{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T05:33:48Z","timestamp":1725514428609},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540725039"},{"type":"electronic","value":"9783540725046"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-72504-6_29","type":"book-chapter","created":{"date-parts":[[2007,7,22]],"date-time":"2007-07-22T07:36:39Z","timestamp":1185089799000},"page":"318-329","source":"Crossref","is-referenced-by-count":2,"title":["Efficient Computation of Algebraic Immunity of Symmetric Boolean Functions"],"prefix":"10.1007","author":[{"given":"Feng","family":"Liu","sequence":"first","affiliation":[]},{"given":"Keqin","family":"Feng","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"29_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1007\/978-3-540-25937-4_5","volume-title":"Fast Software Encryption","author":"F. Armknecht","year":"2004","unstructured":"Armknecht, F.: Improving Fast Algebraic Attacks. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol.\u00a03017, pp. 65\u201382. Springer, Heidelberg (2004)"},{"key":"29_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/11761679_10","volume-title":"Advances in Cryptology - EUROCRYPT 2006","author":"F. Armknecht","year":"2006","unstructured":"Armknecht, F., et al.: Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol.\u00a04004, pp. 147\u2013164. Springer, Heidelberg (2006)"},{"key":"29_CR3","series-title":"Lecture Notes in Computer Science","first-page":"84","volume-title":"Progress in Cryptology - INDOCRYPT 2004","author":"L.M. Breaken","year":"2004","unstructured":"Breaken, L.M.: Algebraic Attack over GF(q). In: Canteaut, A., Viswanathan, K. (eds.) INDOCRYPT 2004. LNCS, vol.\u00a03348, pp. 84\u201391. Springer, Heidelberg (2004)"},{"key":"29_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/11596219_4","volume-title":"Progress in Cryptology - INDOCRYPT 2005","author":"A. Braeken","year":"2005","unstructured":"Braeken, A., Preneel, B.: On the algebraic immunity of symmetric Boolean functions. In: Maitra, S., Veni Madhavan, C.E., Venkatesan, R. (eds.) INDOCRYPT 2005. LNCS, vol.\u00a03797, pp. 35\u201348. Springer, Heidelberg (2005)"},{"key":"29_CR5","doi-asserted-by":"crossref","unstructured":"Carlet, C., et al.: Algebraic Immunity for Cryptographically Significant Boolean Functions: Analysis and Construction. Preprint (2006)","DOI":"10.1109\/TIT.2006.876253"},{"key":"29_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1007\/978-3-540-45146-4_11","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"N. Courtois","year":"2003","unstructured":"Courtois, N.: Fast algebraic attacks on stream ciphers with linear feedback. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 176\u2013194. Springer, Heidelberg (2003)"},{"key":"29_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1007\/3-540-39200-9_21","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"N. Courtois","year":"2003","unstructured":"Courtois, N., Meier, W.: Algebraic attacks on stream ciphers with linear feedback. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656, pp. 345\u2013359. Springer, Heidelberg (2003)"},{"key":"29_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1007\/978-3-540-30556-9_9","volume-title":"Progress in Cryptology - INDOCRYPT 2004","author":"D.K. Dalai","year":"2004","unstructured":"Dalai, D.K., Gupta, K.C., Maitra, S.: Results on Algebraic Immunity for Cryptographically Significant Boolean Functions. In: Canteaut, A., Viswanathan, K. (eds.) INDOCRYPT 2004. LNCS, vol.\u00a03348, pp. 92\u2013106. Springer, Heidelberg (2004)"},{"issue":"1","key":"29_CR9","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/s10623-005-6300-x","volume":"40","author":"D.K. Dalai","year":"2006","unstructured":"Dalai, D.K., Maitra, S., Sarkar, S.: Basic Theory in Construction of Boolean Functions with Maximum Possible Annihilator Immunity. Designs, Codes and Cryptography\u00a040(1), 41\u201358 (2006)","journal-title":"Designs, Codes and Cryptography"},{"key":"29_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"474","DOI":"10.1007\/978-3-540-24676-3_28","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"W. Meier","year":"2004","unstructured":"Meier, W., Pasalic, E., Carlet, C.: Algebraic attacks and decomposition of Boolean functions. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 474\u2013491. Springer, Heidelberg (2004)"},{"key":"29_CR11","unstructured":"Qu, L., Li, C., Feng, K.: A note on symmetric Boolean Functions with maximum algebraic immunity in odd number of variables. Preprinted."},{"key":"29_CR12","unstructured":"Qu, L., et al.: On 2m variables symmetric Boolean functions with maximum algebraic immunity. Preprinted."}],"container-title":["Lecture Notes in Computer Science","Theory and Applications of Models of Computation"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-72504-6_29.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T05:38:10Z","timestamp":1619501890000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-72504-6_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540725039","9783540725046"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-72504-6_29","relation":{},"subject":[]}}