp":1770065807748,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":41,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540374329","type":"print"},{"value":"9783540374336","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11818175_35","type":"book-chapter","created":{"date-parts":[[2006,9,23]],"date-time":"2006-09-23T02:21:52Z","timestamp":1158978112000},"page":"584-601","source":"Crossref","is-referenced-by-count":27,"title":["On the Higher Order Nonlinearities of Algebraic Immune Functions"],"prefix":"10.1007","author":[{"given":"Claude","family":"Carlet","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"35_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/978-3-540-25937-4_5","volume-title":"Fast Software Encryption","author":"F. Armknecht","year":"2004","unstructured":"Armknecht, F.: Improving Fast Algebraic Attacks. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol.\u00a03017, pp. 65\u201382. Springer, Heidelberg (2004)"},{"key":"35_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/11761679_10","volume-title":"Advances in Cryptology - EUROCRYPT 2006","author":"F. Armknecht","year":"2006","unstructured":"Armknecht, F., Carlet, C., Gaborit, P., K\u00fcnzli, S., Meier, W., Ruatta, O.: Efficient computation of algebraic immunity for algebraic and fast algebraic attacks. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol.\u00a04004, pp. 147\u2013164. Springer, Heidelberg (2006)"},{"key":"#cr-split#-35_CR3.1","doi-asserted-by":"crossref","unstructured":"Braeken, A., Preneel, B.: On the Algebraic Immunity of Symmetric Boolean Functions. Indocrypt, LNCS, vol.3797, pp. 35\u201348 (2005);","DOI":"10.1007\/11596219_4"},{"key":"#cr-split#-35_CR3.2","unstructured":"Some false results of this reference have been corrected in Braeken\u2019s PhD thesis entitled Cryptographic properties of Boolean functions and S-boxes (2005), available at: http:\/\/homes.esat.kuleuven.be\/~abraeken\/thesisAn.pdf"},{"key":"35_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1007\/11779360_10","volume-title":"Coding and Cryptography","author":"A. Canteaut","year":"2006","unstructured":"Canteaut, A.: Open problems related to algebraic attacks on stream ciphers. In: Ytrehus, \u00d8. (ed.) WCC 2005. LNCS, vol.\u00a03969, pp. 120\u2013134. Springer, Heidelberg (2006)"},{"key":"35_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1007\/3-540-45539-6_40","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"A. Canteaut","year":"2000","unstructured":"Canteaut, A., Trabbia, M.: Improved fast correlation attacks using parity-check equations of weight 4 and 5. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 573\u2013588. Springer, Heidelberg (2000)"},{"key":"35_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11617983_1","volume-title":"Applied Algebra, Algebraic Algorithms and Error-Correcting Codes","author":"C. Carlet","year":"2006","unstructured":"Carlet, C.: On bent and highly nonlinear balanced\/Resilient functions and their algebraic immunities. In: Fossorier, M.P.C., Imai, H., Lin, S., Poli, A. (eds.) AAECC 2006. LNCS, vol.\u00a03857, pp. 1\u201328. Springer, Heidelberg (2006)"},{"key":"35_CR7","series-title":"Chapter of the monography","volume-title":"Boolean Methods and Models","author":"C. Carlet","year":"2006","unstructured":"Carlet, C.: Boolean Functions for Cryptography and Error Correcting Codes. In: Crama, Y., Hammer, P. (eds.) Boolean Methods and Models. Chapter of the monography, Cambridge University Press, Cambridge (to appear, 2006), Preliminary version available at: http:\/\/www-rocq.inria.fr\/codes\/Claude.Carlet\/pubs.html"},{"key":"35_CR8","doi-asserted-by":"crossref","unstructured":"Carlet, C., Dalai, D., Gupta, K., Maitra, S.: Algebraic Immunity for Cryptographically Significant Boolean Functions: Analysis and Construction. IEEE Transactions on Information Theory\u00a052(7) (July 2006) (to appear)","DOI":"10.1109\/TIT.2006.876253"},{"key":"35_CR9","doi-asserted-by":"crossref","unstructured":"Carlet, C., Gaborit, P.: On the construction of balanced Boolean functions with a good algebraic immunity. In: Proceedings of BFCA (First Workshop on Boolean Functions: Cryptography and Applications), Rouen, France, March 2005, pp. 1\u201314 (2005)","DOI":"10.1109\/ISIT.2005.1523510"},{"key":"35_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1007\/11863854_32","volume-title":"Sequences and Their Applications \u2013 SETA 2006","author":"C. Carlet","year":"2006","unstructured":"Carlet, C., Guillot, P., Mesnager, S.: On Immunity Profile of Boolean Functions. In: Gong, G., Helleseth, T., Song, H.-Y., Yang, K. (eds.) SETA 2006. LNCS, vol.\u00a04086, pp. 364\u2013375. Springer, Heidelberg (2006)"},{"key":"35_CR11","doi-asserted-by":"crossref","unstructured":"Carlet, C., Mesnager, S.: Improving the upper bounds on the covering radii of binary Reed-Muller codes. IEEE Transactions on Information Theory (to appear, 2006)","DOI":"10.1109\/ISIT.2005.1523446"},{"key":"35_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1007\/BFb0053450","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"F. Chabaud","year":"1995","unstructured":"Chabaud, F., Vaudenay, S.: Links between Differential and Linear Cryptanalysis. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 356\u2013365. Springer, Heidelberg (1995)"},{"key":"35_CR13","volume-title":"Covering codes","author":"G. Cohen","year":"1997","unstructured":"Cohen, G., Honkala, I., Litsyn, S., Lobstein, A.: Covering codes. North-Holland, Amsterdam (1997)"},{"key":"35_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1007\/3-540-36552-4_13","volume-title":"Information Security and Cryptology - ICISC 2002","author":"N.T. Courtois","year":"2003","unstructured":"Courtois, N.T.: Higher order correlation attacks, XL algorithm and cryptanalysis of toyocrypt. In: Lee, P.J., Lim, C.H. (eds.) ICISC 2002. LNCS, vol.\u00a02587, pp. 182\u2013199. Springer, Heidelberg (2003)"},{"key":"35_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1007\/3-540-39200-9_21","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"N. Courtois","year":"2003","unstructured":"Courtois, N., Meier, W.: Algebraic attacks on stream ciphers with linear feedback. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656, pp. 345\u2013359. Springer, Heidelberg (2003)"},{"key":"35_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/978-3-540-45146-4_11","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"N.T. Courtois","year":"2003","unstructured":"Courtois, N.T.: Fast algebraic attacks on stream ciphers with linear feedback. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 176\u2013194. Springer, Heidelberg (2003)"},{"key":"35_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1007\/978-3-540-30556-9_9","volume-title":"Progress in Cryptology - INDOCRYPT 2004","author":"D.K. Dalai","year":"2004","unstructured":"Dalai, D.K., Gupta, K.C., Maitra, S.: Results on Algebraic Immunity for Cryptographically Significant Boolean Functions. In: Canteaut, A., Viswanathan, K. (eds.) INDOCRYPT 2004. LNCS, vol.\u00a03348, pp. 92\u2013106. Springer, Heidelberg (2004)"},{"key":"35_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/11502760_7","volume-title":"Fast Software Encryption","author":"D.K. Dalai","year":"2005","unstructured":"Dalai, D.K., Gupta, K.C., Maitra, S.: Cryptographically Significant Boolean Functions: Construction and Analysis in Terms of Algebraic Immunity. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol.\u00a03557, pp. 98\u2013111. Springer, Heidelberg (2005)"},{"key":"35_CR19","unstructured":"Dalai, D.K., Maitra, S., Sarkar, S.: Basic Theory in Construction of Boolean Functions with Maximum Possible Annihilator Immunity. Cryptology ePrint Archive No,15\/229, (July 2005). To be published in Designs, Codes and Cryptography (2005), http:\/\/eprint.iacr.org\/"},{"key":"35_CR20","unstructured":"Dalai, D.K., Gupta, K.C., Maitra, S.: Notion of algebraic immunity and its evaluation related to fast algebraic attacks. Paper,2006\/018, http:\/\/eprint.iacr.org\/"},{"key":"35_CR21","doi-asserted-by":"crossref","unstructured":"Didier, F.: A new upper bound on the block error probability after decoding over the erasure channel. Preprint A revised version will appear in IEEE Transactions on Information Theory (2006), available at: http:\/\/www-rocq.inria.fr\/codes\/Frederic.Didier\/","DOI":"10.1109\/TIT.2006.881719"},{"key":"35_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"586","DOI":"10.1007\/3-540-46885-4_56","volume-title":"Advances in Cryptology - EUROCRYPT \u201989","author":"R. Forr\u00e9","year":"1990","unstructured":"Forr\u00e9, R.: A fast correlation attack on nonlinearly feed-forward filtered shift-register sequences. In: Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol.\u00a0434, pp. 586\u2013595. Springer, Heidelberg (1990)"},{"key":"35_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"268","DOI":"10.1007\/3-540-68339-9_24","volume-title":"Advances in Cryptology - EUROCRYPT \u201996","author":"J.D.. Goli\u0107","year":"1996","unstructured":"Goli\u0107, J.D.: Fast low order approximation of cryptographic functions. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol.\u00a01070, pp. 268\u2013282. Springer, Heidelberg (1996)"},{"key":"35_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"390","DOI":"10.1007\/978-3-540-28628-8_24","volume-title":"Advances in Cryptology \u2013 CRYPTO 2004","author":"P. Hawkes","year":"2004","unstructured":"Hawkes, P., Rose, G.G.: Rewriting Variables: The Complexity of Fast Algebraic Attacks on Stream Ciphers. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol.\u00a03152, pp. 390\u2013406. Springer, Heidelberg (2004)"},{"key":"35_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/978-3-540-48000-6_7","volume-title":"Advances in Cryptology - ASIACRYPT\u201999","author":"T. Iwata","year":"1999","unstructured":"Iwata, T., Kurosawa, K.: Probabilistic higher order differential attack and higher order bent functions. In: Lam, K.-Y., Okamoto, E., Xing, C. (eds.) ASIACRYPT 1999. LNCS, vol.\u00a01716, pp. 62\u201374. Springer, Heidelberg (1999)"},{"key":"35_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1007\/3-540-60590-8_16","volume-title":"Truncated and higher order differentials. Fast Software Encryption","author":"L.R. Knudsen","year":"1995","unstructured":"Knudsen, L.R.: Truncated and higher order differentials. Fast Software Encryption. Second International Workshop. LNCS, vol.\u00a01008, pp. 196\u2013211. Springer, Heidelberg (1995)"},{"key":"35_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1007\/3-540-68339-9_20","volume-title":"Advances in Cryptology - EUROCRYPT \u201996","author":"L.R. Knudsen","year":"1996","unstructured":"Knudsen, L.R., Robshaw, M.J.B.: Non-linear approximations in linear cryptanalysis. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol.\u00a01070, pp. 224\u2013236. Springer, Heidelberg (1996)"},{"key":"35_CR28","doi-asserted-by":"crossref","unstructured":"Lai, X.: Higher order derivatives and differential cryptanalysis. In: Proc. Symposium on Communication, Coding and Cryptography, in honor of J. L. Massey on the occasion of his 60\u2019th birthday (1994)","DOI":"10.1007\/978-1-4615-2694-0_23"},{"issue":"4","key":"35_CR29","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1007\/s00145-001-0010-y","volume":"14","author":"K. Kurosawa","year":"2001","unstructured":"Kurosawa, K., Johansson, T., Stinson, D.: Almost k-wise independent sample spaces and their applications. J. of Cryptology\u00a014(4), 231\u2013253 (2001)","journal-title":"J. of Cryptology"},{"key":"35_CR30","unstructured":"Lobanov, M.: Tight bound between nonlinearity and algebraic immunity. Paper, 2005\/441, http:\/\/eprint.iacr.org\/"},{"key":"35_CR31","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/TIT.1969.1054260","volume":"15","author":"J.L. Massey","year":"1969","unstructured":"Massey, J.L.: Shift-register synthesis and BCH decoding. IEEE Transactions on Information Theory\u00a015, 122\u2013127 (1969)","journal-title":"IEEE Transactions on Information Theory"},{"key":"35_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"M. Matsui","year":"1994","unstructured":"Matsui, M.: Linear cryptanalysis method for DES cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 386\u2013397. Springer, Heidelberg (1994)"},{"key":"35_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"458","DOI":"10.1007\/3-540-46416-6_39","volume-title":"Advances in Cryptology - EUROCRYPT \u201991","author":"U.M. Maurer","year":"1991","unstructured":"Maurer, U.M.: New approaches to the design of self-synchronizing stream ciphers. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol.\u00a0547, pp. 458\u2013471. Springer, Heidelberg (1991)"},{"key":"35_CR34","series-title":"Series on Discrete Mathematics and Its Applications","doi-asserted-by":"publisher","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Cryptography","author":"A. Menezes","year":"1996","unstructured":"Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. Series on Discrete Mathematics and Its Applications. CRC Press, Boca Raton (1996)"},{"key":"35_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/BFb0032354","volume-title":"Cryptography: Policy and Algorithms","author":"W. Millan","year":"1996","unstructured":"Millan, W.: Low order approximation of cipher functions. In: Dawson, E.P., Goli\u0107, J.D. (eds.) Cryptography: Policy and Algorithms 1995. LNCS, vol.\u00a01029, pp. 144\u2013155. Springer, Heidelberg (1996)"},{"key":"35_CR36","volume-title":"The theory of error-correcting codes","author":"F.J. MacWilliams","year":"1977","unstructured":"MacWilliams, F.J., Sloane, N.J.: The theory of error-correcting codes. North-Holland, Amsterdam (1977)"},{"key":"35_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1007\/978-3-540-24676-3_28","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"W. Meier","year":"2004","unstructured":"Meier, W., Pasalic, E., Carlet, C.: Algebraic Attacks and Decomposition of Boolean Functions. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 474\u2013491. Springer, Heidelberg (2004)"},{"key":"35_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"549","DOI":"10.1007\/3-540-46885-4_53","volume-title":"Advances in Cryptology - EUROCRYPT \u201989","author":"W. Meier","year":"1990","unstructured":"Meier, W., Staffelbach, O.: Nonlinearity Criteria for Cryptographic Functions. In: Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol.\u00a0434, pp. 549\u2013562. Springer, Heidelberg (1990)"},{"key":"35_CR39","doi-asserted-by":"crossref","unstructured":"Rueppel, R.A.: Analysis and design of stream ciphers, Berlin, Heidelberg, NY, London, Paris, Tokyo. Com. and Contr. Eng. Series (1986)","DOI":"10.1007\/978-3-642-82865-2"},{"key":"35_CR40","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C.E. Shannon","year":"1949","unstructured":"Shannon, C.E.: Communication theory of secrecy systems. Bell system technical journal\u00a028, 656\u2013715 (1949)","journal-title":"Bell system technical journal"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology - CRYPTO 2006"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11818175_35.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T15:16:14Z","timestamp":1605626174000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11818175_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540374329","9783540374336"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/11818175_35","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006]]}}}