{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T15:20:15Z","timestamp":1753888815604},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540611868"},{"type":"electronic","value":"9783540683391"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1996]]},"DOI":"10.1007\/3-540-68339-9_25","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T01:31:14Z","timestamp":1186363874000},"page":"283-293","source":"Crossref","is-referenced-by-count":14,"title":["Construction of t-Resilient Functions over a Finite Alphabet"],"prefix":"10.1007","author":[{"given":"Paul","family":"Camion","sequence":"first","affiliation":[]},{"given":"Anne","family":"Canteaut","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,13]]},"reference":[{"issue":"2","key":"25_CR1","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1137\/0217014","volume":"17","author":"C.H. Bennett","year":"1988","unstructured":"C.H. Bennett, G. Brassard, and J.-M. Robert. Privacy amplification by public discussion. SIAM J. Computing, 17(2):210\u2013229, april 1988.","journal-title":"SIAM J. Computing"},{"key":"25_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1007\/3-540-48658-5_24","volume-title":"Advances in Cryptology-CRYPTO\u201994","author":"J. Bierbrauer","year":"1994","unstructured":"J. Bierbrauer, K. Gopalakrishnan, and D.R. Stinson. Bounds for resilient functions and orthogonal arrays. In Y.G. Desmedt, editor, Advances in Cryptology-CRYPTO\u201994, number 839 in Lecture Notes in Computer Science, pages 247\u2013256, 1994."},{"key":"25_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1007\/3-540-46766-1_6","volume-title":"Advances in Cryptology-CRYPTO\u201991","author":"P. Camion","year":"1992","unstructured":"P. Camion, C. Carlet, P. Charpin, and N. Sendrier. On correlation-immune functions. In J. Feigenbaum, editor, Advances in Cryptology-CRYPTO\u201991, number 576 in Lecture Notes in Computer Science, pages 86\u2013100. Springer-Verlag, 1992."},{"key":"25_CR4","doi-asserted-by":"crossref","unstructured":"B. Chor, O. Goldreich, J. Hastad, J. Freidmann, S. Rudich, and R. Smolensky. The bit extraction problem or t-resilient functions. In Proc. 26th IEEE Symposium on Foundations of Computer Science, pages 396\u2013407, 1985.","DOI":"10.1109\/SFCS.1985.55"},{"key":"25_CR5","unstructured":"P. Delsarte. An algebraic approach to the association schemes of coding theory. Thesis, Universit\u00e9 catholique de Louvain, 1973."},{"key":"25_CR6","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/BF01388386","volume":"5","author":"K. Gopalakrishnan","year":"1995","unstructured":"K. Gopalakrishnan and D.R. Stinson. Three characterizations of non-binary correlation-immune and resilient functions. Designs, Codes and Cryptography, 5:241\u2013251, 1995.","journal-title":"Designs, Codes and Cryptography"},{"key":"25_CR7","unstructured":"F.J. MacWilliams and N.J.A. Sloane. The Theory of Error-correcting Codes. North-Holland, 1983."},{"key":"25_CR8","unstructured":"J.L. Massey. Some applications of coding theory in cryptography. In IMA Conference Proceedings on Cryptography and Coding IV, 1993."},{"key":"25_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1007\/0-387-34805-0_11","volume-title":"Advances in Cryptology-CRYPTO\u201989","author":"U.M. Maurer","year":"1990","unstructured":"U.M. Maurer and J.L. Massey. Perfect local randomness in pseudo-random sequences. In G. Brassard, editor, Advances in Cryptology-CRYPTO\u201989, number 435 in Lecture Notes in Computer Science, pages 100\u2013112. Springer-Verlag, 1990."},{"key":"25_CR10","doi-asserted-by":"publisher","first-page":"128","DOI":"10.2307\/2983576","volume":"9","author":"C.R. Rao","year":"1947","unstructured":"C.R. Rao. Factorial experiments derivable from combinatorial arrangements of arrays. J. Roy. Statist., 9:128\u2013139, 1947.","journal-title":"J. Roy. Statist."},{"key":"25_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/BFb0053423","volume-title":"Advances in Cryptology-EUROCRYPT\u201994","author":"C.-P. Schnorr","year":"1995","unstructured":"C.-P. Schnorr and S. Vaudenay. Black box cryptanalysis of hash networks based on multipermutations. In A. De Santis, editor, Advances in Cryptology-EUROCRYPT\u201994, number 950 in Lecture Notes in Computer Science, pages 47\u201357. Springer-Verlag, 1995."},{"issue":"5","key":"25_CR12","doi-asserted-by":"publisher","first-page":"776","DOI":"10.1109\/TIT.1984.1056949","volume":"IT-30","author":"T. Siegenthaler","year":"1984","unstructured":"T. Siegenthaler. Correlation-immunity of nonlinear combining functions for cryptographic applications. IEEE Trans. Inform. Theory, IT-30(5):776\u2013780, 1984.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"25_CR13","series-title":"Lect Notes Comput Sci","volume-title":"Fast Software Encryption","author":"S. Vaudenay","year":"1995","unstructured":"S. Vaudenay. On the need for multipermutations: cryptanalysis of MD4 and SAFER. In Fast Software Encryption, Lecture Notes in Computer Science. Springer-Verlag. to appear."},{"key":"25_CR14","unstructured":"S. Vaudenay. La s\u00e9curit\u00e9 des primitives cryptographiques. PhD thesis, Universit\u00e9 Paris 7, 1995. in french."},{"issue":"3","key":"25_CR15","doi-asserted-by":"publisher","first-page":"569","DOI":"10.1109\/18.6037","volume":"IT-34","author":"G. Xiao","year":"1988","unstructured":"G. Xiao and J.L. Massey. A spectral characterization of correlation-immune combining functions. IEEE Trans. Inform. Theory, IT-34(3):569\u2013571, 1988.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"25_CR16","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"274","DOI":"10.1007\/3-540-49264-X_22","volume-title":"Advances in Cryptology-EUROCRYPT\u201995","author":"X. Zhang","year":"1995","unstructured":"X. Zhang and Y. Zheng. On nonlinear resilient functions. In L. Guillou and J.J. Quisquater, editors, Advances in Cryptology-EUROCRYPT\u201995, number 921 in Lecture Notes in Computer Science, pages 274\u2013288. Springer-Verlag, 1995."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201996"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-68339-9_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,17]],"date-time":"2019-01-17T16:31:43Z","timestamp":1547742703000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-68339-9_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1996]]},"ISBN":["9783540611868","9783540683391"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/3-540-68339-9_25","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1996]]}}}