{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T13:36:13Z","timestamp":1726407373501},"publisher-location":"Boston, MA","reference-count":22,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781461346357"},{"type":"electronic","value":"9781441985309"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/978-1-4419-8530-9_29","type":"book-chapter","created":{"date-parts":[[2012,7,28]],"date-time":"2012-07-28T23:10:26Z","timestamp":1343517026000},"page":"361-370","source":"Crossref","is-referenced-by-count":5,"title":["Generating Bent Functions"],"prefix":"10.1007","author":[{"given":"Anna","family":"Grocholewska-Czurylo","sequence":"first","affiliation":[]},{"given":"Janusz","family":"Stoklosa","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"29_CR1","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/BF02318546","volume":"7","author":"LJ O\u2019Connor","year":"1994","unstructured":"O\u2019Connor L.J. An analysis of a class of algorithms for S-box construction. Journal of Cryptology, 7(3):133\u2013152, 1994.","journal-title":"Journal of Cryptology"},{"key":"29_CR2","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon C.E. Communication Theory of Secrecy Systems. Bell Systems Technical Journal, 28:656\u2013715, 1949.","journal-title":"Bell Systems Technical Journal"},{"key":"29_CR3","first-page":"378","volume":"547","author":"K Nyberg","year":"1991","unstructured":"Nyberg K. Perfect nonlinear S-boxes. Advances of Cryptology-EUROCRYPT\u201991, LNCS, 547:378\u2013386, 1991.","journal-title":"Advances of Cryptology-EUROCRYPT\u201991, LNCS"},{"doi-asserted-by":"crossref","unstructured":"Seberry J., Zhang X.M., Zheng Y. Systematic generation of cryptographically robust S-boxes. Proceedings of the 1st ACM Conference on Computer and Communication Security, 1993.","key":"29_CR4","DOI":"10.1145\/168588.168610"},{"key":"29_CR5","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1016\/0097-3165(76)90024-8","volume":"20","author":"OS Rothaus","year":"1976","unstructured":"Rothaus OS. On bent functions. Journal of Combinatorial Theory, 20:300\u2013305, 1976.","journal-title":"Journal of Combinatorial Theory"},{"key":"29_CR6","first-page":"161","volume":"473","author":"B Preneel","year":"1991","unstructured":"Preneel B, Van Leekwijck W, Van Linden L, Govaerts R, Vandewalle J. Propagation characteristics of Boolean functions. Advances in Cryptology \u2014 EUROCRYPT\u201990, LNCS, 473:161\u2013173, 1991.","journal-title":"Advances in Cryptology \u2014 EUROCRYPT\u201990, LNCS"},{"unstructured":"Dillon J.F. A Survey of Bent Functions, NSA Technical Journal, Special Issue, 191\u2013215, 1972.","key":"29_CR7"},{"key":"29_CR8","doi-asserted-by":"publisher","first-page":"1170","DOI":"10.1109\/18.57222","volume":"IT-36","author":"CM Adams","year":"1990","unstructured":"Adams C.M., Tavares S.E. Generating and Counting Binary Bent Sequences, IEEE Transactions on Information Theory, IT-36:1170\u20131173,1990.","journal-title":"IEEE Transactions on Information Theory"},{"unstructured":"Maiorana J. A. A Class of Bent Functions, R41 Technical Paper, 1971.","key":"29_CR9"},{"unstructured":"Adams CM. A Formal and Practical Design Procedure for Substitution Permutation Network Cryptosystems, Ph.D. Thesis, Department of Electrical Engineering, Queen\u2019s University, 1990.","key":"29_CR10"},{"doi-asserted-by":"crossref","unstructured":"Dawson M, Tavares S. E. An Expanded Set of S-Box Design Criteria Based on Information Theory and its Relation to Differential-Like Attacks, Advances in Cryptology. Proc. of EUROCRYPT\u201991, 352\u2013367, 1991.","key":"29_CR11","DOI":"10.1007\/3-540-46416-6_30"},{"key":"29_CR12","doi-asserted-by":"publisher","first-page":"747","DOI":"10.1109\/TC.1979.1675242","volume":"C-28","author":"JB Kam","year":"1979","unstructured":"Kam J.B., Davida G. Structured Design of Substitution-Permutation Encryption Networks, IEEE Transactions on Computers, C-28:747\u2013753, 1979.","journal-title":"IEEE Transactions on Computers"},{"unstructured":"O\u2019Connor L. An Analysis of Product Ciphers Based on the Properties of Boolean Functions, Ph.D. Thesis, Dept. of Computer Science, University of Waterloo, 1992.","key":"29_CR13"},{"doi-asserted-by":"crossref","unstructured":"Webster A.F., Tavares S.E. On the Design of S-Boxes, Advances in Cryptology: Proc. of CRYPTO\u201985, 523\u2013534, 1986.","key":"29_CR14","DOI":"10.1007\/3-540-39799-X_41"},{"doi-asserted-by":"crossref","unstructured":"Forr\u00e9 R. The strict avalanche criterion: spectral properties of Boolean functions with high nonlinearity. Advances in Cryptology \u2014 CRYPTO\u2019 88, Springer-Verlag, 1990.","key":"29_CR15","DOI":"10.1007\/0-387-34799-2_31"},{"key":"29_CR16","first-page":"549","volume":"434","author":"W Meier","year":"1990","unstructured":"Meier W., Staffelbach A. Nonlinearity criteria for cryptographic functions. Advances in Cryptology \u2014 EUROCRYPT\u201989, LNCS, 434:549\u2013562, 1990.","journal-title":"Advances in Cryptology \u2014 EUROCRYPT\u201989, LNCS"},{"doi-asserted-by":"crossref","unstructured":"Biham E., Shamir A. Differential Cryptanalysis of the Data Encryption Standard. Springer-Verlag, 1993.","key":"29_CR17","DOI":"10.1007\/978-1-4613-9314-6"},{"doi-asserted-by":"crossref","unstructured":"Matsui M. Linear cryptanalysis method for DES cipher. Abstracts of EUROCRYPT\u201993, 1993.","key":"29_CR18","DOI":"10.1007\/3-540-48285-7_33"},{"key":"29_CR19","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/0024-3795(82)90210-5","volume":"45","author":"R Yarlagadda","year":"1982","unstructured":"Yarlagadda R., Hershey J.E. A note on the eigenvectors of Hadamard matrices of order 2n, Linear Algebra &Appl., 45:43\u201353, 1982.","journal-title":"Linear Algebra &Appl"},{"key":"29_CR20","first-page":"112","volume":"136","author":"R Yarlagadda","year":"1989","unstructured":"Yarlagadda R., Hershey J.E. Analysis and synthesis of bent sequences, Proc. IEE, 136:112\u2013123,1989.","journal-title":"Proc. IEE"},{"doi-asserted-by":"crossref","unstructured":"Nyberg K. Constructions of bent functions and difference sets, Advances in Cryptology-EUROCRYPT\u201990, LNCS, 473, 1991.","key":"29_CR21","DOI":"10.1007\/3-540-46877-3_13"},{"unstructured":"Mister S., Adams C. Practical S-Box Design, Workshop on Selected Areas in Cryptography (SAC\u2019 96) Workshop Record, Queens University, pp. 61\u201376, 1996.","key":"29_CR22"}],"container-title":["Advanced Computer Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4419-8530-9_29.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,18]],"date-time":"2020-11-18T05:18:48Z","timestamp":1605676728000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4419-8530-9_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9781461346357","9781441985309"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-1-4419-8530-9_29","relation":{},"subject":[],"published":{"date-parts":[[2002]]}}}