{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T22:47:06Z","timestamp":1777416426931,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540679073","type":"print"},{"value":"9783540445982","type":"electronic"}],"license":[{"start":{"date-parts":[[2000,1,1]],"date-time":"2000-01-01T00:00:00Z","timestamp":946684800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/3-540-44598-6_31","type":"book-chapter","created":{"date-parts":[[2007,5,1]],"date-time":"2007-05-01T06:15:21Z","timestamp":1178000121000},"page":"501-514","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers"],"prefix":"10.1007","author":[{"given":"Muxiang","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Agnes","family":"Chan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2000,8,11]]},"reference":[{"key":"31_CR1","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/BF00203967","volume":"3","author":"C.M. Adams","year":"1990","unstructured":"C.M. Adams and S.E. Tavares. The structured design of cryptographically good S-boxes. Journal of Cryptology, vol. 3, pp. 27\u201341, 1990.","journal-title":"Journal of Cryptology"},{"issue":"1","key":"31_CR2","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E. Biham","year":"1991","unstructured":"E. Biham and A. Shamir. Differential cryptanalysis of DES-like cryptosystems. Journal of Cryptology, vol. 4, no. 1, pp. 3\u201372, 1991.","journal-title":"Journal of Cryptology"},{"key":"31_CR3","first-page":"356","volume":"950","author":"F. Chabaud","year":"1995","unstructured":"F. Chabaud and S. Vaudenay. Links between differential and linear cryptanalysis. In Lectures in Computer Science, Advances in Cryptology-EUROCRYPT\u201994, vol. 950, pp. 356\u2013365, Springer-Verlag, 1995.","journal-title":"Lectures in Computer Science, Advances in Cryptology-EUROCRYPT\u201994"},{"key":"31_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"286","DOI":"10.1007\/3-540-48910-X_20","volume-title":"Advances in Cryptology-EUROCRYPT\u201999","author":"J.H. Cheon","year":"1999","unstructured":"J.H. Cheon, S. Chee, and C. Park. S-boxes with controllable nonlinearity. In Lecture Notes in Computer Science, Advances in Cryptology-EUROCRYPT\u201999, vol. 1592, pp. 286\u2013294, Springer-Verlag, 1999."},{"key":"31_CR5","doi-asserted-by":"crossref","unstructured":"T.M. Cover and J.A. Thomas. Elements of Information Theory. John Wiley & Sons Inc., 1991.","DOI":"10.1002\/0471200611"},{"key":"31_CR6","volume-title":"Shift Register Sequences","author":"S.W. Golomb","year":"1982","unstructured":"S.W. Golomb. Shift Register Sequences. Holden-Day, San Francisco, 1976. Reprinted by Aegean Park Press, 1982."},{"key":"31_CR7","volume-title":"Finite Orthogonal Series in the Design of Digital Devices","author":"M.G. Karpovsky","year":"1976","unstructured":"M.G. Karpovsky. Finite Orthogonal Series in the Design of Digital Devices. New York and Jerudalem: Wiley and TUP, 1976."},{"key":"31_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume-title":"Advances in Cryptology-EUROCRYPT\u201993","author":"M. Matsui","year":"1994","unstructured":"M. Matsui. Linear cryptanalysis method for DES ciphers. In Lecture Notes in Computer Science, Advances in Cryptology-EUROCRYPT\u201993, vol. 765, pp. 386\u2013397, Springer-Verlag, 1994."},{"key":"31_CR9","doi-asserted-by":"crossref","first-page":"549","DOI":"10.1007\/3-540-46885-4_53","volume":"434","author":"W. Meier","year":"1990","unstructured":"W. Meier and O. Staffelbach. Nonlinear criteria for cryptographic functions. In Lecture Notes of Computer Science, Advances in Cryptology: Proceedings of EUROCRYPT\u201989, vol. 434, pp. 549\u2013562, Springer-Verlag, 1990.","journal-title":"Lecture Notes of Computer Science, Advances in Cryptology: Proceedings of EUROCRYPT\u201989"},{"key":"31_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"378","DOI":"10.1007\/3-540-46416-6_32","volume-title":"Advance in Cryptology-EUROCRYPT\u201991","author":"K. Nyberg","year":"1991","unstructured":"K. Nyberg. Perfect nonlinear S-boxes. In Lecture Notes in Computer Science, Advance in Cryptology-EUROCRYPT\u201991, vol. 547, pp. 378\u2013385, Springer-Verlag, 1991."},{"key":"31_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1007\/3-540-47555-9_8","volume-title":"Advance in Cryptology-EUROCRYPT\u201992","author":"K. Nyberg","year":"1993","unstructured":"K. Nyberg. On the construction of highly nonlinear permutations. In Lecture Notes in Computer Science, Advance in Cryptology-EUROCRYPT\u201992, vol. 658, pp. 92\u201398, Springer-Verlag, 1993."},{"key":"31_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/3-540-46877-3_14","volume-title":"Advance in Cryptology-EUROCRYPT\u201990","author":"B. Preneel","year":"1991","unstructured":"B. Preneel, W.V. Leekwijck, L.V. Linden, R. Govaerts, and J. Vandewalle. Propagation characteristics of Boolean functions. In Lecture Notes in Computer Science, Advance in Cryptology-EUROCRYPT\u201990, vol. 473, pp. 161\u2013173, Springer-Verlag, 1991."},{"key":"31_CR13","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1016\/0097-3165(76)90024-8","volume":"20","author":"O.S. Rothaus","year":"1976","unstructured":"O.S. Rothaus. On bent functions. J. Combinatorial Theory, Series A, vol. 20, pp. 300\u2013305, 1976.","journal-title":"J. Combinatorial Theory"},{"key":"31_CR14","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-82865-2","volume-title":"Analysis and Design of Stream Ciphers","author":"R. Rueppel","year":"1986","unstructured":"R. Rueppel. Analysis and Design of Stream Ciphers. Springer-Verlag, Berlin, 1986."},{"key":"31_CR15","first-page":"65","volume-title":"Contemporary Cryptology: The Science of Information Integrity","author":"R. A. Rueppel","year":"1991","unstructured":"R. A. Rueppel. Stream ciphers. In Contemporary Cryptology: The Science of Information Integrity, G. Simmons ed., New York: IEEE Press, pp. 65\u2013134, 1991."},{"key":"31_CR16","doi-asserted-by":"crossref","unstructured":"J. Seberry, X.M. Zhang, and Y. Zheng. Systematic generation of cryptographically robust S-boxes. In Proceedings of the first ACM Conference on Computer and Communications Security, pp. 172\u2013182, 1993.","DOI":"10.1145\/168588.168610"},{"issue":"1","key":"31_CR17","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1109\/TC.1985.1676518","volume":"C-34","author":"T. Siegenthaler","year":"1985","unstructured":"T. Siegenthaler. Decrypting a class of stream ciphers using ciphertext only. IEEE Trans. Computer, vol. C-34, no. 1, pp. 81\u201385, 1985.","journal-title":"IEEE Trans. Computer"},{"issue":"3","key":"31_CR18","first-page":"564","volume":"IT-34","author":"G. Xiao","year":"1988","unstructured":"Guozhen Xiao and J. L. Massey. A spectral characterization of correlation-immune combining functions. IEEE Trans. on Information Theory, vol. IT-34, no. 3, pp. 564\u2013571, 1988.","journal-title":"IEEE Trans. on Information Theory"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO 2000"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44598-6_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T09:05:57Z","timestamp":1558256757000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44598-6_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540679073","9783540445982"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/3-540-44598-6_31","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2000]]},"assertion":[{"value":"11 August 2000","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}