{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T15:28:56Z","timestamp":1753889336622},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540546207"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-46416-6_12","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T18:02:07Z","timestamp":1186423327000},"page":"141-152","source":"Crossref","is-referenced-by-count":27,"title":["Boolean Functions Satisfying Higher Order Propagation Criteria"],"prefix":"10.1007","author":[{"given":"B.","family":"Preneel","sequence":"first","affiliation":[]},{"given":"Ren\u00e9","family":"Govaerts","sequence":"additional","affiliation":[]},{"given":"Joos","family":"Vandewalle","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"R. Forr\u00e9, \u201cThe strict avalanche criterion: spectral properties of Boolean functions and an extended definition\u201d, Advances in Cryptology, Proc. Crypto 88, Springer Verlag, 1990, p. 450\u2013468.","DOI":"10.1007\/0-387-34799-2_31"},{"key":"12_CR2","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1109\/TIT.1973.1055009","volume":"IT-19","author":"H.J. Helgert","year":"1973","unstructured":"H.J. Helgert and R.D. Stinaff, \u201cMinimum-Distance bounds for binary linear codes\u201d, IEEE Trans. Inform. Theory, Vol. IT-19, p. 344\u2013356, May 1973.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"12_CR3","volume-title":"The theory of error-correcting codes","author":"F.J. MacWilliams","year":"1977","unstructured":"F.J. MacWilliams and N.J.A. Sloane, \u201cThe theory of error-correcting codes\u201d, North-Holland Publishing Company, Amsterdam, 1977."},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"W. Meier and O. Staffelbach, \u201cNonlinearity criteria for cryptographic functions\u201d, Advances in Cryptology, Proc. Eurocrypt 89, Springer Verlag, 1990, pp. 549\u2013562.","DOI":"10.1007\/3-540-46885-4_53"},{"key":"12_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/3-540-46877-3_14","volume-title":"Advances in Cryptology, Proc. Eurocrypt 90","author":"B. Preneel","year":"1991","unstructured":"B. Preneel, W. Van Leekwijck, L. Van Linden, R. Govaerts and J. Vandewalle, \u201cPropagation Characteristics of Boolean Functions\u201d, Advances in Cryptology, Proc. Eurocrypt 90, Lecture Notes in Computer Science 473, Springer Verlag, 1991, pp. 161\u2013173."},{"key":"12_CR6","unstructured":"R.A. Rueppel, \u201cStream Ciphers\u201d, in Contemporary Cryptology: The Science of Information Integrity, G. Simmons, ed., IEEE Press, to appear."},{"key":"12_CR7","doi-asserted-by":"publisher","first-page":"776","DOI":"10.1109\/TIT.1984.1056949","volume":"IT-30","author":"T. Siegenthaler","year":"1984","unstructured":"T. Siegenthaler, \u201cCorrelation immunity of non-linear combining functions for cryptographic applications\u201d, IEEE Trans. Inform. Theory, Vol. IT-30, p. 776\u2013780, Oct. 1984.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"12_CR8","unstructured":"W. Van Leekwijck and L. Van Linden, \u201cCryptographic properties of Boolean functions \u2014 in Dutch, Cryptografische eigenschappen van Booleaanse functies\u201d, ESAT Katholieke Universiteit Leuven, Thesis grad. eng., 1990."},{"key":"12_CR9","doi-asserted-by":"publisher","first-page":"569","DOI":"10.1109\/18.6037","volume":"IT-34","author":"G.-Z. Xiao","year":"1988","unstructured":"G.-Z. Xiao and J.L. Massey, \u201cA spectral characterization of correlation-immune combining functions\u201d, IEEE Trans. Inform. Theory, Vol. IT-34, p. 569\u2013571, May 1988.","journal-title":"IEEE Trans. Inform. Theory"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201991"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-46416-6_12.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:11:19Z","timestamp":1605647479000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-46416-6_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540546207"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/3-540-46416-6_12","relation":{},"subject":[]}}