{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:48:40Z","timestamp":1740098920230,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642385186"},{"type":"electronic","value":"9783642385193"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38519-3_18","type":"book-chapter","created":{"date-parts":[[2013,5,2]],"date-time":"2013-05-02T03:59:28Z","timestamp":1367467168000},"page":"276-293","source":"Crossref","is-referenced-by-count":3,"title":["Construction of Resilient and Nonlinear Boolean Functions with Almost Perfect Immunity to Algebraic and Fast Algebraic Attacks"],"prefix":"10.1007","author":[{"given":"Tianze","family":"Wang","sequence":"first","affiliation":[]},{"given":"Meicheng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Dongdai","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/978-3-540-25937-4_5","volume-title":"Fast Software Encryption","author":"F. Armknecht","year":"2004","unstructured":"Armknecht, F.: Improving fast algebraic attacks. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol.\u00a03017, pp. 65\u201382. Springer, Heidelberg (2004)"},{"key":"18_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/11761679_10","volume-title":"Advances in Cryptology - EUROCRYPT 2006","author":"F. Armknecht","year":"2006","unstructured":"Armknecht, F., Carlet, C., Gaborit, P., K\u00fcnzli, S., Meier, W., Ruatta, O.: Efficient computation of algebraic immunity for algebraic and fast algebraic attacks. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol.\u00a04004, pp. 147\u2013164. Springer, Heidelberg (2006)"},{"key":"18_CR3","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1017\/CBO9780511780448.011","volume-title":"Boolean Methods and Models in Mathematics, Computer Science, and Engineering","author":"C. Carlet","year":"2010","unstructured":"Carlet, C.: Boolean functions for cryptography and error correcting codes. In: Crama, Y., Hammer, P. (eds.) Boolean Methods and Models in Mathematics, Computer Science, and Engineering, pp. 257\u2013397. Cambridge University Press, Cambridge (2010)"},{"key":"18_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1007\/978-3-540-89255-7_26","volume-title":"Advances in Cryptology - ASIACRYPT 2008","author":"C. Carlet","year":"2008","unstructured":"Carlet, C., Feng, K.: An infinite class of balanced functions with optimal algebraic immunity, good immunity to fast algebraic attacks and good nonlinearity. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol.\u00a05350, pp. 425\u2013440. Springer, Heidelberg (2008)"},{"key":"18_CR5","unstructured":"Cohen, G., Flori, J.P.: On a generalized combinatorial conjecture involving addition mod 2\n                  k\n                \u2009\u2212\u20091. Cryptology ePrint Archive, Report 2011\/400, \n                  \n                    http:\/\/eprint.iacr.org\/"},{"key":"18_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1007\/3-540-39200-9_21","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"N.T. Courtois","year":"2003","unstructured":"Courtois, N.T., Meier, W.: Algebraic attacks on stream ciphers with linear feedback. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656, pp. 345\u2013359. Springer, Heidelberg (2003)"},{"key":"18_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/978-3-540-45146-4_11","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"N.T. Courtois","year":"2003","unstructured":"Courtois, N.T.: Fast algebraic attacks on stream ciphers with linear feedback. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 176\u2013194. Springer, Heidelberg (2003)"},{"key":"18_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/11734727_22","volume-title":"Information Security and Cryptology - ICISC 2005","author":"N.T. Courtois","year":"2006","unstructured":"Courtois, N.T.: Cryptanalysis of sfinks. In: Won, D.H., Kim, S. (eds.) ICISC 2005. LNCS, vol.\u00a03935, pp. 261\u2013269. Springer, Heidelberg (2006)"},{"issue":"1","key":"18_CR9","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/s10623-005-6300-x","volume":"40","author":"D.K. Dalai","year":"2006","unstructured":"Dalai, D.K., Maitra, S., Sarkar, S.: Basic theory in construction of Boolean functions with maximum possible annihilator immunity. Designs, Codes and Cryptography\u00a040(1), 41\u201358 (2006)","journal-title":"Designs, Codes and Cryptography"},{"issue":"1","key":"18_CR10","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1587\/transfun.E95.A.417","volume":"95","author":"Y. Du","year":"2012","unstructured":"Du, Y., Zhang, F.: A class of 1-resilient functions in odd variables with high nonlinearity and suboptimal algebraic immunity. IEICE Transactions (IEICET)\u00a095-A(1), 417\u2013420 (2012)","journal-title":"IEICE Transactions (IEICET)"},{"issue":"2","key":"18_CR11","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/s10623-008-9228-0","volume":"50","author":"K. Feng","year":"2009","unstructured":"Feng, K., Liao, Q., Yang, J.: Maximal values of generalized algebraic immunity. Designs, Codes and Cryptography\u00a050(2), 243\u2013252 (2009)","journal-title":"Designs, Codes and Cryptography"},{"key":"18_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1007\/978-3-540-74619-5_23","volume-title":"Fast Software Encryption","author":"S. Fischer","year":"2007","unstructured":"Fischer, S., Meier, W.: Algebraic immunity of S-boxes and augmented functions. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol.\u00a04593, pp. 366\u2013381. Springer, Heidelberg (2007)"},{"key":"18_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1007\/978-3-540-28628-8_24","volume-title":"Advances in Cryptology \u2013 CRYPTO 2004","author":"P. Hawkes","year":"2004","unstructured":"Hawkes, P., Rose, G.G.: Rewriting variables: The complexity of fast algebraic attacks on stream ciphers. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol.\u00a03152, pp. 390\u2013406. Springer, Heidelberg (2004)"},{"key":"18_CR14","unstructured":"Jin, Q., Liu, Z., Wu, B.: 1-Resilient Boolean function with optimal algebraic immunity. Cryptology ePrint Archive, Report 2011\/549, \n                  \n                    http:\/\/eprint.iacr.org\/"},{"key":"18_CR15","unstructured":"Jin, Q., Liu, Z., Wu, B., et al.: A general conjecture similar to T-D conjecture and its applications in constructing Boolean functions with optimal algebraic immunity. Cryptology ePrint Archive, Report 2011\/515, \n                  \n                    http:\/\/eprint.iacr.org\/"},{"issue":"3","key":"18_CR16","doi-asserted-by":"publisher","first-page":"1330","DOI":"10.1109\/TIT.2007.915914","volume":"54","author":"N. Li","year":"2008","unstructured":"Li, N., Qu, L., Qi, W., et al.: On the construction of Boolean Functions with optimal algebraic immunity. IEEE Transactions on Information Theory\u00a054(3), 1330\u20131334 (2008)","journal-title":"IEEE Transactions on Information Theory"},{"key":"18_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/11935230_6","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2006","author":"N. Li","year":"2006","unstructured":"Li, N., Qi, W.-F.: Construction and analysis of Boolean functions of 2t+1 variables with maximum algebraic immunity. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol.\u00a04284, pp. 84\u201398. Springer, Heidelberg (2006)"},{"issue":"7","key":"18_CR18","doi-asserted-by":"publisher","first-page":"4817","DOI":"10.1109\/TIT.2011.2145690","volume":"57","author":"M. Liu","year":"2011","unstructured":"Liu, M., Lin, D., Pei, D.: Fast algebraic attacks and decomposition of symmetric Boolean functions. IEEE Transactions on Information Theory\u00a057(7), 4817\u20134821 (2011)","journal-title":"IEEE Transactions on Information Theory"},{"key":"18_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1007\/978-3-642-34961-4_12","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2012","author":"M. Liu","year":"2012","unstructured":"Liu, M., Zhang, Y., Lin, D.: Perfect algebraic immune functions. In: Wang, X., Sako, K. (eds.) ASIACRYPT 2012. LNCS, vol.\u00a07658, pp. 172\u2013189. Springer, Heidelberg (2012)"},{"key":"18_CR20","unstructured":"Liu, M., Zhang, Y., Lin, D.: On the immunity of Boolean functions against fast algebraic attacks using bivariate polynomial representation (extended abstract). In: The Third International Conference on Symbolic Computation and Cryptography, SCC 2012 (2012), A full version is available at \n                  \n                    http:\/\/eprint.iacr.org\/2012\/498\/"},{"key":"18_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1007\/978-3-540-24676-3_28","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"W. Meier","year":"2004","unstructured":"Meier, W., Pasalic, E., Carlet, C.: Algebraic attacks and decomposition of Boolean functions. In: Cachin, C., Camenisch, J. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 474\u2013491. Springer, Heidelberg (2004)"},{"issue":"2","key":"18_CR22","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1007\/s11390-011-9433-6","volume":"26","author":"S. Pan","year":"2011","unstructured":"Pan, S., Fu, X., Zhang, W.: Construction of 1-resilient Boolean functions with optimal algebraic immunity and good nonlinearity. J. Comput. Sci. Technol. (JCST)\u00a026(2), 269\u2013275 (2011)","journal-title":"J. Comput. Sci. Technol. (JCST)"},{"issue":"8","key":"18_CR23","doi-asserted-by":"publisher","first-page":"4014","DOI":"10.1109\/TIT.2010.2050801","volume":"56","author":"P. Rizomiliotis","year":"2010","unstructured":"Rizomiliotis, P.: On the resistance of Boolean functions against algebraic attacks using univariate polynomial representation. IEEE Transactions on Information Theory\u00a056(8), 4014\u20134024 (2010)","journal-title":"IEEE Transactions on Information Theory"},{"issue":"3","key":"18_CR24","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/s10623-010-9367-y","volume":"57","author":"P. Rizomiliotis","year":"2010","unstructured":"Rizomiliotis, P.: On the security of the Feng-Liao-Yang Boolean functions with optimal algebraic immunity against fast algebraic attacks. Designs, Codes and Cryptography\u00a057(3), 283\u2013292 (2010)","journal-title":"Designs, Codes and Cryptography"},{"issue":"5","key":"18_CR25","doi-asserted-by":"publisher","first-page":"776","DOI":"10.1109\/TIT.1984.1056949","volume":"30","author":"T. Siegenthaler","year":"1984","unstructured":"Siegenthaler, T.: Correlation-immunity of nonlinear combining functions for cryptographic applications. IEEE Transactions on Information Theory\u00a030(5), 776\u2013780 (1984)","journal-title":"IEEE Transactions on Information Theory"},{"issue":"2","key":"18_CR26","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1080\/00207160903496985","volume":"88","author":"W. Su","year":"2011","unstructured":"Su, W., Zeng, X., Hu, L.: Construction of 1-resilient Boolean functions with optimum algebraic immunity. Int. J. Comput. Math. (IJCM)\u00a088(2), 222\u2013238 (2011)","journal-title":"Int. J. Comput. Math. (IJCM)"},{"key":"18_CR27","doi-asserted-by":"crossref","unstructured":"Tang, D., Carlet, C., Tang, X.: Highly nonlinear Boolean functions with optimal algebraic immunity and good behavior against fast algebraic attacks. IEEE Transactions on Information Theory (2012), \n                  \n                    http:\/\/dx.doi.org\/10.1109\/TIT.2012.2217476\n                  \n                  \n                , 10.1109\/TIT.2012.2217476","DOI":"10.1109\/TIT.2012.2217476"},{"issue":"1","key":"18_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10623-010-9413-9","volume":"60","author":"Z. Tu","year":"2011","unstructured":"Tu, Z., Deng, Y.: A conjecture about binary strings and its applications on constructing Boolean functions with optimal algebraic immunity. Designs, Codes and Cryptography\u00a060(1), 1\u201314 (2011)","journal-title":"Designs, Codes and Cryptography"},{"issue":"4-5","key":"18_CR29","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1016\/j.dam.2011.08.006","volume":"160","author":"Z. Tu","year":"2012","unstructured":"Tu, Z., Deng, Y.: Boolean functions optimizing most of the cryptographic criteria. Discrete Applied Mathematics\u00a0160(4-5), 427\u2013435 (2012)","journal-title":"Discrete Applied Mathematics"},{"issue":"9","key":"18_CR30","doi-asserted-by":"publisher","first-page":"6310","DOI":"10.1109\/TIT.2011.2109935","volume":"57","author":"X. Zeng","year":"2011","unstructured":"Zeng, X., Carlet, C., Shan, J., Hu, L.: More balanced Boolean functions with optimal algebraic immunity and good nonlinearity and resistance to fast algebraic attacks. IEEE Transactions on Information Theory\u00a057(9), 6310\u20136320 (2011)","journal-title":"IEEE Transactions on Information Theory"},{"key":"18_CR31","unstructured":"Zhang, Y., Liu, M., Lin, D.: On the immunity of rotation symmetric Boolean functions against fast algebraic attacks. Cryptology ePrint Archive, Report 2012\/111, \n                  \n                    http:\/\/eprint.iacr.org\/"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38519-3_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,12]],"date-time":"2019-05-12T15:19:57Z","timestamp":1557674397000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38519-3_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642385186","9783642385193"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38519-3_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}