{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:44:07Z","timestamp":1725497047207},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540772712"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-77272-9_5","type":"book-chapter","created":{"date-parts":[[2007,12,6]],"date-time":"2007-12-06T11:56:55Z","timestamp":1196942215000},"page":"73-91","source":"Crossref","is-referenced-by-count":1,"title":["Efficient Computation of the Best Quadratic Approximations of Cubic Boolean Functions"],"prefix":"10.1007","author":[{"given":"Nicholas","family":"Kolokotronis","sequence":"first","affiliation":[]},{"given":"Konstantinos","family":"Limniotis","sequence":"additional","affiliation":[]},{"given":"Nicholas","family":"Kalouptsidis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","unstructured":"Berbain, C., Billet, O., Canteaut, A., et al.: DECIM - a new stream cipher for hardware applications. eSTREAM, ECRYPT Stream Cipher Project, Report 2005\/004 (2005) \n                      \n                        http:\/\/www.ecrypt.eu.org\/stream"},{"key":"5_CR2","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/BF01388412","volume":"3","author":"C. Carlet","year":"1993","unstructured":"Carlet, C.: Partially-bent functions. Designs, Codes and Cryptography\u00a03, 135\u2013145 (1993)","journal-title":"Designs, Codes and Cryptography"},{"key":"5_CR3","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1016\/j.jco.2003.08.013","volume":"20","author":"C. Carlet","year":"2004","unstructured":"Carlet, C.: On the confusion and diffusion properties of Maiorana-McFarland\u2019s and extended Maiorana-McFarland\u2019s functions. Journal of Complexity\u00a020, 182\u2013204 (2004)","journal-title":"Journal of Complexity"},{"key":"5_CR4","unstructured":"Carlet, C.: Recursive lower bounds on the nonlinearity profile of Boolean functions and their applications. Cryptology ePrint Archive, Report 2006\/459 (2006) \n                      \n                        http:\/\/eprint.iacr.org"},{"key":"5_CR5","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1109\/TIT.2006.887494","volume":"53","author":"C. Carlet","year":"2007","unstructured":"Carlet, C., Mesnager, S.: Improving the upper bounds on the covering radii of binary Reed-Muller codes. IEEE Transactions on Information Theory\u00a053, 162\u2013173 (2007)","journal-title":"IEEE Transactions on Information Theory"},{"key":"5_CR6","doi-asserted-by":"publisher","first-page":"4286","DOI":"10.1109\/TIT.2005.858929","volume":"51","author":"P. Charpin","year":"2005","unstructured":"Charpin, P., Pasalic, E., Tavernier, C.: On bent and semi-bent quadratic boolean functions. IEEE Transactions on Information Theory\u00a051, 4286\u20134298 (2005)","journal-title":"IEEE Transactions on Information Theory"},{"key":"5_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1007\/3-540-39200-9_21","volume-title":"EUROCRPYT","author":"N. Courtois","year":"2003","unstructured":"Courtois, N., Meier, W.: Algebraic attacks on stream ciphers with linear feedback. In: Biham, E. (ed.) EUROCRPYT. LNCS, vol.\u00a02656, pp. 345\u2013359. Springer, Heidelberg (2003)"},{"key":"5_CR8","unstructured":"Dillon, J.F.: Elementary Hadamard Difference Sets. Ph.D. Thesis, University of Maryland (1974)"},{"key":"5_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-54973-0","volume-title":"The Stability Theory of Stream Ciphers","author":"C. Ding","year":"1991","unstructured":"Ding, C., Xiao, G., Shan, W.: The Stability Theory of Stream Ciphers. LNCS, vol.\u00a0561. Springer, Heidelberg (1991)"},{"key":"5_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1007\/3-540-60590-8_5","volume-title":"Fast Software Encryption","author":"H. Dobbertin","year":"1995","unstructured":"Dobbertin, H.: Construction of bent functions and balanced Boolean functions with high nonlinearity. In: Preneel, B. (ed.) Fast Software Encryption. LNCS, vol.\u00a01008, pp. 61\u201374. Springer, Heidelberg (1995)"},{"key":"5_CR11","unstructured":"Gammel, B., G\u00f6ttfert, R., Kniffler, O.: The Achterbahn stream cipher. eSTREAM, ECRYPT Stream Cipher Project, Report 2005\/002 (2005) \n                      \n                        http:\/\/www.ecrypt.eu.org\/stream\/"},{"key":"5_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11799313_1","volume-title":"Fast Software Encryption","author":"T. Johansson","year":"2006","unstructured":"Johansson, T., Meier, W., Muller, F.: Cryptanalysis of Achterbahn. In: Robshaw, M. (ed.) FSE 2006. LNCS, vol.\u00a04047, pp. 1\u201314. Springer, Heidelberg (2006)"},{"key":"5_CR13","doi-asserted-by":"publisher","first-page":"752","DOI":"10.1109\/TIT.1970.1054545","volume":"16","author":"T. Kasami","year":"1970","unstructured":"Kasami, T., Tokura, N.: On the weight structure of Reed-Muller codes. IEEE Transactions on Information Theory\u00a016, 752\u2013759 (1970)","journal-title":"IEEE Transactions on Information Theory"},{"key":"5_CR14","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1016\/S0019-9958(76)90355-7","volume":"30","author":"T. Kasami","year":"1976","unstructured":"Kasami, T., Tokura, N., Azumi, S.: On the weight enumeration of weights less than 2.5d of Reed-Muller codes. Information and Control\u00a030, 380\u2013395 (1976)","journal-title":"Information and Control"},{"key":"5_CR15","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/s10623-005-6345-x","volume":"38","author":"K. Khoo","year":"2006","unstructured":"Khoo, K., Gong, G., Stinson, D.: A new characterization of semi-bent and bent functions on finite fields. Designs, Codes and Cryptography\u00a038, 279\u2013295 (2006)","journal-title":"Designs, Codes and Cryptography"},{"key":"5_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1007\/3-540-68339-9_20","volume-title":"EUROCRYPT 1996","author":"L.R. Knudsen","year":"1996","unstructured":"Knudsen, L.R., Robshaw, M.J.B.: Non-linear approximations in linear cryptanalysis. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol.\u00a01070, pp. 224\u2013236. Springer, Heidelberg (1996)"},{"key":"5_CR17","volume-title":"Switching and Finite Automata Theory","author":"Z. Kohavi","year":"1978","unstructured":"Kohavi, Z.: Switching and Finite Automata Theory. McGraw-Hill Book Company, New York (1978)"},{"key":"5_CR18","doi-asserted-by":"publisher","first-page":"468","DOI":"10.1109\/TIT.2004.824913","volume":"50","author":"K. Kurosawa","year":"2004","unstructured":"Kurosawa, K., Iwata, T., Yoshiwara, T.: New covering radius of Reed-Muller codes for t-resilient functions. IEEE Transactions on Information Theory\u00a050, 468\u2013475 (2004)","journal-title":"IEEE Transactions on Information Theory"},{"key":"5_CR19","volume-title":"Finite Fields. Encyclopedia of Mathematics and its Applications","author":"R. Lidl","year":"1996","unstructured":"Lidl, R., Niederreiter, H.: Finite Fields. Encyclopedia of Mathematics and its Applications, 2nd edn., vol.\u00a020. Cambridge University Press, Cambridge (1996)","edition":"2"},{"key":"5_CR20","volume-title":"The Theory of Error Correcting Codes","author":"F.J. MacWilliams","year":"1977","unstructured":"MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error Correcting Codes. North-Holland, Amsterdam (1977)"},{"key":"5_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume-title":"EUROCRYPT 1993","author":"M. Matsui","year":"1994","unstructured":"Matsui, M.: Linear cryptanalysis method for DES cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 386\u2013397. Springer, Heidelberg (1994)"},{"key":"5_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/0097-3165(73)90031-9","volume":"15","author":"R.L. McFarland","year":"1973","unstructured":"McFarland, R.L.: A family of noncyclic difference sets. Journal of Combinatorial Theory, Series A\u00a015, 1\u201310 (1973)","journal-title":"Journal of Combinatorial Theory, Series A"},{"key":"5_CR23","doi-asserted-by":"crossref","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Cryptography","author":"A.J. Menezes","year":"1996","unstructured":"Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)"},{"key":"5_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/BFb0032354","volume-title":"Cryptography: Policy and Algorithms","author":"W.L. Millan","year":"1996","unstructured":"Millan, W.L.: Low order approximation of cipher functions. In: Dawson, E.P., Goli\u0107, J.D. (eds.) Cryptography: Policy and Algorithms. LNCS, vol.\u00a01029, pp. 144\u2013155. Springer, Heidelberg (1996)"},{"key":"5_CR25","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1016\/0097-3165(76)90024-8","volume":"20","author":"O.S. Rothaus","year":"1976","unstructured":"Rothaus, O.S.: On bent functions. Journal of Combinatorial Theory, Series A\u00a020, 300\u2013305 (1976)","journal-title":"Journal of Combinatorial Theory, Series A"}],"container-title":["Lecture Notes in Computer Science","Cryptography and Coding"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77272-9_5.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T11:06:58Z","timestamp":1619521618000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77272-9_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540772712"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77272-9_5","relation":{},"subject":[]}}