{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T12:57:36Z","timestamp":1772283456082,"version":"3.50.1"},"reference-count":9,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[1995,5,1]],"date-time":"1995-05-01T00:00:00Z","timestamp":799286400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des Codes Crypt"],"published-print":{"date-parts":[[1995,5]]},"DOI":"10.1007\/bf01388386","type":"journal-article","created":{"date-parts":[[2005,4,2]],"date-time":"2005-04-02T08:37:09Z","timestamp":1112431029000},"page":"241-251","source":"Crossref","is-referenced-by-count":37,"title":["Three characterizations of non-binary correlation-immune and resilient functions"],"prefix":"10.1007","volume":"5","author":[{"given":"K.","family":"Gopalakrishnan","sequence":"first","affiliation":[]},{"given":"D. R.","family":"Stinson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"CR1","unstructured":"Alfred V. Aho, John E. Hopcroft, and Jeffrey D. Ullman,The Design and Analysis of Computer Algorithms, Computer Science and Information Processing, Addison-Wesley Publishing Company (1975)."},{"key":"CR2","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1137\/0217014","volume":"17","author":"C. H. Bennett","year":"1988","unstructured":"C. H. Bennett, G. Brassard, and J. M. Robert, Privacy amplification by public discussion,SIAM J. Computing, Vol. 17 (1988) pp. 210?229.","journal-title":"SIAM J. Computing"},{"key":"CR3","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1007\/3-540-46766-1_6","volume":"576","author":"P. Camion","year":"1992","unstructured":"P. Camion, C. Carlet, P. Charpin, and N. Sendrier, On correlation-immune functions, Lecture Notes in Computer Science, Vol. 576 (1992) pp. 86?100.","journal-title":"Lecture Notes in Computer Science"},{"key":"CR4","unstructured":"Benny Chor, Oded Goldreich, Johan H\u00e5stad, Joel Friedman, Steven Rudich, and Roman Smolensky, The bit extraction problem ort-resilient functions,26th IEEE Symposium on Foundations of Computcr Science (1985) pp. 396?407."},{"key":"CR5","unstructured":"P. Delsarte, An algebraic approach to the association schemes of coding theory,Philips Research Reports Supplements, Vol. 10 (1973). Thesis, Universite Catholique de Louvain."},{"key":"CR6","doi-asserted-by":"crossref","first-page":"569","DOI":"10.1109\/18.6037","volume":"34","author":"Guo-Zhen Xiao","year":"1988","unstructured":"Xiao Guo-Zhen and James L. Massey, A spectral characterization of correlation-immune combining functions.IEEE Trans. Inform. Theory, Vol. 34 (1988) pp. 569?571.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"CR7","doi-asserted-by":"crossref","unstructured":"Rainer A. Rueppel,Analysis and Design of Stream Ciphers, Springer-Verlag (1986).","DOI":"10.1007\/978-3-642-82865-2"},{"key":"CR8","doi-asserted-by":"crossref","first-page":"776","DOI":"10.1109\/TIT.1984.1056949","volume":"30","author":"T. Siegenthaler","year":"1984","unstructured":"T. Siegenthaler, Correlation immunity of nonlinear combining functions for cryptographic applications,IEEE Trans. Inform. Theory, Vol. 30 (1984) pp. 776?780.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"CR9","first-page":"105","volume":"92","author":"D. R. Stinson","year":"1993","unstructured":"D. R. Stinson, Resilient functions and large sets of orthogonal arrays,Congressus Numer., Vol. 92 (1993) pp. 105?110.","journal-title":"Congressus Numer."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/BF01388386\/fulltext.html","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF01388386.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/BF01388386\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF01388386","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T16:14:18Z","timestamp":1556813658000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BF01388386"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995,5]]},"references-count":9,"journal-issue":{"issue":"3","published-print":{"date-parts":[[1995,5]]}},"alternative-id":["BF01388386"],"URL":"https:\/\/doi.org\/10.1007\/bf01388386","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[1995,5]]}}}