{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T17:26:19Z","timestamp":1775755579909,"version":"3.50.1"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783031229114","type":"print"},{"value":"9783031229121","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-22912-1_22","type":"book-chapter","created":{"date-parts":[[2022,12,31]],"date-time":"2022-12-31T15:38:49Z","timestamp":1672501129000},"page":"492-514","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Weightwise Almost Perfectly Balanced Functions: Secondary Constructions for\u00a0All n and\u00a0Better Weightwise Nonlinearities"],"prefix":"10.1007","author":[{"given":"Agnese","family":"Gini","sequence":"first","affiliation":[]},{"given":"Pierrick","family":"M\u00e9aux","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,1]]},"reference":[{"key":"22_CR1","doi-asserted-by":"crossref","unstructured":"Braeken, A., Preneel, B.: On the algebraic immunity of symmetric Boolean functions. In: Progress in Cryptology - INDOCRYPT 2005, 6th International Conference on Cryptology in India, Bangalore, India, December 10\u201312, 2005, pp. 35\u201348. Proceedings (2005)","DOI":"10.1007\/11596219_4"},{"key":"22_CR2","doi-asserted-by":"publisher","first-page":"2178","DOI":"10.1109\/TIT.2004.833361","volume":"50","author":"C Carlet","year":"2004","unstructured":"Carlet, C.: On the degree, nonlinearity, algebraic thickness, and nonnormality of Boolean functions, with developments on symmetric functions. IEEE Trans. Inf. Theor. 50, 2178\u20132185 (2004)","journal-title":"IEEE Trans. Inf. Theor."},{"key":"22_CR3","volume-title":"Boolean Functions for Cryptography and Coding Theory","author":"C Carlet","year":"2021","unstructured":"Carlet, C.: Boolean Functions for Cryptography and Coding Theory. Cambridge University Press, Cambridge (2021)"},{"issue":"4","key":"22_CR4","doi-asserted-by":"publisher","first-page":"2522","DOI":"10.1109\/TIT.2011.2111810","volume":"57","author":"Y Chen","year":"2011","unstructured":"Chen, Y., Lu, P.: Two classes of symmetric Boolean functions with optimum algebraic immunity: construction and analysis. IEEE Trans. Info. Theor. 57(4), 2522\u20132538 (2011)","journal-title":"IEEE Trans. Info. Theor."},{"key":"22_CR5","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1007\/978-3-030-36237-9_10","volume-title":"Algebra, Codes and Cryptology","author":"C Carlet","year":"2019","unstructured":"Carlet, C., M\u00e9aux, P.: Boolean functions for homomorphic-friendly stream ciphers. In: Gueye, C.T., Persichetti, E., Cayrel, P.-L., Buchmann, J. (eds.) A2C 2019. CCIS, vol. 1133, pp. 166\u2013182. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-36237-9_10"},{"issue":"5","key":"22_CR6","doi-asserted-by":"publisher","first-page":"3404","DOI":"10.1109\/TIT.2021.3139804","volume":"68","author":"C Carlet","year":"2022","unstructured":"Carlet, C., M\u00e9aux, P.: A complete study of two classes of Boolean functions: direct sums of monomials and threshold functions. IEEE Trans. Inf. Theor. 68(5), 3404\u20133425 (2022)","journal-title":"IEEE Trans. Inf. Theor."},{"key":"22_CR7","first-page":"2017","volume":"3","author":"C Carlet","year":"2017","unstructured":"Carlet, C., M\u00e9aux, P., Rotella, Y.: Boolean functions with restricted input and their robustness; application to the FLIP cipher. IACR Trans. Symmetric Cryptol. 3, 2017 (2017)","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"22_CR8","doi-asserted-by":"publisher","first-page":"2791","DOI":"10.1109\/TIT.2005.851743","volume":"51","author":"A Canteaut","year":"2005","unstructured":"Canteaut, A., Videau, M.: Symmetric Boolean functions. IEEE Trans. Inf. Theor. 51, 2791\u20132811 (2005)","journal-title":"IEEE Trans. Inf. Theor."},{"key":"22_CR9","doi-asserted-by":"publisher","first-page":"80733","DOI":"10.1109\/ACCESS.2019.2923456","volume":"7","author":"Y Chen","year":"2019","unstructured":"Chen, Y., Zhang, L., Guo, F., Cai, W.: Fast algebraic immunity of $$2^{m+2}$$ and $$2^{m+3}$$ variables majority function. IEEE Access 7, 80733\u201380736 (2019)","journal-title":"IEEE Access"},{"key":"22_CR10","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/s10623-005-6300-x","volume":"40","author":"DK Dalai","year":"2006","unstructured":"Dalai, D.K., Maitra, S., Sarkar, S.: Basic theory in construction of Boolean functions with maximum possible annihilator immunity. Des. Codes Crypt. 40, 41\u201358 (2006)","journal-title":"Des. Codes Crypt."},{"issue":"10","key":"22_CR11","doi-asserted-by":"publisher","first-page":"589","DOI":"10.2307\/2304500","volume":"54","author":"NJ Fine","year":"1947","unstructured":"Fine, N.J.: Binomial coefficients modulo a prime. Am. Math. Monthly 54(10), 589\u2013592 (1947)","journal-title":"Am. Math. Monthly"},{"key":"22_CR12","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1016\/j.dam.2022.08.017","volume":"322","author":"A Gini","year":"2022","unstructured":"Gini, A., M\u00e9aux, P.: On the weightwise nonlinearity of weightwise perfectly balanced functions. Discrete Appl. Math. 322, 320\u2013341 (2022)","journal-title":"Discrete Appl. Math."},{"key":"22_CR13","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.dam.2021.10.011","volume":"307","author":"X Guo","year":"2022","unstructured":"Guo, X., Sihong, S.: Construction of weightwise almost perfectly balanced Boolean functions on an arbitrary number of variables. Discrete Appl. Math. 307, 102\u2013114 (2022)","journal-title":"Discrete Appl. Math."},{"key":"22_CR14","doi-asserted-by":"crossref","first-page":"49","DOI":"10.4213\/mvk99","volume":"4","author":"I Ivchenko","year":"2013","unstructured":"Ivchenko, I., Medvedev, Y.I., Mironova, V.A.: Symmetric Boolean functions and their metric properties matrices of transitions of differences when using some modular groups. Mat. Vopr. Kriptogr. 4, 49\u201363 (2013)","journal-title":"Mat. Vopr. Kriptogr."},{"issue":"8","key":"22_CR15","doi-asserted-by":"publisher","first-page":"1797","DOI":"10.1007\/s10623-018-0579-x","volume":"87","author":"J Liu","year":"2019","unstructured":"Liu, J., Mesnager, S.: Weightwise perfectly balanced functions with high weightwise nonlinearity profile. Des. Codes Crypt. 87(8), 1797\u20131813 (2019)","journal-title":"Des. Codes Crypt."},{"key":"22_CR16","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1016\/j.dam.2020.01.020","volume":"279","author":"J Li","year":"2020","unstructured":"Li, J., Sihong, S.: Construction of weightwise perfectly balanced Boolean functions with high weightwise nonlinearity. Discrete Appl. Math. 279, 218\u2013227 (2020)","journal-title":"Discrete Appl. Math."},{"key":"22_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/978-3-030-30530-7_5","volume-title":"Progress in Cryptology \u2013 LATINCRYPT 2019","author":"P M\u00e9aux","year":"2019","unstructured":"M\u00e9aux, P.: On the fast algebraic immunity of majority functions. In: Schwabe, P., Th\u00e9riault, N. (eds.) LATINCRYPT 2019. LNCS, vol. 11774, pp. 86\u2013105. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-30530-7_5"},{"issue":"5","key":"22_CR18","doi-asserted-by":"publisher","first-page":"741","DOI":"10.1007\/s12095-021-00505-y","volume":"13","author":"P M\u00e9aux","year":"2021","unstructured":"M\u00e9aux, P.: On the fast algebraic immunity of threshold functions. Crypt. Commun. 13(5), 741\u2013762 (2021). https:\/\/doi.org\/10.1007\/s12095-021-00505-y","journal-title":"Crypt. Commun."},{"key":"22_CR19","series-title":"Part I, volume 9665 of LNCS","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/978-3-662-49890-3_13","volume-title":"EUROCRYPT 2016","author":"P M\u00e9aux","year":"2016","unstructured":"M\u00e9aux, P., Journault, A., Standaert, F.-X., Carlet, C.: Towards stream ciphers for efficient FHE with low-noise ciphertexts. In: Fischlin, M., Coron, J.-S. (eds.) EUROCRYPT 2016. Part I, volume 9665 of LNCS, pp. 311\u2013343. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-49890-3_13"},{"key":"22_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1007\/978-3-030-05378-9_16","volume-title":"Progress in Cryptology \u2013 INDOCRYPT 2018","author":"S Maitra","year":"2018","unstructured":"Maitra, S., Mandal, B., Martinsen, T., Roy, D., St\u0103nic\u0103, P.: Tools in analyzing linear approximation for Boolean functions related to FLIP. In: Chakraborty, D., Iwata, T. (eds.) INDOCRYPT 2018. LNCS, vol. 11356, pp. 282\u2013303. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-05378-9_16"},{"key":"22_CR21","doi-asserted-by":"crossref","unstructured":"Mario, L., Picek, S., Jakobovic, D., Djurasevic, M., Leporati, A.: Evolutionary construction of perfectly balanced Boolean functions (2022)","DOI":"10.1109\/CEC55065.2022.9870427"},{"issue":"6","key":"22_CR22","doi-asserted-by":"publisher","first-page":"951","DOI":"10.1007\/s12095-021-00481-3","volume":"13","author":"S Mesnager","year":"2021","unstructured":"Mesnager, S., Su, S.: On constructions of weightwise perfectly balanced Boolean functions. Crypt. Commun. 13(6), 951\u2013979 (2021). https:\/\/doi.org\/10.1007\/s12095-021-00481-3","journal-title":"Crypt. Commun."},{"key":"22_CR23","doi-asserted-by":"crossref","unstructured":"Mesnager, S., Su, S., Li, J.: On concrete constructions of weightwise perfectly balanced functions with optimal algebraic immunity and high weightwise nonlinearity. Boolean Functions and Applications (2021)","DOI":"10.1007\/s12095-021-00481-3"},{"issue":"1","key":"22_CR24","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/s12095-018-0293-6","volume":"11","author":"S Mesnager","year":"2019","unstructured":"Mesnager, S., Zhou, Z., Ding, C.: On the nonlinearity of Boolean functions with restricted input. Crypt. Commun. 11(1), 63\u201376 (2019)","journal-title":"Crypt. Commun."},{"key":"22_CR25","first-page":"35","volume":"49","author":"AK Oblaukhov","year":"2020","unstructured":"Oblaukhov, A.K.: On metric complements and metric regularity in finite metric spaces. Prikl. Diskr. Mat. 49, 35\u201345 (2020)","journal-title":"Prikl. Diskr. Mat."},{"key":"22_CR26","doi-asserted-by":"publisher","first-page":"2406","DOI":"10.1109\/TIT.2009.2015999","volume":"55","author":"L Qu","year":"2009","unstructured":"Qu, L., Feng, K., Liu, F., Wang, L.: Constructing symmetric Boolean functions with maximum algebraic immunity. IEEE Trans. Inf. Theor. 55, 2406\u20132412 (2009)","journal-title":"IEEE Trans. Inf. Theor."},{"key":"22_CR27","doi-asserted-by":"publisher","first-page":"2908","DOI":"10.1109\/TIT.2007.901189","volume":"53","author":"L Qu","year":"2007","unstructured":"Qu, L., Li, C., Feng, K.: A note on symmetric Boolean functions with maximum algebraic immunity in odd number of variables. IEEE Trans. Inf. Theor. 53, 2908\u20132910 (2007)","journal-title":"IEEE Trans. Inf. Theor."},{"key":"22_CR28","doi-asserted-by":"publisher","first-page":"2351","DOI":"10.1016\/j.disc.2006.08.008","volume":"307","author":"P Sarkar","year":"2007","unstructured":"Sarkar, P., Maitra, S.: Balancedness and correlation immunity of symmetric Boolean functions. Discrete Math. 307, 2351\u20132358 (2007)","journal-title":"Discrete Math."},{"key":"22_CR29","first-page":"181","volume":"107","author":"P Stanica","year":"2018","unstructured":"Stanica, P., Sasao, T., Butler, J.T.: Distance duality on some classes of Boolean functions. J. Comb. Math. Comb. Comput. 107, 181\u2013198 (2018)","journal-title":"J. Comb. Math. Comb. Comput."},{"key":"22_CR30","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1016\/j.dam.2021.02.033","volume":"297","author":"S Sihong","year":"2021","unstructured":"Sihong, S.: The lower bound of the weightwise nonlinearity profile of a class of weightwise perfectly balanced functions. Discrete Appl. Math. 297, 60\u201370 (2021)","journal-title":"Discrete Appl. Math."},{"key":"22_CR31","unstructured":"The Sage Developers. SageMath, the Sage Mathematics Software System (Version 9.5) (2022). https:\/\/www.sagemath.org"},{"issue":"6","key":"22_CR32","doi-asserted-by":"publisher","first-page":"1185","DOI":"10.1007\/s12095-019-00374-6","volume":"11","author":"D Tang","year":"2019","unstructured":"Tang, D., Liu, J.: A family of weightwise (almost) perfectly balanced Boolean functions with optimal algebraic immunity. Crypt. Commun. 11(6), 1185\u20131197 (2019). https:\/\/doi.org\/10.1007\/s12095-019-00374-6","journal-title":"Crypt. Commun."},{"key":"22_CR33","doi-asserted-by":"publisher","first-page":"2084","DOI":"10.1587\/transfun.E99.A.2084","volume":"E99.A","author":"D Tang","year":"2016","unstructured":"Tang, D., Luo, R., Du, X.: The exact fast algebraic immunity of two subclasses of the majority function. IEICE Trans. Fund. Electron. Commun. Comput. Sci. E99.A, 2084\u20132088 (2016)","journal-title":"IEICE Trans. Fund. Electron. Commun. Comput. Sci."},{"issue":"3","key":"22_CR34","doi-asserted-by":"publisher","first-page":"666","DOI":"10.1016\/j.disc.2011.06.017","volume":"312","author":"NN Tokareva","year":"2012","unstructured":"Tokareva, N.N.: Duality between bent functions and affine functions. Discrete Math. 312(3), 666\u2013670 (2012)","journal-title":"Discrete Math."},{"key":"22_CR35","doi-asserted-by":"crossref","unstructured":"Varrette, S., Bouvry, P., Cartiaux, H., Georgatos, F.: Management of an academic HPC cluster: The UL experience. In: 2014 International Conference on High Performance Computing & Simulation (HPCS), pp. 959\u2013967 (2014)","DOI":"10.1109\/HPCSim.2014.6903792"},{"key":"22_CR36","doi-asserted-by":"crossref","unstructured":"Zhang, R., Su, S.: A new construction of weightwise perfectly balanced Boolean functions. Adv. Math. Commun. (2021)","DOI":"10.3934\/amc.2021020"},{"key":"22_CR37","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1016\/j.dam.2022.02.017","volume":"314","author":"L Zhu","year":"2022","unstructured":"Zhu, L., Sihong, S.: A systematic method of constructing weightwise almost perfectly balanced Boolean functions on an arbitrary number of variables. Discrete Appl. Math. 314, 181\u2013190 (2022)","journal-title":"Discrete Appl. Math."}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 INDOCRYPT 2022"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-22912-1_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,31]],"date-time":"2022-12-31T15:42:09Z","timestamp":1672501329000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-22912-1_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031229114","9783031229121"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-22912-1_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"1 January 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"INDOCRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cryptology in India","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kolkata","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 December 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"indocrypt2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.tcgcrest.org\/indocrypt-2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"74","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"42% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.22","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4.59","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}