{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T13:00:21Z","timestamp":1772283621780,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642044731","type":"print"},{"value":"9783642044748","type":"electronic"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04474-8_15","type":"book-chapter","created":{"date-parts":[[2009,9,3]],"date-time":"2009-09-03T07:25:17Z","timestamp":1251962717000},"page":"177-185","source":"Crossref","is-referenced-by-count":4,"title":["A New Construction of Boolean Functions with Maximum Algebraic Immunity"],"prefix":"10.1007","author":[{"given":"Deshuai","family":"Dong","sequence":"first","affiliation":[]},{"given":"Shaojing","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Longjiang","family":"Qu","sequence":"additional","affiliation":[]},{"given":"Chao","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1007\/3-540-39200-9_21","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"N. Courtois","year":"2003","unstructured":"Courtois, N., Meier, W.: Algebraic attacks on stream ciphers with linear feedback. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656, pp. 345\u2013359. Springer, Heidelberg (2003)"},{"key":"15_CR2","first-page":"66","volume":"85","author":"W. Mihaljevic","year":"2002","unstructured":"Mihaljevic, W., Imai, H.: Cryptanalysis of toyocrypt-hs1 stream cipher. IEICE Transactions on Fundamentals\u00a0E85-A, 66\u201373 (2002)","journal-title":"IEICE Transactions on Fundamentals"},{"key":"15_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/11734727_22","volume-title":"Information Security and Cryptology - ICISC 2005","author":"N. Courtois","year":"2006","unstructured":"Courtois, N.: Cryptanalysis of sfinks. In: Won, D.H., Kim, S. (eds.) ICISC 2005. LNCS, vol.\u00a03935, pp. 261\u2013269. Springer, Heidelberg (2006)"},{"key":"15_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1007\/978-3-540-24676-3_28","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"W. Meier","year":"2004","unstructured":"Meier, W., Pasalic, E., Carlet, C.: Algebraic attacks and decomposition of boolean functions. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 474\u2013491. Springer, Heidelberg (2004)"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Carlet, C.: A method of construction of balanced functions with optimum algebraic immunity, http:\/\/eprint.iacr.org\/2006\/149","DOI":"10.1109\/ISIT.2007.4557094"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Carlet, C., Dalai, D.K., Gupta, K.C., Maitra, S.: Algebraic immunity for cryptographically significant boolean functions: Analysis and construction. IEEE Transactions on Information Theory\u00a052(7) (2006)","DOI":"10.1109\/TIT.2006.876253"},{"key":"15_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1007\/978-3-540-89255-7_26","volume-title":"Advances in Cryptology - ASIACRYPT 2008","author":"C. Carlet","year":"2008","unstructured":"Carlet, C., Feng, K.: An infinite class of balanced functions with optimal algebraic immunity, good immunity to fast algebraic attacks and good nonlinearity. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol.\u00a05350, pp. 425\u2013440. Springer, Heidelberg (2008)"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Dalai, D.K., Maitra, S., Sarkar, S.: Basic theory in construction of boolean functions with maximum possible annihilator immunity. Des. Codes, Cryptography\u00a040(1) (2006)","DOI":"10.1007\/s10623-005-6300-x"},{"key":"15_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/11935230_6","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2006","author":"N. Li","year":"2006","unstructured":"Li, N., Qi, W.-F.: Construction and analysis of boolean functions of 2t+1 variables with maximum algebraic immunity. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol.\u00a04284, pp. 84\u201398. Springer, Heidelberg (2006)"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Qu, L.J., Li, C., Feng, K.Q.: A note on symmetric boolean functions with maximum algebraic immunity in odd number of variables. IEEE Transactions on Information Theory\u00a053(8) (2007)","DOI":"10.1109\/TIT.2007.901189"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Qu, L.J., Li, C.: On the 2 m -variable symmetric boolean functions with maximum algebraic immunity. Science in China Series F-Information Sciences\u00a051(2) (2008)","DOI":"10.1007\/s11432-008-0010-8"},{"key":"15_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/978-3-540-79499-8_22","volume-title":"Information Security and Cryptology","author":"L. Qu","year":"2008","unstructured":"Qu, L., Li, C.: Weight support technique and the symmetric boolean functions with maximum algebraic immunity on even number of variables. In: Pei, D., Yung, M., Lin, D., Wu, C. (eds.) Inscrypt 2007. LNCS, vol.\u00a04990, pp. 271\u2013282. Springer, Heidelberg (2008)"},{"key":"15_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1007\/11779360_10","volume-title":"Coding and Cryptography","author":"A. Canteaut","year":"2006","unstructured":"Canteaut, A.: Open problems related to algebraic attacks on stream ciphers. In: Ytrehus, \u00d8. (ed.) WCC 2005. LNCS, vol.\u00a03969, pp. 120\u2013134. Springer, Heidelberg (2006); 1\u201310 invited talk"},{"key":"15_CR14","unstructured":"Liu, M.C., Pei, D.Y.: Construction of boolean functions with maximum algebraic immunity. In: Chinacrypt 2008, pp. 79\u201392 (2008)"},{"key":"15_CR15","unstructured":"Qu, L.J., Feng, G.Z., Li, C.: On the boolean functions with maximum possible algebraic immunity: Construction and a lower bound of the count, http:\/\/eprint.iacr.org\/2005\/449"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04474-8_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T06:37:00Z","timestamp":1558507020000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04474-8_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642044731","9783642044748"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04474-8_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009]]}}}