{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:56:57Z","timestamp":1725487017516},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540002635"},{"type":"electronic","value":"9783540362319"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-36231-2_19","type":"book-chapter","created":{"date-parts":[[2007,7,2]],"date-time":"2007-07-02T15:21:45Z","timestamp":1183389705000},"page":"234-245","source":"Crossref","is-referenced-by-count":7,"title":["Construction of Cryptographically Important Boolean Functions"],"prefix":"10.1007","author":[{"given":"Soumen","family":"Maity","sequence":"first","affiliation":[]},{"given":"Thomas","family":"Johansson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,12,18]]},"reference":[{"issue":"1","key":"19_CR1","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E. Biham","year":"1991","unstructured":"Biham, E. and Shamir, A., Differential cryptanalysis of DES-like cryptosystems., Journal of Cryptology Vol 4, No. 1, 1991, 3\u201372.","journal-title":"Journal of Cryptology"},{"key":"19_CR2","unstructured":"Carlet, C. and Ding, C., Highly nonlinear mappings. Email: Claude.Carlet@inria.fr (C. Carlet), cding@cs.ust.hk (C. Ding). 238"},{"issue":"7","key":"19_CR3","doi-asserted-by":"publisher","first-page":"1825","DOI":"10.1109\/TIT.2002.1013128","volume":"48","author":"S. Maitra","year":"2002","unstructured":"Maitra, S. and Pasalic, E., Further construction of resilient Boolean functions with very high nonlinearity. IEEE Trans. on Information Theory, Vol 48, No. 7, July 2002, 1825\u20131834.","journal-title":"IEEE Trans. on Information Theory"},{"key":"19_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume-title":"Advances in Cryptology-EUROCRYPT 1993","author":"M. Matsui","year":"1994","unstructured":"Matsui, M., Linear cryptanalysis method for DES cipher. Advances in Cryptology-EUROCRYPT 1993, LNCS 765, 1994, pp. 386\u2013397."},{"key":"19_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1007\/3-540-46416-6_32","volume-title":"Advances in Cryptology-EUROCRYPT 1991","author":"K. Nyberg","year":"1992","unstructured":"Nyberg, K., Perfect non-linear S-boxes. Advances in Cryptology-EUROCRYPT 1991, LNCS 547, 1992, pp. 378\u2013386."},{"key":"19_CR6","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1016\/0097-3165(76)90024-8","volume":"20","author":"O. S. Rothaus","year":"1976","unstructured":"Rothaus, O. S., On bent functions, J. Combin. Theory, Ser. A 20, 1976, 300\u2013305.","journal-title":"J. Combin. Theory, Ser. A"},{"key":"19_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1007\/3-540-44598-6_32","volume-title":"CRYPTO 2000","author":"P. Sarkar","year":"2000","unstructured":"Sarkar, P. and Maitra, S., Nonlinearity bounds and constructions of resilient Boolean functions. CRYPTO 2000, LNCS 1880, 2000, pp. 515\u2013532."},{"issue":"5","key":"19_CR8","doi-asserted-by":"publisher","first-page":"776","DOI":"10.1109\/TIT.1984.1056949","volume":"IT-30","author":"T. Siegenthaler","year":"1984","unstructured":"Siegenthaler, T., Correlation-immunity of nonlinear combining functions for cryptographic applications. IEEE Trans. on Information Theory, IT-30(5), September 1984, 776\u2013780.","journal-title":"IEEE Trans. on Information Theory"},{"key":"19_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/3-540-44495-5_3","volume-title":"On resilient Boolean functions with maximum possible nonlinearity","author":"Y.V. Tarannikov","year":"2000","unstructured":"Tarannikov, Y.V., On resilient Boolean functions with maximum possible nonlinearity. In Progress in Cryptology-INDOCRYPT 2000, LNCS 1977, Springer Verlag, 2000, pp. 19\u201330."},{"issue":"3","key":"19_CR10","doi-asserted-by":"publisher","first-page":"569","DOI":"10.1109\/18.6037","volume":"34","author":"G. Xiao","year":"1988","unstructured":"Xiao, G. and Massey, J. L., A spectral characterization of correlation-immune functions. IEEE Trans. on Information Theory, 34(3), 1988, 569\u2013571.","journal-title":"IEEE Trans. on Information Theory"},{"key":"19_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"264","DOI":"10.1007\/3-540-44594-3","volume-title":"Selected Areas in Cryptography-SAC 2000","author":"Y. Zheng","year":"2000","unstructured":"Zheng, Y. and Zhang, X.M., Improved upper bound on the nonlinearity of high order correlation immune functions. In Selected Areas in Cryptography-SAC 2000, LNCS 2012, 2000, pp. 264\u2013274."}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2014 INDOCRYPT 2002"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36231-2_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,17]],"date-time":"2019-02-17T16:10:36Z","timestamp":1550419836000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36231-2_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540002635","9783540362319"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/3-540-36231-2_19","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}