{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T06:12:04Z","timestamp":1725603124054},"publisher-location":"London","reference-count":9,"publisher":"Springer London","isbn-type":[{"type":"print","value":"9781852331962"},{"type":"electronic","value":"9781447105510"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/978-1-4471-0551-0_19","type":"book-chapter","created":{"date-parts":[[2011,8,26]],"date-time":"2011-08-26T08:46:19Z","timestamp":1314348379000},"page":"263-272","source":"Crossref","is-referenced-by-count":0,"title":["Inclusion Relations of Boolean Functions Satisfying PC(l) of Order k"],"prefix":"10.1007","author":[{"given":"Tetsu","family":"Iwata","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Kaoru","family":"Kurosawa","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"19_CR1","first-page":"462","volume-title":"On the propagation criterion of degree 1 and order k. In Advances in Cryptology \u2014 EUROCRYPT \u201888 Proceedings, Lecture Notes in Computer Science 1403","author":"C Carlet","year":"1998","unstructured":"C. Carlet. On the propagation criterion of degree 1 and order k. In Advances in\n                Cryptology \u2014 EUROCRYPT \u201888 Proceedings, Lecture Notes in Computer Science 1403, pages 462\u2013474. Springer-Verlag, 1998."},{"key":"19_CR2","volume-title":"Elementary Hadamarddifference sets. Ph. D. Thesis. Univ. of Maryland","author":"JF Dillon","year":"1974","unstructured":"J.F. Dillon. Elementary Hadamard difference sets. Ph. D. Thesis. Univ. of Maryland. 1974."},{"key":"19_CR3","first-page":"450","volume-title":"The strict avalanche criterion: spectral properties of Boolean functions and an extend definition. In Advances in Cryptology \u2014 CRYPTO \u201888 Proceedings, Lecture Notes in Computer Science","author":"R Forr\u00e9","year":"1990","unstructured":"R. Forr\u00e9. The strict avalanche criterion: spectral properties of Boolean functions and an extend definition. In Advances in Cryptology \u2014 CRYPTO \u201888 Proceedings, Lecture Notes in Computer Science 403, pages 450\u2013468. Springer-Verlag, 1990."},{"key":"19_CR4","volume-title":"Boolean functions related to cryptography and their complexity. Doctoral dissertation","author":"S Hirose","year":"1995","unstructured":"S. Hirose. Boolean functions related to cryptography and their complexity. Doctoral dissertation. Kyoto Univ. Japan. February 1995."},{"key":"19_CR5","first-page":"434","volume-title":"Design of SAC\/PC(1) of order k Boolean functions and three other cryptographic criteria. InAdvances in Cryptology \u2014 EUROCRYPT \u201887 Proceedings, Lecture Notes in Computer Science1233","author":"K Kurosawa","year":"1997","unstructured":"K. Kurosawa and T. Satoh. Design of SAC\/PC(1) of order k Boolean functions and three other cryptographic criteria. In Advances in Cryptology \u2014 EUROCRYPT \u201887 Proceedings, Lecture Notes in Computer Science 1233, pages 434\u2013449. Springer-Verlag, 1997."},{"key":"19_CR6","first-page":"549","volume-title":"Nonlinearity criteria for cryptographic functions. In Advances in Cryptology \u2014 EUROCRYPT \u201889 Proceedings, Lecture Notes in ComputerScience 434","author":"W Meier","year":"1990","unstructured":"W. Meier and O. Staffelbach. Nonlinearity criteria for cryptographic functions. In Advances in Cryptology \u2014 EUROCRYPT \u201889 Proceedings, Lecture Notes in\n                Computer Science 434, pages 549\u2013562. Springer-Verlag, 1990."},{"key":"19_CR7","first-page":"161","volume-title":"Propagation characteristics of Boolean functions. In Advances in Cryptology \u2014 EUROCRYPT \u201880 Proceedings, Lecture Notes in Computer Science","author":"B Preneel","year":"1991","unstructured":"B. Preneel, W. van Leekwijck, L. van Linden, R. Govaerts, and J. Vandewalle. Propagation characteristics of Boolean functions. In Advances in Cryptology \u2014 EUROCRYPT \u201880 Proceedings, Lecture Notes in Computer Science 473, pages 161\u2013173. Springer-Verlag, 1991."},{"issue":"1","key":"19_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1006\/inco.1995.1073","volume":"119","author":"J Seberry","year":"1995","unstructured":"J. Seberry, X. Zhang and Y. Zheng. Nonlinearity and propagation characteristics of Boolean functions. In Information and Computation, vol. 119, No. 1, pages 1\u201313, 1995.","journal-title":"Information and Computation"},{"key":"19_CR9","first-page":"523","volume-title":"On the design of S-boxes. In Advances in Cryptology \u2014 CRYPTO \u201885 Proceedings, Lecture Notes in Computer Science","author":"AF Webster","year":"1986","unstructured":"A.F. Webster and S.E. Tavares. On the design of S-boxes. In Advances in Cryptology \u2014 CRYPTO \u201885 Proceedings, Lecture Notes in Computer Science 218, pages 523\u2013534. Springer-Verlag, 1986."}],"container-title":["Sequences and their Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4471-0551-0_19.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,1]],"date-time":"2021-05-01T00:26:16Z","timestamp":1619828776000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4471-0551-0_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9781852331962","9781447105510"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-1-4471-0551-0_19","relation":{},"subject":[],"published":{"date-parts":[[1999]]}}}