{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T09:53:43Z","timestamp":1758707623515},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540679073"},{"type":"electronic","value":"9783540445982"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/3-540-44598-6_32","type":"book-chapter","created":{"date-parts":[[2007,5,1]],"date-time":"2007-05-01T06:15:21Z","timestamp":1178000121000},"page":"515-532","source":"Crossref","is-referenced-by-count":114,"title":["Nonlinearity Bounds and Constructions of Resilient Boolean Functions"],"prefix":"10.1007","author":[{"given":"Palash","family":"Sarkar","sequence":"first","affiliation":[]},{"given":"Subhamoy","family":"Maitra","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2000,8,11]]},"reference":[{"key":"32_CR1","doi-asserted-by":"crossref","unstructured":"P. Camion, C. Carlet, P. Charpin, and N. Sendrier. On correlation immune functions. In Advances in Cryptology-CRYPTO\u201991, pages 86\u2013100. Springer-Verlag, 1992.","DOI":"10.1007\/3-540-46766-1_6"},{"key":"32_CR2","doi-asserted-by":"crossref","unstructured":"C. Carlet. More correlation immune and resilient functions over Galois fields and Galois rings. In Advances in Cryptology-EUROCRYPT\u201997, pages 422\u2013433. Springer-Verlag, May 1997.","DOI":"10.1007\/3-540-69053-0_29"},{"key":"32_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1007\/BFb0034850","volume-title":"Advances in Cryptology, Asiacrypt 96","author":"S. Chee","year":"1996","unstructured":"S. Chee, S. Lee, D. Lee, and S. H. Sung. On the correlation immune functions and their nonlinearity. In Advances in Cryptology, Asiacrypt 96, number 1163 in Lecture Notes in Computer Science, pages 232\u2013243. Springer-Verlag, 1996."},{"key":"32_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-54973-0","volume-title":"The Stability Theory of Stream Ciphers","author":"C. Ding","year":"1991","unstructured":"C. Ding, G. Xiao, and W. Shan. The Stability Theory of Stream Ciphers. Number 561 in Lecture Notes in Computer Science. Springer-Verlag, 1991."},{"key":"32_CR5","doi-asserted-by":"crossref","unstructured":"E. Filiol and C. Fontaine. Highly nonlinear balanced Boolean functions with a good correlation-immunity. In Advances in Cryptology-EUROCRYPT\u201998. Springer-Verlag, 1998.","DOI":"10.1007\/BFb0054147"},{"issue":"3","key":"32_CR6","doi-asserted-by":"crossref","first-page":"569","DOI":"10.1109\/18.6037","volume":"34","author":"X. Guo-Zhen","year":"1988","unstructured":"X. Guo-Zhen and J. Massey. A spectral characterization of correlation immune combining functions. IEEE Transactions on Information Theory, 34(3):569\u2013571, May 1988.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"3","key":"32_CR7","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1006\/jcta.1996.0055","volume":"74","author":"X. Hou","year":"1996","unstructured":"X. Hou. Covering radius of the Reed-Muller code R(1, 7)-a simpler proof. Journal of Combinatorial Theory, Series A, 74(3):337\u2013341, 1996.","journal-title":"Journal of Combinatorial Theory, Series A"},{"issue":"3","key":"32_CR8","doi-asserted-by":"publisher","first-page":"1035","DOI":"10.1109\/18.490572","volume":"42","author":"X. Hou","year":"1996","unstructured":"X. Hou. On the covering radius of R(1, m) in R(3, m). IEEE Transactions on Information Theory, 42(3):1035\u20131037, 1996.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"3","key":"32_CR9","doi-asserted-by":"publisher","first-page":"1025","DOI":"10.1109\/18.568715","volume":"43","author":"X. Hou","year":"1997","unstructured":"X. Hou. On the norm and covering radius of the first order Reed-Muller codes. IEEE Transactions on Information Theory, 43(3):1025\u20131027, 1997.","journal-title":"IEEE Transactions on Information Theory"},{"key":"32_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/3-540-48405-1_12","volume-title":"Advances in Cryptology-CRYPTO\u201999","author":"T. Johansson","year":"1999","unstructured":"T. Johansson and F. Jonsson. Fast correlation attacks based on turbo code techniques. In Advances in Cryptology-CRYPTO\u201999, number 1666 in Lecture Notes in Computer Science, pages 181\u2013197. Springer-Verlag, August 1999."},{"key":"32_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1007\/3-540-48910-X_24","volume-title":"Advances in Cryptology-EUROCRYPT\u201999","author":"T. Johansson","year":"1999","unstructured":"T. Johansson and F. Jonsson. Improved fast correlation attacks on stream ciphers via convolutional codes. In Advances in Cryptology-EUROCRYPT\u201999, number 1592 in Lecture Notes in Computer Science, pages 347\u2013362. Springer-Verlag, May 1999."},{"key":"32_CR12","unstructured":"F. J. MacWillams and N. J. A. Sloane. The Theory of Error Correcting Codes. North Holland, 1977."},{"key":"32_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1007\/3-540-48405-1_13","volume-title":"Advances in Cryptology-CRYPTO\u201999","author":"S. Maitra","year":"1999","unstructured":"S. Maitra and P. Sarkar. Highly nonlinear resilient functions optimizing Siegen-thaler\u2019s inequality. In Advances in Cryptology-CRYPTO\u201999, number 1666 in Lecture Notes in Computer Science, pages 198\u2013215. Springer Verlag, August 1999."},{"key":"32_CR14","doi-asserted-by":"crossref","unstructured":"W. Meier and O. Staffelbach. Fast correlation attack on stream ciphers. In Advances in Cryptology-EUROCRYPT\u201988, volume 330, pages 301\u2013314. Springer-Verlag, May 1988.","DOI":"10.1007\/3-540-45961-8_28"},{"key":"32_CR15","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"306","DOI":"10.1007\/978-3-540-48000-6_25","volume-title":"Advances in Cryptology-ASIACRYPT\u201999","author":"S. Palit","year":"1999","unstructured":"S. Palit and B. K. Roy. Cryptanalysis of LFSR-encrypted codes with unknown combining functions. In Advances in Cryptology-ASIACRYPT\u201999, number 1716 in Lecture Notes in Computer Science, pages 306\u2013320. Springer Verlag, November 1999."},{"key":"32_CR16","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/3-540-46665-7_3","volume-title":"IMA Conference on Cryptography and Coding","author":"E. Pasalic","year":"1999","unstructured":"E. Pasalic and T. Johansson. Further results on the relation between nonlinearity and resiliency of Boolean functions. In IMA Conference on Cryptography and Coding, number 1746 in Lecture Notes in Computer Science, pages 35\u201345. Springer-Verlag, 1999."},{"key":"32_CR17","doi-asserted-by":"crossref","unstructured":"R. A. Rueppel. Analysis and Design of Stream Ciphers. Springer Verlag, 1986.","DOI":"10.1007\/978-3-642-82865-2"},{"key":"32_CR18","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1109\/TIT.1987.1057268","volume":"IT-33","author":"R. A. Rueppel","year":"1987","unstructured":"R. A. Rueppel and O. J. Staffelbach. Products of linear recurring sequences with maximum complexity. IEEE Transactions on Information Theory, IT-33:124\u2013131, January 1987.","journal-title":"IEEE Transactions on Information Theory"},{"key":"32_CR19","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1007\/3-540-45539-6_35","volume-title":"Advances in Cryptology-EUROCRYPT 2000","author":"P. Sarkar","year":"2000","unstructured":"P. Sarkar and S. Maitra. Construction of nonlinear Boolean functions with important cryptographic properties. In Advances in Cryptology-EUROCRYPT 2000, number 1807 in Lecture Notes in Computer Science, pages 491\u2013512. Springer Verlag, 2000."},{"key":"32_CR20","doi-asserted-by":"crossref","unstructured":"J. Seberry, X. M. Zhang, and Y. Zheng. Nonlinearly balanced Boolean functions and their propagation characteristics. In Advances in Cryptology-CRYPTO\u201993, pages 49\u201360. Springer-Verlag, 1994.","DOI":"10.1007\/3-540-48329-2_5"},{"key":"32_CR21","doi-asserted-by":"crossref","unstructured":"J. Seberry, X. M. Zhang, and Y. Zheng. On constructions and nonlinearity of correlation immune Boolean functions. In Advances in Cryptology-EUROCRYPT\u201993, pages 181\u2013199. Springer-Verlag, 1994.","DOI":"10.1007\/3-540-48285-7_16"},{"issue":"5","key":"32_CR22","doi-asserted-by":"crossref","first-page":"776","DOI":"10.1109\/TIT.1984.1056949","volume":"IT-30","author":"T. Siegenthaler","year":"1984","unstructured":"T. Siegenthaler. Correlation-immunity of nonlinear combining functions for cryptographic applications. IEEE Transactions on Information Theory, IT-30(5):776\u2013780, September 1984.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"1","key":"32_CR23","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1109\/TC.1985.1676518","volume":"C-34","author":"T. Siegenthaler","year":"1985","unstructured":"T. Siegenthaler. Decrypting a class of stream ciphers using ciphertext only. IEEE Transactions on Computers, C-34(1):81\u201385, January 1985.","journal-title":"IEEE Transactions on Computers"},{"key":"32_CR24","doi-asserted-by":"crossref","unstructured":"Y. V. Tarannikov. On resilient Boolean functions with maximum possible nonlinearity. Cryptology ePrint Archive, eprint.iacr.org, No. 2000\/005, 2000.","DOI":"10.1007\/3-540-44495-5_3"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO 2000"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44598-6_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,27]],"date-time":"2019-04-27T12:34:07Z","timestamp":1556368447000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44598-6_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540679073","9783540445982"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/3-540-44598-6_32","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2000]]}}}