{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T12:57:24Z","timestamp":1772283444360,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642319112","type":"print"},{"value":"9783642319129","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31912-9_18","type":"book-chapter","created":{"date-parts":[[2012,7,14]],"date-time":"2012-07-14T07:57:56Z","timestamp":1342252676000},"page":"261-274","source":"Crossref","is-referenced-by-count":7,"title":["On the Resistance of Boolean Functions against Fast Algebraic Attacks"],"prefix":"10.1007","author":[{"given":"Yusong","family":"Du","sequence":"first","affiliation":[]},{"given":"Fangguo","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Meicheng","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1007\/3-540-39200-9_21","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"N. Courtois","year":"2003","unstructured":"Courtois, N., Meier, W.: Algebraic Attacks on Stream Ciphers with Linear Feedback. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656, pp. 345\u2013359. Springer, Heidelberg (2003)"},{"key":"18_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1007\/978-3-540-24676-3_28","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"W. Meier","year":"2004","unstructured":"Meier, W., Pasalic, E., Carlet, C.: Algebraic Attacks and Decomposition of Boolean Functions. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 474\u2013491. Springer, Heidelberg (2004)"},{"issue":"7","key":"18_CR3","doi-asserted-by":"publisher","first-page":"3105","DOI":"10.1109\/TIT.2006.876253","volume":"52","author":"C. Carlet","year":"2006","unstructured":"Carlet, C., Dalai, D.K., Gupta, K.C., Maitra, S.: Algebraic Immunity for Cryptographically Significant Boolean Functions: Analysis and Construction. IEEE Trans. Inform.Theory\u00a052(7), 3105\u20133121 (2006)","journal-title":"IEEE Trans. Inform.Theory"},{"issue":"3","key":"18_CR4","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1007\/s11432-007-0027-4","volume":"50","author":"N. Li","year":"2007","unstructured":"Li, N., Qi, W.: Boolean functions of an odd number of variables with maximum algebraic immunity. Sci China Ser F-Information Sciences\u00a050(3), 307\u2013317 (2007)","journal-title":"Sci China Ser F-Information Sciences"},{"key":"18_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1007\/978-3-540-89255-7_26","volume-title":"Advances in Cryptology - ASIACRYPT 2008","author":"C. Carlet","year":"2008","unstructured":"Carlet, C., Feng, K.: An Infinite Class of Balanced Functions with Optimal Algebraic Immunity, Good Immunity to Fast Algebraic Attacks and Good Nonlinearity. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol.\u00a05350, pp. 425\u2013440. Springer, Heidelberg (2008)"},{"issue":"7","key":"18_CR6","doi-asserted-by":"publisher","first-page":"1379","DOI":"10.1007\/s11432-010-3106-x","volume":"53","author":"M. Liu","year":"2010","unstructured":"Liu, M., Pei, D., Du, Y.: Identification and construction of Boolean functions with maximum algebraic immunity. Sci China Ser F-Information Sciences\u00a053(7), 1379\u20131396 (2010)","journal-title":"Sci China Ser F-Information Sciences"},{"issue":"1","key":"18_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10623-010-9413-9","volume":"60","author":"Z. Tu","year":"2011","unstructured":"Tu, Z., Deng, Y.: A conjecture about binary strings and its applications on constructing Boolean functions with optimal algebraic immunity. Designs, Codes and Cryptography\u00a060(1), 1\u201314 (2011)","journal-title":"Designs, Codes and Cryptography"},{"key":"18_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/978-3-540-45146-4_11","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"N. Courtois","year":"2003","unstructured":"Courtois, N.: Fast Algebraic Attacks on Stream Ciphers with Linear Feedback. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 176\u2013194. Springer, Heidelberg (2003)"},{"key":"18_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/978-3-540-25937-4_5","volume-title":"Fast Software Encryption","author":"F. Armknecht","year":"2004","unstructured":"Armknecht, F.: Improving Fast Algebraic Attacks. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol.\u00a03017, pp. 65\u201382. Springer, Heidelberg (2004)"},{"key":"18_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/11761679_10","volume-title":"Advances in Cryptology - EUROCRYPT 2006","author":"F. Armknecht","year":"2006","unstructured":"Armknecht, F., Carlet, C., Gaborit, P., K\u00fcnzli, S., Meier, W., Ruatta, O.: Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol.\u00a04004, pp. 147\u2013164. Springer, Heidelberg (2006)"},{"key":"18_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1007\/978-3-642-00730-9_25","volume-title":"Information Security and Cryptology \u2013 ICISC 2008","author":"E. Pasalic","year":"2009","unstructured":"Pasalic, E.: Almost Fully Optimized Infinite Classes of Boolean Functions Resistant to (Fast) Algebraic Cryptanalysis. In: Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. LNCS, vol.\u00a05461, pp. 399\u2013414. Springer, Heidelberg (2009)"},{"issue":"7","key":"18_CR12","doi-asserted-by":"publisher","first-page":"4817","DOI":"10.1109\/TIT.2011.2145690","volume":"57","author":"M. Liu","year":"2011","unstructured":"Liu, M., Lin, D.: Fast Algebraic Attacks and Decomposition of Symmetric Boolean Functions. IEEE Trans. Inform.Theory\u00a057(7), 4817\u20134821 (2011)","journal-title":"IEEE Trans. Inform.Theory"},{"issue":"8","key":"18_CR13","doi-asserted-by":"publisher","first-page":"4014","DOI":"10.1109\/TIT.2010.2050801","volume":"56","author":"P. Rizomiliotis","year":"2010","unstructured":"Rizomiliotis, P.: On the Resistance of Boolean Functions Against Algebraic Attacks Using Univariate Polynomial Representation. IEEE Trans. Inform. Theory\u00a056(8), 4014\u20134024 (2010)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"18_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/978-3-540-85912-3_19","volume-title":"Sequences and Their Applications - SETA 2008","author":"G. Gong","year":"2008","unstructured":"Gong, G.: Sequences, DFT and Resistance against Fast Algebraic Attacks. In: Golomb, S.W., Parker, M.G., Pott, A., Winterhof, A. (eds.) SETA 2008. LNCS, vol.\u00a05203, pp. 197\u2013218. Springer, Heidelberg (2008)"},{"key":"18_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1007\/11779360_10","volume-title":"Coding and Cryptography","author":"A. Canteaut","year":"2006","unstructured":"Canteaut, A.: Open Problems Related to Algebraic Attacks on Stream Ciphers. In: Ytrehus, \u00d8. (ed.) WCC 2005. LNCS, vol.\u00a03969, pp. 120\u2013134. Springer, Heidelberg (2006)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology - ICISC 2011"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31912-9_18.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T11:50:51Z","timestamp":1620129051000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31912-9_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642319112","9783642319129"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31912-9_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}