{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T07:15:55Z","timestamp":1725520555140},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540874768"},{"type":"electronic","value":"9783540874775"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-87477-5_61","type":"book-chapter","created":{"date-parts":[[2008,10,24]],"date-time":"2008-10-24T10:13:55Z","timestamp":1224843235000},"page":"579-588","source":"Crossref","is-referenced-by-count":2,"title":["Design of Highly Nonlinear Balanced Boolean Functions Using an Hybridation of DCA and Simulated Annealing Algorithm"],"prefix":"10.1007","author":[{"given":"Sarra","family":"Bouallagui","sequence":"first","affiliation":[]},{"given":"Hoai An","family":"Le Thi","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Pham Dinh","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"61_CR1","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"A. Canteaut","year":"2000","unstructured":"Canteaut, A., Carlet, C., Charpin, P., Fontaine, C.: Propagation characteristic and correlation-immunity of hight nonlinenar Boolean function. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807. Springer, Heidelberg (2000)"},{"key":"61_CR2","unstructured":"Clark, J.A.: Optimisation Heuristics for Cryptology, PhD thesis, Faculty of Information Technology, Queensland University of Technology (1998)"},{"key":"61_CR3","first-page":"1533","volume-title":"CEC 2004: International Conference on Evolutionary Computation","author":"J.A. Clark","year":"2004","unstructured":"Clark, J.A., Jeremy, J.L., Stepney, S.: The design of S-boxes by simulated annealing. In: CEC 2004: International Conference on Evolutionary Computation, Portland OR, USA, June 2004, pp. 1533\u20131537. IEEE, Los Alamitos (2004)"},{"key":"61_CR4","series-title":"Lecture Notes In Computer Science","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1007\/10718964_20","volume-title":"Proceedings of the 5th Australasian Conference on Information Security and Privacy","author":"J.A. Clark","year":"2000","unstructured":"Clark, J.A., Jeremy, J.L.: Two-stage Optimisation in the Design of Boolean Functions. In: Proceedings of the 5th Australasian Conference on Information Security and Privacy. Lecture Notes In Computer Science, vol.\u00a01841, pp. 242\u2013254. Springer, Heildberg (2000)"},{"key":"61_CR5","unstructured":"Le Thi Hoai, A., Pham Dinh, T.: DC Programming: Theory, Algorithms and Applications. In: Proceedings of The First International Workshop on Global Constrained Optimization and Constraint Satisfaction (2002)"},{"key":"61_CR6","unstructured":"Le Thi Hoai, A., Pham Dinh, T.: The DC (difference of convex functions)Programming and DCA revisited with DC models of real world nonconvex optimization problems. Annals of Operations Research (2005)"},{"key":"61_CR7","unstructured":"Le Thi Hoai, A., Pham Dinh, T., Huynh Van, N.: Exact Penalty Techniques in DC Programming Special session. In: Third International Conference on Computational Management Science, Amsterdam, May 17-19 (2006)"},{"key":"61_CR8","volume-title":"Boolean Functions for Cryptography and Error Correcting Code. Boolean Methods and Models","author":"C. Carlet","year":"2007","unstructured":"Carlet, C.: Boolean Functions for Cryptography and Error Correcting Code. Boolean Methods and Models. Cambridge University Press, Cambridge (2007)"},{"key":"61_CR9","unstructured":"Le Thi Hoai, A., Pham Dinh, T., Le Hoai, M., Bouvry, P.: A DC programming Approach for generating highly nonlinear balanced Boolean Function in Cryptography. In: Third International Conference on Computational Management Science, Amsterdam, May 17-19 (2006)"},{"key":"61_CR10","unstructured":"Le Thi Hoai, A., Pham Dinh, T., Le Hoai, M., Bouvry, P.: A combined DCA-GA for constructing highly nonlinear balanced Boolean functions in cryptography. In: Advances in Global Optimization, Myconos Greece, June 13-17 (2007)"},{"key":"61_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1007\/3-540-45539-6_35","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"S. Sarkar","year":"2000","unstructured":"Sarkar, S., Maitra, S.: Construction of nonlinear Boolean functions with important cryptographic properties. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 485\u2013506. Springer, Heidelberg (2000)"},{"key":"61_CR12","volume-title":"Cryptography and Network Security","author":"W. Stallings","year":"2003","unstructured":"Stallings, W.: Cryptography and Network Security, 3rd edn. Prentice Hall, Englewood Cliffs (2003)","edition":"3"},{"key":"61_CR13","volume-title":"Advances in Cryptographie - EUROCRYPT 2000 In Advances in Cryptology - CRYPT0 1993","author":"J. Seberry","year":"1994","unstructured":"Seberry, J., Zhang, X.M., Zheng, Y.: Nonlinearly balanced Boolean functions and their propagation characteristics. In: Advances in Cryptographie - EUROCRYPT 2000 In Advances in Cryptology - CRYPT0 1993. Springer, Heidelberg (1994)"}],"container-title":["Communications in Computer and Information Science","Modelling, Computation and Optimization in Information Systems and Management Sciences"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-87477-5_61","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,3]],"date-time":"2019-03-03T21:38:20Z","timestamp":1551649100000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-87477-5_61"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540874768","9783540874775"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-87477-5_61","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2008]]}}}