{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,22]],"date-time":"2025-01-22T05:06:42Z","timestamp":1737522402960,"version":"3.33.0"},"publisher-location":"Boston, MA","reference-count":11,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387731360"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-73137-7_19","type":"book-chapter","created":{"date-parts":[[2007,9,28]],"date-time":"2007-09-28T05:06:58Z","timestamp":1190956018000},"page":"215-224","source":"Crossref","is-referenced-by-count":0,"title":["Strong Boolean Functions with Compact ANF Representation"],"prefix":"10.1007","author":[{"given":"Anna Grocholewska","family":"Czurylo","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","doi-asserted-by":"publisher","first-page":"1170","DOI":"10.1109\/18.57222","volume":"IT-36","author":"C.M. Adams","year":"1990","unstructured":"C. M. Adams, S. E. Tavares. Generating and Counting Binary Bent Sequences. In IEEE Transactions on Information Theory, IT-36:1170\u20131173, 1990.","journal-title":"IEEE Transactions on Information Theory"},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"J. A. Clark, J. L. Jacob, S. Stepney. Searching for cost functions. In CEC 2004: International Conference on Evolutionary Computation, Portland OR, USA, June 2004, pages 1517\u20131524, IEEE 2004.","DOI":"10.1109\/CEC.2004.1331076"},{"key":"19_CR3","unstructured":"J. Fuller, W. Millan. On Linear Redundancy in the AES S-box. In Cryptology ePrint Archive, report 2002\/111 , eprint.iacr.org, Aug 2002."},{"key":"19_CR4","doi-asserted-by":"crossref","unstructured":"J. Fuller, W. Millan. Linear Redundancy in S-Boxes. In T. Johansson, editor, February 24-26, 2003. Revised Papers, volume 2887 of Lecture Notes in Computer Science, pages 74\u201386, 2003.","DOI":"10.1007\/978-3-540-39887-5_7"},{"issue":"3","key":"19_CR5","doi-asserted-by":"publisher","first-page":"569","DOI":"10.1109\/18.6037","volume":"34","author":"X. Guo-Zhen","year":"May 1988","unstructured":"X. Guo-Zhen, J. Massey. A spectral characterization of correlation immune combining functions. In IEEE Transactions on Information Theory, 34(3):569\u2013571, May 1988.","journal-title":"IEEE Transactions on Information Theory"},{"key":"19_CR6","doi-asserted-by":"crossref","unstructured":"X. D. Hou. On the norm and covering radius of first-order Reed-Muller codes. In IEEE Transactions on Information Theory, 43(3):1025\u20131027, May 1997.","DOI":"10.1109\/18.568715"},{"key":"19_CR7","doi-asserted-by":"publisher","first-page":"747","DOI":"10.1109\/TC.1979.1675242","volume":"C-28","author":"J.B. Kam","year":"1979","unstructured":"J. B. Kam, G. Davida. Structured Design of Substitution-Permutation Encryption Networks. In IEEE Transactions on Computers, C-28:747\u2013753, 1979.","journal-title":"IEEE Transactions on Computers"},{"key":"19_CR8","unstructured":"J. A. Maiorana A Class of Bent Functions. In R41 Technical Paper, 1971."},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"W. Meier, O. Staffelbach. Nonlinearity criteria for cryptographic functions. In J. J. Quisquater, J. Vandewalle, editors, Advances in Cryptology: EUROCRYPT 1989, pages 549\u2013562, LNCS 434, Springer, 1989.","DOI":"10.1007\/3-540-46885-4_53"},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"W. Millan, A. Clark, E. Dawson. Heuristic design of cryptographically strong balanced Boolean functions. In Advances in Cryptology: EUROCRYPT 1998, pages 489\u2013499, LNCS 1403, Springer, 1998.","DOI":"10.1007\/BFb0054148"},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"O. S. Rothaus. On bent functions. In Journal of Combinatorial Theory: Series A, 20:300\u2013305, 1976.","DOI":"10.1016\/0097-3165(76)90024-8"}],"container-title":["Advances in Information Processing and Protection"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-73137-7_19.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T07:52:11Z","timestamp":1737445931000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-73137-7_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387731360"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-73137-7_19","relation":{},"subject":[]}}