{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,9]],"date-time":"2025-05-09T18:23:49Z","timestamp":1746815029577},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540629757"},{"type":"electronic","value":"9783540690535"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1997]]},"DOI":"10.1007\/3-540-69053-0_30","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T01:24:05Z","timestamp":1186363445000},"page":"434-449","source":"Crossref","is-referenced-by-count":22,"title":["Design of SAC\/PC(l) of Order k Boolean Functions and Three Other Cryptographic Criteria"],"prefix":"10.1007","author":[{"given":"Kaoru","family":"Kurosawa","sequence":"first","affiliation":[]},{"given":"Takashi","family":"Satoh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,13]]},"reference":[{"key":"30_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"450","DOI":"10.1007\/0-387-34799-2_31","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 88 Proceedings","author":"R. Forr\u00e9","year":"1990","unstructured":"R. Forr\u00e9. The strict avalanche criterion: spectral properties of Boolean functions and an extend definition. In Advances in Cryptology \u2014 CRYPTO\u2019 88 Proceedings, Lecture Notes in Computer Science 403, pages 450\u2013468. Springer-Verlag, 1990."},{"key":"30_CR2","doi-asserted-by":"crossref","unstructured":"T. Jakobsen and L.R. Knudsen. The interpolation attack on block ciphers. In Preproc. of Fast Software Encryption, pages 28\u201340. January, 1997.","DOI":"10.1007\/BFb0052332"},{"key":"30_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/BFb0034849","volume-title":"Advances in Cryptology \u2014 ASIACRYPT\u2019 96 Proceedings","author":"K. Kurosawa","year":"1996","unstructured":"K. Kurosawa and T. Satoh. Generalization of higher order SAC to vector output Boolean functions. In Advances in Cryptology \u2014 ASIACRYPT\u2019 96 Proceedings, Lecture Notes in Computer Science 1163, pages 218\u2013231. Springer-Verlag, 1996."},{"key":"30_CR4","unstructured":"S. Lidl and Niederreiter. Finite Fields, Encyclopedia of Mathematics and Its Applications 20. Cambridge University Press, 1983."},{"key":"30_CR5","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/BF00193564","volume":"5","author":"S. Lloyd","year":"1992","unstructured":"S. Lloyd. Counting binary functions with certain cryptographic properties. Journal of Cryptology, 5:107\u2013131, 1992.","journal-title":"Journal of Cryptology"},{"key":"30_CR6","unstructured":"F. J. MacWilliams and N. J. A. Sloane. The theory of error-correcting codes. North-Holland Publishing Company, 1977."},{"key":"30_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u2019 93 Proceedings","author":"M. Matsui","year":"1994","unstructured":"M. Matsui. Linear cryptanalysis method for DES cipher. In Advances in Cryptology \u2014 EUROCRYPT\u2019 93 Proceedings, Lecture Notes in Computer Science 765, pages 386\u2013397. Springer-Verlag, 1994."},{"key":"30_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"549","DOI":"10.1007\/3-540-46885-4_53","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u2019 89 Proceedings","author":"W. Meier","year":"1990","unstructured":"W. Meier and O. Staffelbach. Nonlinearity criteria for cryptographic functions. In Advances in Cryptology \u2014 EUROCRYPT\u2019 89 Proceedings, Lecture Notes in Computer Science 434, pages 549\u2013562. Springer-Verlag, 1990."},{"key":"30_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"378","DOI":"10.1007\/3-540-46416-6_32","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u2019 91 Proceedings","author":"K. Nyberg","year":"1991","unstructured":"K. Nyberg. Perfect nonlinear S-boxes. In Advances in Cryptology \u2014 EUROCRYPT\u2019 91 Proceedings, Lecture Notes in Computer Science 547, pages 378\u2013386. Springer-Verlag, 1991."},{"issue":"6","key":"30_CR10","first-page":"325","volume":"35","author":"J. Pieprzyk","year":"1988","unstructured":"J. Pieprzyk and G. Finkelstein. Towards effective nonlinear cryptosystem design. IEE Proceedings Part E, 35(6):325\u2013335, November 1988.","journal-title":"IEE Proceedings Part E"},{"key":"30_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/3-540-46877-3_14","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u2019 90 Proceedings","author":"B. Preneel","year":"1991","unstructured":"B. Preneel, W. Van Leekwijck, L. Van Linden, R. Govaerts, and J. Vandewalle. Propagation characteristics of Boolean functions. In Advances in Cryptology \u2014 EUROCRYPT\u2019 90 Proceedings, Lecture Notes in Computer Science 473, pages 161\u2013173. Springer-Verlag, 1991."},{"key":"30_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1007\/3-540-46416-6_12","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u2019 91 Proceedings","author":"B. Preneel","year":"1991","unstructured":"B. Preneel, R. Govaerts, and J. Vandewalle. Boolean functions satisfying higher order propagation criteria. In Advances in Cryptology \u2014 EUROCRYPT\u2019 91 Proceedings, Lecture Notes in Computer Science 547, pages 141\u2013152. Springer-Verlag, 1991."},{"key":"30_CR13","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1016\/0097-3165(76)90024-8","volume":"20","author":"O. S. Rothaus","year":"1976","unstructured":"O. S. Rothaus. On bent functions. Journal of Combinatorial Theory (A), 20:300\u2013305, 1976.","journal-title":"Journal of Combinatorial Theory (A)"},{"key":"30_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-57220-1","volume-title":"Advances in Cryptology \u2014 AUSCRYPT\u2019 92 Proceedings","author":"J. Seberry","year":"1993","unstructured":"J. Seberry and X.M. Zhang. Highly nonlinear 0\u20131 balanced Boolean functions satisfying strict avalanche criterion. In Advances in Cryptology \u2014 AUSCRYPT\u2019 92 Proceedings, Lecture Notes in Computer Science 718. Springer-Verlag, 1993."},{"key":"30_CR15","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1007\/3-540-39799-X_41","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 85 Proceedings","author":"A. F. Webster","year":"1986","unstructured":"A. F. Webster and S. E. Tavares. On the design of S-boxes. In Advances in Cryptology \u2014 CRYPTO\u2019 85 Proceedings, Lecture Notes in Computer Science 218, pages 523\u2013534. Springer-Verlag, 1986."},{"key":"30_CR16","doi-asserted-by":"crossref","unstructured":"A. M. Youssef, T. W. Cusick, P. St\u0102nic\u0102, and S. E. Tavares. New bounds on the number of functions satisfying the strict avalanche criterion. In Third Annual Workshop on Selected Areas in Cryptography, 1996.","DOI":"10.1016\/S0020-0190(96)00166-4"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201997"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-69053-0_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,13]],"date-time":"2023-05-13T17:59:12Z","timestamp":1684000752000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-69053-0_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997]]},"ISBN":["9783540629757","9783540690535"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/3-540-69053-0_30","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1997]]}}}