{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T13:01:12Z","timestamp":1772283672309,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540006220","type":"print"},{"value":"9783540364924","type":"electronic"}],"license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36492-7_13","type":"book-chapter","created":{"date-parts":[[2007,10,23]],"date-time":"2007-10-23T19:36:10Z","timestamp":1193168170000},"page":"175-195","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["On Propagation Characteristics of Resilient Functions"],"prefix":"10.1007","author":[{"given":"Pascale","family":"Charpin","sequence":"first","affiliation":[]},{"given":"Enes","family":"Pasalic","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,2,17]]},"reference":[{"key":"13_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1007\/3-540-45539-6_40","volume-title":"Advances in Cryptology-EUROCRYPT 2000","author":"A. Canteaut","year":"2000","unstructured":"A. Canteaut and M. Trabbia, \u201cImproved fast correlation attacks using parity-check equations of weight 4 and 5.\u201d In Advances in Cryptology-EUROCRYPT 2000,number 1807 in Lecture Notes in Computer Science, pp. 573\u2013588, Springer-Verlag,2000."},{"key":"13_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1007\/3-540-45539-6_36","volume-title":"Advancesin Cryptology-EUROCRYPT 2000","author":"A. Canteaut","year":"2000","unstructured":"A. Canteaut, C. Carlet, P. Charpin, and C. Fontaine, \u201cPropagation characteristics and correlation-immunity of highly nonlinear Boolean functions.\u201d In Advancesin Cryptology-EUROCRYPT 2000, number 1807 in Lecture Notes in Computer Science, pp. 507\u2013522, Springer-Verlag, 2000."},{"issue":"4","key":"13_CR3","doi-asserted-by":"publisher","first-page":"1494","DOI":"10.1109\/18.923730","volume":"47","author":"A. Canteaut","year":"2001","unstructured":"A. Canteaut, C. Carlet, P. Charpin, and C. Fontaine. \u201cOn cryptographic properties of the cosets of R(1,m).\u201d IEEE Trans. Inform. Theory, 47(4):1494\u20131513, 2001.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"C. Carlet, \u201cOn the coset weight divisibility and nonlinearity of resilient and correlation-immune functions.\u201d In Sequences and their Applications-SETA\u2019 01,Discrete Mathematics and Theoretical Computer Science, pp. 131\u2013144. Springer-Verlag, 2001.","DOI":"10.1007\/978-1-4471-0673-9_9"},{"key":"13_CR5","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1006\/inco.1998.2763","volume":"151","author":"C. Carlet","year":"1999","unstructured":"C. Carlet, \u201cOn cryptographic propagation criteria for Boolean functions.\u201d Information and Computation, number 151, pp. 32\u201356, 1999.","journal-title":"Information and Computation"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"P. Charpin, and E. Pasalic, \u201cOn propagation characteristics of resilient functions.\u201d In Research-report RR-4537, INRIA, September 2002.","DOI":"10.1007\/3-540-36492-7_13"},{"key":"13_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1007\/BFb0034850","volume-title":"Advances in Cryptology-ASIACRYPT\u201996","author":"S. Chee","year":"1996","unstructured":"S. Chee, S. Lee, D. Lee, and S.H. Sung, \u201cOn the correlation immune functions and their nonlinearity.\u201d In Advances in Cryptology-ASIACRYPT\u201996, number 1163 in Lecture Notes in Computer Science, pp. 232\u2013243, Springer-Verlag, 1996."},{"key":"13_CR8","series-title":"Lect Notes Comput Sci","first-page":"249","volume-title":"Advances in Cryptology-EUROCRYPT\u2019 87","author":"J. H. Evertse","year":"1987","unstructured":"J. H. Evertse, \u201cLinear structures in block ciphers.\u201d In Advances in Cryptology-EUROCRYPT\u2019 87, number 304 in Lecture Notes in Computer Science, pp. 249\u2013266, Springer Verlag, 1987."},{"key":"13_CR9","series-title":"Lect Notes Comput Sci","first-page":"386","volume-title":"Advances in Cryptology-EUROCRYPT\u201993","author":"M. Matsui","year":"1993","unstructured":"M. Matsui, \u201cLinear cryptanalysis method for DES cipher.\u201d In Advances in Cryptology-EUROCRYPT\u201993, number 765 in Lecture Notes in Computer Science, pp. 386\u2013397, Springer-Verlag, 1993."},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"W. Meier, and O. Staffelbach., \u201cNonlinearity criteria for cryptographic functions.\u201d In Advances in Cryptology-EUROCRYPT\u201993, number 434 in Lecture Notes inComputer Science, pp. 549\u2013562, Springer-Verlag, 1988.","DOI":"10.1007\/3-540-46885-4_53"},{"key":"13_CR11","unstructured":"E. Pasalic, T. Johansson, S. Maitra, and P. Sarkar., \u201cNew constructions of resilient and correlation immune Boolean functions achieving upper bounds on nonlinearity.\u201d In Cryptology ePrint Archive, eprint.iacr.org, No. 2000\/048, September, 2000."},{"key":"13_CR12","series-title":"Lect Notes Comput Sci","first-page":"155","volume-title":"Advances in Cryptology-EUROCRYPT\u2019 90","author":"B. Preneel","year":"1990","unstructured":"B. Preneel, W.V. Leekwijck, L.V. Linden, R. Govaerts, and J. Vandewalle, \u201cPropagation characteristics of Boolean functions.\u201d In Advances in Cryptology-EUROCRYPT\u2019 90, number 437 in Lecture Notes in Computer Science, pp. 155\u2013165, Springer-Verlag, 1990."},{"key":"13_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1007\/3-540-44598-6_32","volume-title":"Advances in Cryptology-EUROCRYPT 2000","author":"P. Sarkar","year":"2000","unstructured":"P. Sarkar and S. Maitra, \u201cNonlinearity bounds and constructions of resilient Boolean functions.\u201d In Advances in Cryptology-EUROCRYPT 2000, number 1807 in Lecture Notes in Computer Science, pp. 515\u2013532, Springer-Verlag, 2000."},{"issue":"5","key":"13_CR14","doi-asserted-by":"publisher","first-page":"776","DOI":"10.1109\/TIT.1984.1056949","volume":"30","author":"T. Siegenthaler","year":"1984","unstructured":"T. Siegenthaler, \u201cCorrelation-immunity of nonlinear combining functions for cryptographic applications.\u201d IEEE Trans. Inform. Theory, IT-30(5): 776\u2013780, 1984.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"13_CR15","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/3-540-44495-5_3","volume-title":"On resilient Boolean functions with maximal possible nonlinearity","author":"Y. Tarannikov","year":"2000","unstructured":"Y. Tarannikov, \u201cOn resilient Boolean functions with maximal possible nonlinearity.\u201d In Proceedings of Indocrypt 2000, number 1977 in Lecture Notes in Computer Science, pp. 19\u201330, Springer Verlag, 2000."},{"key":"13_CR16","series-title":"Lect Notes Comput Sci","first-page":"70","volume-title":"Fast Software Encryption-FSE 2001","author":"Y. V. Tarannikov","year":"2001","unstructured":"Y. V. Tarannikov, \u201cNew constructions of resilient Boolean functions with maximal nonlinearity.\u201d In Fast Software Encryption-FSE 2001, to be published in Lecture Notes in Computer Science, pp. 70\u201381 (in preproceedings). Springer Verlag, 2001."},{"key":"13_CR17","series-title":"Lect Notes Comput Sci","first-page":"523","volume-title":"Advances in Cryptology-CRYPTO\u201985","author":"A.F. Webster","year":"1985","unstructured":"A.F. Webster and S.E. Tavares, \u201cOn the design of S-boxes.\u201d In Advances in Cryptology-CRYPTO\u201985, number 219 in Lecture Notes in Computer Science, pp. 523\u2013534, Springer-Verlag, 1985."},{"issue":"3","key":"13_CR18","doi-asserted-by":"publisher","first-page":"569","DOI":"10.1109\/18.6037","volume":"34","author":"G. Xiao","year":"1988","unstructured":"G. Xiao and J.L. Massey. \u201cA spectral characterization of correlation-immune combining functions.\u201d IEEE Trans. Inform. Theory, IT-34(3):569\u2013571, 1988.","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"5","key":"13_CR19","first-page":"320","volume":"1","author":"X.-M. Zhang","year":"1995","unstructured":"X.-M. Zhang and Y. Zheng, \u201cGAC-the criterion for global avalanche characterics of cryptographic functions.\u201d Journal of Universal Computer Science, vol. 1, no. 5, pp. 320\u2013337, 1995.","journal-title":"Journal of Universal Computer Science"},{"key":"13_CR20","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"470","DOI":"10.1007\/3-540-44448-3_36","volume-title":"Advances in Cryptology-Asiacrypt 2000","author":"X.-M. Zhang","year":"2000","unstructured":"X.-M. Zhang and Y. Zheng, \u201cOn relationship among avalanche, nonlinearity, and propagation criteria,\u201d In Advances in Cryptology-Asiacrypt 2000, number 1976 in Lecture Notes in Computer Science, pp. 470\u2013483, Springer-Verlag, 2000."}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36492-7_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,16]],"date-time":"2020-01-16T13:04:35Z","timestamp":1579179875000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36492-7_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540006220","9783540364924"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/3-540-36492-7_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2003]]},"assertion":[{"value":"17 February 2003","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}