{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:12:22Z","timestamp":1725484342393},"publisher-location":"Berlin, Heidelberg","reference-count":62,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540438618"},{"type":"electronic","value":"9783540454502"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45450-0_29","type":"book-chapter","created":{"date-parts":[[2007,5,19]],"date-time":"2007-05-19T20:53:10Z","timestamp":1179607990000},"page":"379-394","source":"Crossref","is-referenced-by-count":4,"title":["A Brief Outline of Research on Correlation Immune Functions"],"prefix":"10.1007","author":[{"given":"Bimal","family":"Roy","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,6,21]]},"reference":[{"key":"29_CR1","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1137\/0217014","volume":"17","author":"C. H. Bennet","year":"1988","unstructured":"C. H. Bennet, G. Brassard, and J. M. Robert. Privacy amplification by by public discussion. SIAM Journal on Computing, 17:210\u2013229, 1988.","journal-title":"SIAM Journal on Computing"},{"key":"29_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1007\/3-540-48658-5_24","volume-title":"Advances in Cryptology-CRYPTO\u201994","author":"J. Bierbrauer","year":"1994","unstructured":"J. Bierbrauer, K. Gopalakrishnan, and D. R Stinson. Bounds on resilient functions and orthogonal arrays. In Advances in Cryptology-CRYPTO\u201994, number 839 in Lecture Notes in Computer Science, pages 247\u2013256. Springer Verlag, 1994."},{"key":"29_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1007\/3-540-46766-1_6","volume-title":"Advances in Cryptology-CRYPTO\u201991","author":"P. Camion","year":"1992","unstructured":"P. Camion, C. Carlet, P. Charpin, and N. Sendrier. On correlation immune functions. In Advances in Cryptology-CRYPTO\u201991, number 576 in Lecture Notes in Computer Science, pages 86\u2013100. Springer-Verlag, 1992."},{"issue":"2","key":"29_CR4","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1023\/A:1008337029047","volume":"16","author":"P. Camion","year":"1999","unstructured":"P. Camion and A. Canteaut. Correlation-Immune and Resilient Functions Over a Finite Alphabet and Their Applications in Cryptography. Designs, Codes and Cryptography, 16(2): 121\u2013149, 1999.","journal-title":"Designs, Codes and Cryptography"},{"key":"29_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1007\/3-540-45539-6_36","volume-title":"Advances in Cryptology-EUROCRYPT\u201900","author":"A. Canteaut","year":"2000","unstructured":"A. Canteaut, C. Carlet, P. Charpin and C. Fontaine. Propagation characteristics and correlation immunity of highly nonlinear Boolean functions. In Advances in Cryptology-EUROCRYPT\u201900, pages 507\u2013522. Springer-Verlag, LNCS 1807, 2000."},{"key":"29_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"422","DOI":"10.1007\/3-540-69053-0_29","volume-title":"Advances in Cryptology-Eurocrypt\u2019 97","author":"C. Carlet","year":"1997","unstructured":"C. Carlet. More Correlation-Immune and Resilient Functions over Galois Fields and Galois Rings. In Advances in Cryptology-Eurocrypt\u2019 97, number 1233 in Lecture Notes in Computer Science, pages 422\u2013433. Springer-Verlag, 1997."},{"key":"29_CR7","doi-asserted-by":"crossref","unstructured":"C. Carlet. On the coset weight divisibility and nonlinearity of resilient and correlation immune functions. In Sequences and Their Applications-SETA 2001, Discrete Mathematics and Theoretical Computer Science, pages 131\u2013144. Springer Verlag, 2001.","DOI":"10.1007\/978-1-4471-0673-9_9"},{"key":"29_CR8","doi-asserted-by":"crossref","unstructured":"C. Carlet and P. Sarkar. Spectral domain analysis of correlation immune and resilient Boolean functions. Accepted in Finite Fields and Its Applications, 2001.","DOI":"10.1006\/ffta.2001.0332"},{"key":"29_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1007\/BFb0034850","volume-title":"Advances in Cryptology-ASIACRYPT\u2019 96","author":"S. Chee","year":"1996","unstructured":"S. Chee, S. Lee, D. Lee, and S. H. Sung. On the correlation immune functions and their nonlinearity. In Advances in Cryptology-ASIACRYPT\u2019 96, number 1163 in Lecture Notes in Computer Science, pages 232\u2013243. Springer-Verlag, 1996."},{"key":"29_CR10","series-title":"Lect Notes Comput Sci","first-page":"64","volume-title":"ICISC 2000","author":"J. H. Cheon","year":"2000","unstructured":"J. H. Cheon and S. Chee. Elliptic Curves and Resilient Functions. In ICISC 2000, number 2015 in Lecture Notes in Computer Science, pages 64\u201372. Springer Verlag, 2000."},{"key":"29_CR11","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology-CRYPTO 2001","author":"J. H. Cheon","year":"2001","unstructured":"J. H. Cheon. Nonlinear Vector Resilient Functions. In Advances in Cryptology-CRYPTO 2001, Lecture Notes in Computer Science. Springer Verlag, 2001."},{"key":"29_CR12","doi-asserted-by":"crossref","unstructured":"B. Chor, O. Goldreich, J. Hastad, J. Friedman, S. Rudich, and R. Smolensky. The bit extraction problem or t-resilient functions. In 26th IEEE Symposium on Foundations of Computer Science, pages 396\u2013407, 1985.","DOI":"10.1109\/SFCS.1985.55"},{"key":"29_CR13","doi-asserted-by":"crossref","unstructured":"J. Clark, J. Jacob, W. Millan, and S. Maitra. Evolution of Boolean Functions Satisfying Multiple Criteria with Simulated Annealing. Preprint, 2002.","DOI":"10.1007\/3-540-36231-2_20"},{"key":"29_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1007\/BFb0028473","volume-title":"Information and Communications Security","author":"E. Dawson","year":"1997","unstructured":"E. Dawson and C. K. Wu. Construction of correlation immune Boolean functions. In Information and Communications Security, Lecture Notes in Computer Science, pages 170\u2013180. Springer-Verlag, 1997."},{"key":"29_CR15","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-54973-0","volume-title":"The Stability Theory of Stream Ciphers","author":"C. Ding","year":"1991","unstructured":"C. Ding, G. Xiao, and W. Shan. The Stability Theory of Stream Ciphers. Number 561 in Lecture Notes in Computer Science. Springer-Verlag, 1991."},{"issue":"4","key":"29_CR16","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1515\/dma.1992.2.4.407","volume":"2","author":"O. V. Denisov","year":"1992","unstructured":"O. V. Denisov. An asymptotic formula for the number of correlation-immune of order k Boolean functions. Discrete Mathematics and Applications, 2(4):407\u2013426, 1992.","journal-title":"Discrete Mathematics and Applications"},{"key":"29_CR17","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1007\/3-540-45311-3_24","volume-title":"Progress in Cryptology-INDOCRYPT 2001","author":"M. Fedorova","year":"2001","unstructured":"M. Fedorova and Y. V. Tarannikov. On the constructing of highly nonlinear resilient Boolean functions by means of special matrices. In Progress in Cryptology-INDOCRYPT 2001, number 2247 in Lecture Notes in Computer Science, pages 254\u2013266. Springer Verlag, 2001."},{"key":"29_CR18","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1007\/BFb0054147","volume-title":"Advances in Cryptology-EUROCRYPT\u201998","author":"E. Filiol","year":"1998","unstructured":"E. Filiol and C. Fontaine. Highly nonlinear balanced Boolean functions with a good correlation-immunity. In Advances in Cryptology-EUROCRYPT\u201998, number 1403 in Lecture Notes in Computer Science, pages 475\u2013488. Springer-Verlag, 1998."},{"key":"29_CR19","unstructured":"J. Friedman. On the bit extraction problem. In 33rd IEEE Symposium on Foundations of Computer Science, pages 314\u2013319, 1982."},{"issue":"3","key":"29_CR20","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1016\/0020-0190(93)90237-4","volume":"47","author":"K. Gopalakrisnan","year":"1993","unstructured":"K. Gopalakrisnan, D. G. Hoffman, and D. R. Stinson. A note on a conjecture concerning symmetric resilient functions. Information Processing Letters, 47(3):139\u2013143, 1993.","journal-title":"Information Processing Letters"},{"key":"29_CR21","unstructured":"K. Gopalakrishnan. A study of Correlation-immune, resilient and related cryptographic functions. PhD thesis, University of Nebraska, 1994."},{"issue":"3","key":"29_CR22","doi-asserted-by":"crossref","first-page":"569","DOI":"10.1109\/18.6037","volume":"34","author":"X. Guo-Zhen","year":"1988","unstructured":"X. Guo-Zhen and J. Massey. A spectral characterization of correlation immune combining functions. IEEE Transactions on Information Theory, 34(3):569\u2013571, May 1988.","journal-title":"IEEE Transactions on Information Theory"},{"key":"29_CR23","unstructured":"T. Johansson and E. Pasalic, A construction of resilient functions with high nonlinearity, In IEEE International Symposium on Information Theory, ISIT, June 2000, full version available at Cryptology ePrint Archive, eprint.iacr.org, No.2000\/053."},{"issue":"6","key":"29_CR24","first-page":"721","volume":"3","author":"K. Kurosawa","year":"1997","unstructured":"K. Kurosawa, T. Satoh, and K. Yamamoto Highly nonlinear t-Resilient functions. Journal of Universal Computer Science, vol. 3, no. 6, pp. 721\u2013729, Springer Publishing Company, 1997.","journal-title":"Journal of Universal Computer Science"},{"key":"29_CR25","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1007\/3-540-48970-3_2","volume-title":"4th Australasian Conference on Information, Security and Privacy","author":"S. Maitra","year":"1999","unstructured":"S. Maitra and P. Sarkar. Enumeration of correlation immune Boolean functions. In 4th Australasian Conference on Information, Security and Privacy, number 1587 in Lecture Notes in Computer Science, pages 12\u201325. Springer Verlag, April 1999."},{"key":"29_CR26","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1007\/3-540-48405-1_13","volume-title":"Advances in Cryptology-CRYPTO\u201999","author":"S. Maitra","year":"1999","unstructured":"S. Maitra and P. Sarkar. Highly nonlinear resilient functions optimizing Siegenthaler\u2019s inequality. In Advances in Cryptology-CRYPTO\u201999, number 1666 in Lecture Notes in Computer Science, pages 198\u2013215. Springer Verlag, August 1999."},{"issue":"3\u20134","key":"29_CR27","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/S0020-0190(99)00091-5","volume":"71","author":"S. Maitra","year":"1999","unstructured":"S. Maitra and P. Sarkar. Hamming weights of correlation immune Boolean functins. Information Processing Letters, 71(3\u20134):149\u2013153, 1999.","journal-title":"Information Processing Letters"},{"key":"29_CR28","unstructured":"S. Maitra. Correlation immune Boolean functions with very high nonlinearity. Cryptology ePrint Archive, eprint.iacr.org, No. 2000\/054, October 27, 2000."},{"key":"29_CR29","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1007\/3-540-45311-3_23","volume-title":"INDOCRYPT 2001","author":"S. Maitra","year":"2001","unstructured":"S. Maitra. Autocorrelation Properties of correlation immune Boolean functions. INDOCRYPT 2001, number 2247 Lecture Notes in Computer Science. Pages 242\u2013253. Springer Verlag, December 2001."},{"key":"29_CR30","unstructured":"S. Maitra. Boolean Functions with Important Cryptographic Properties. PhD Thesis, Indian Statistical Institute, 2001."},{"key":"29_CR31","doi-asserted-by":"crossref","unstructured":"S. Maitra and P. Sarkar. Cryptographically significant Boolean functions with five valued Walsh spectra. Theoretical Computer Science, To be published in 2002.","DOI":"10.1016\/S0304-3975(01)00196-7"},{"key":"29_CR32","doi-asserted-by":"crossref","unstructured":"S. Maitra and E. Pasalic. Further constructions of resilient Boolean functions with very high nonlinearity. IEEE Transactions on Information Theory, To be published in July 2002.","DOI":"10.1007\/978-1-4471-0673-9_20"},{"key":"29_CR33","doi-asserted-by":"crossref","unstructured":"W. Millan, A. Clark, and E. Dawson. Heuristic design of cryptographically strong balanced Boolean functions. In Advances in Cryptology-EUROCRYPT\u201998. Springer-Verlag, 1998.","DOI":"10.1007\/BFb0054148"},{"issue":"3","key":"29_CR34","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1007\/BF00190802","volume":"2","author":"C. J. Mitchell","year":"1990","unstructured":"C. J. Mitchell. Enumerating Boolean functions of cryptographic significance. Journal of Cryptology, 2(3):155\u2013170, 1990.","journal-title":"Journal of Cryptology"},{"issue":"4","key":"29_CR35","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1016\/S0020-0190(97)00010-0","volume":"61","author":"P. S. Mo","year":"1997","unstructured":"P. Sung Mo, L. Sangjin, S. Soo Hak, and K. Kwangjo. Improving bounds for the number of correlation immune Boolean functions. Information Processing Letters, 61(4):209\u2013212, 1997.","journal-title":"Information Processing Letters"},{"issue":"3","key":"29_CR36","first-page":"358","volume":"IT-26","author":"J. J. Mykkeltveit","year":"1983","unstructured":"J. J. Mykkeltveit. The covering radius of the (128, 8) Reed-Muller code is 56. IEEE Transactions on Information Theory, IT-26(3):358\u2013362, 1983.","journal-title":"IEEE Transactions on Information Theory"},{"key":"29_CR37","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/3-540-46665-7_3","volume-title":"IMA Conference on Cryptography and Coding","author":"E. Pasalic","year":"1999","unstructured":"E. Pasalic and T. Johansson. Further results on the relation between nonlinearity and resiliency of Boolean functions. In IMA Conference on Cryptography and Coding, number 1746 in Lecture Notes in Computer Science, pages 35\u201345. Springer-Verlag, 1999."},{"key":"29_CR38","doi-asserted-by":"crossref","unstructured":"E. Pasalic, S. Maitra, T. Johansson and P. Sarkar. New constructions of resilient and correlation immune Boolean functions achieving upper bounds on nonlinearity. In Workshop on Coding and Cryptography-WCC 2001, Paris, January 8\u201312, 2001. Electronic Notes in Discrete Mathematics, Volume 6, Elsevier Science, 2001.","DOI":"10.1016\/S1571-0653(04)00167-2"},{"key":"29_CR39","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1007\/3-540-45537-X_5","volume-title":"Selected Areas in Cryptography-SAC 2001","author":"E. Pasalic","year":"2001","unstructured":"E. Pasalic and S. Maitra. Linear codes in constructing resilient functions with high nonlinearity. In Selected Areas in Cryptography-SAC 2001, number 2259 in Lecture Notes in Computer Science. Pages 60\u201374, Springer Verlag, August 2001. (An extended version of this paper contains further improved results.)"},{"issue":"3","key":"29_CR40","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1109\/TIT.1983.1056679","volume":"IT-29","author":"N. J. Patterson","year":"1983","unstructured":"N. J. Patterson and D. H. Wiedemann. The covering radius of the (215,16) Reed-Muller code is at least 16276. IEEE Transactions on Information Theory, IT-29(3):354\u2013356, 1983.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"2","key":"29_CR41","first-page":"443","volume":"IT-36","author":"N. J. Patterson","year":"1990","unstructured":"N. J. Patterson and D. H. Wiedemann. Correction to-the covering radius of the (215,16) Reed-Muller code is at least 16276. IEEE Transactions on Information Theory, IT-36(2):443, 1990.","journal-title":"IEEE Transactions on Information Theory"},{"key":"29_CR42","first-page":"300","volume":"20","author":"O. S. Rothaus","year":"1976","unstructured":"O. S. Rothaus. On bent functions. Journal of Combinatorial Theory, Series A, 20:300\u2013305, 1976.","journal-title":"Series A"},{"key":"29_CR43","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1007\/3-540-45539-6_35","volume-title":"Advances in Cryptology-EUROCRYPT 2000","author":"P. Sarkar","year":"2000","unstructured":"P. Sarkar and S. Maitra. Construction of nonlinear Boolean functions with important cryptographic properties. In Advances in Cryptology-EUROCRYPT 2000, number 1807 in Lecture Notes in Computer Science, pages 485\u2013506. Springer Verlag, 2000."},{"key":"29_CR44","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1007\/3-540-44598-6_32","volume-title":"Advances in Cryptology-CRYPTO 2000","author":"P. Sarkar","year":"2000","unstructured":"P. Sarkar and S. Maitra. Nonlinearity bounds and constructions of resilient Boolean functions. In Advances in Cryptology-CRYPTO 2000, number 1880 in Lecture Notes in Computer Science, pages 515\u2013532. Springer Verlag, 2000."},{"issue":"5\u20136","key":"29_CR45","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/S0020-0190(00)00063-6","volume":"74","author":"P. Sarkar","year":"2000","unstructured":"P. Sarkar. A note on the spectral characterization of correlation immune Boolean functions. Information Processing Letters, 74(5\u20136):191\u2013195, 2000.","journal-title":"Information Processing Letters"},{"key":"29_CR46","doi-asserted-by":"crossref","unstructured":"P. Sarkar and S. Maitra. Cross-correlation analysis of cryptographically useful Boolean functions and S-boxes. Theory of Computing Systems, to be published in 2002.","DOI":"10.1007\/s00224-001-1019-1"},{"key":"29_CR47","unstructured":"P. Sarkar and S. Maitra. Balancedness and Correlation Immunity of Symmetric Boolean Functions. Preprint, 2000."},{"key":"29_CR48","doi-asserted-by":"crossref","unstructured":"M. Schneider. On the construction and upper bounds of balanced and correlation immune functions. In SAC\u201997, January 1997.","DOI":"10.1007\/BFb0024475"},{"key":"29_CR49","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/3-540-48285-7_16","volume-title":"Advances in Cryptology-EUROCRYPT\u201993","author":"J. Seberry","year":"1994","unstructured":"J. Seberry, X. M. Zhang, and Y. Zheng. On constructions and nonlinearity of correlation immune Boolean functions. In Advances in Cryptology-EUROCRYPT\u201993, number 765 in Lecture Notes in Computer Science, pages 181\u2013199. Springer-Verlag, 1994."},{"key":"29_CR50","unstructured":"W. Shan. The structure and the construction of correlation immune functions. MS Thesis, NTE Institute, Xian, 1987."},{"issue":"5","key":"29_CR51","doi-asserted-by":"crossref","first-page":"776","DOI":"10.1109\/TIT.1984.1056949","volume":"IT-30","author":"T. Siegenthaler","year":"1984","unstructured":"T. Siegenthaler. Correlation-immunity of nonlinear combining functions for cryptographic applications. IEEE Transactions on Information Theory, IT-30(5):776\u2013780, September 1984.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"1","key":"29_CR52","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1109\/TC.1985.1676518","volume":"C-34","author":"T. Siegenthaler","year":"1985","unstructured":"T. Siegenthaler. Decrypting a class of stream ciphers using ciphertext only. IEEE Transactions on Computers, C-34(1):81\u201385, January 1985.","journal-title":"IEEE Transactions on Computers"},{"key":"29_CR53","first-page":"105","volume":"92","author":"D. R. Stinson","year":"1993","unstructured":"D. R. Stinson. Resilient functions and large sets of orthogonal arrays. Congressus Numerantium, 92:105\u2013110, 1993.","journal-title":"Congressus Numerantium"},{"issue":"3","key":"29_CR54","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/BF00202271","volume":"8","author":"D. R. Stinson","year":"1995","unstructured":"D. R. Stinson and J. L. Massey. An infinite class of counterexamples to a conjecture concerning non-linear resilient functions. Journal of Cryptology, 8(3):167\u2013173, 1995.","journal-title":"Journal of Cryptology"},{"key":"29_CR55","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/3-540-44495-5_3","volume-title":"Progress in Cryptology-INDOCRYPT 2000","author":"Y. V. Tarannikov","year":"2000","unstructured":"Y. V. Tarannikov. On resilient Boolean functions with maximum possible nonlinearity. In Progress in Cryptology-INDOCRYPT 2000, number 1977 in Lecture Notes in Computer Science, pages 19\u201330. Springer Verlag, 2000."},{"key":"29_CR56","unstructured":"Y. V. Tarannikov. New constructions of resilient Boolean functions with maximal nonlinearity. In Fast Software Encryption-FSE 2001, pages 70\u201381 in preproceedings, 2001."},{"key":"29_CR57","series-title":"Lect Notes Comput Sci","volume-title":"ASIACRYPT 2001","author":"Y. V. Tarannikov","year":"2001","unstructured":"Y. V. Tarannikov, P. Korolev and A. Botev. Autocorrelation coefficients and correlation immunity of Boolean functions. In ASIACRYPT 2001, Lecture Notes in Computer Science. Springer Verlag, 2001."},{"issue":"3","key":"29_CR58","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/BF00202268","volume":"8","author":"Y. X. Yang","year":"1995","unstructured":"Y. X. Yang and B. Guo. Further enumerating Boolean functions of cryptographic significance. Journal of Cryptology, 8(3):115\u2013122, 1995.","journal-title":"Journal of Cryptology"},{"issue":"5","key":"29_CR59","doi-asserted-by":"publisher","first-page":"1740","DOI":"10.1109\/18.623184","volume":"43","author":"X. M. Zhang","year":"1997","unstructured":"X. M. Zhang and Y. Zheng. Cryptographically resilient functions. IEEE Transactions on Information Theory, 43(5):1740\u20131747, 1997.","journal-title":"IEEE Transactions on Information Theory"},{"key":"29_CR60","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"264","DOI":"10.1007\/3-540-44594-3","volume-title":"Selected Areas in Cryptography-SAC 2000","author":"Y. Zheng","year":"2000","unstructured":"Y. Zheng and X. M. Zhang. Improved upper bound on the nonlinearity of high order correlation immune functions. In Selected Areas in Cryptography-SAC 2000, number 2012 in Lecture Notes in Computer Science, pages 264\u2013274. Springer Verlag, 2000."},{"key":"29_CR61","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-44594-3","volume-title":"Advances in Cryptology-ASIACRYPT\u201900","author":"Y. Zheng","year":"2000","unstructured":"Y. Zheng and X. M. Zhang. On relationships among propagation degree, nonlinearity and correlation immunity. In Advances in Cryptology-ASIACRYPT\u201900, Lecture Notes in Computer Science. Springer Verlag, 2000."},{"key":"29_CR62","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/3-540-45247-8_5","volume-title":"International Conference on Information Security and Cryptology-ICISC 2000","author":"Y. Zheng","year":"2001","unstructured":"Y. Zheng and X. M. Zhang. New results on correlation immune functions. In International Conference on Information Security and Cryptology-ICISC 2000, number 2015 in Lecture Notes in Computer Science, pages 49\u201363. Springer Verlag, 2001."}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45450-0_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T05:39:27Z","timestamp":1556429967000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45450-0_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540438618","9783540454502"],"references-count":62,"URL":"https:\/\/doi.org\/10.1007\/3-540-45450-0_29","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}