{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T14:40:22Z","timestamp":1775054422446,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540593393","type":"print"},{"value":"9783540492368","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1995]]},"DOI":"10.1007\/bfb0000428","type":"book-chapter","created":{"date-parts":[[2005,10,7]],"date-time":"2005-10-07T11:27:29Z","timestamp":1128684449000},"page":"105-118","source":"Crossref","is-referenced-by-count":18,"title":["Semi-bent functions"],"prefix":"10.1007","author":[{"given":"Seongtaek","family":"Chee","sequence":"first","affiliation":[]},{"given":"Sangjin","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Kwangjo","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,9,8]]},"reference":[{"issue":"no.1","key":"9_CR1","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1007\/BF00203967","volume":"3","author":"C. Adams","year":"1990","unstructured":"C. Adams and S. Tavares, \u201cThe structured design of cryptographically good S-boxes\u201d, Journal of Cryptology 3, no. 1, pp. 27\u201343, 1990.","journal-title":"Journal of Cryptology"},{"issue":"no.1","key":"9_CR2","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E. Biham","year":"1991","unstructured":"E. Biham and A. Shamir, \u201cDifferential cryptanalysis of DES-like cryptosystems\u201d, Journal of Cryptology 4, no. 1, pp. 3\u201372, 1991.","journal-title":"Journal of Cryptology"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"P. Camion, C. Carlet, P. Charpin and N. Sendrier, \u201cOn correlation-immune functions\u201d, Advances in Cryptology \u2014 CRYPTO'91, Springer-Verlag, pp. 87\u2013100, 1992.","DOI":"10.1007\/3-540-46766-1_6"},{"key":"9_CR4","unstructured":"S. Hirose and K. Ikeda, \u201cA note on the propagation characteristics and the strict avalanche criteria\u201d, The 1994 Symposium on Cryptography and Information Security, 1994."},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"M. Matsui, \u201cLinear cryptanalysis method for DES cipher\u201d, Advances in Cryptology \u2014 EUROCRYPT'93, Springer-Verlag, pp. 386\u2013397, 1994.","DOI":"10.1007\/3-540-48285-7_33"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"W. Meier and O.Staffelbach, \u201cNonlinearity criteria for cryptographic functions\u201d, Advances in Cryptology \u2014 EUROCRYPT'89, Springer-Verlag, pp. 549\u2013562, 1990.","DOI":"10.1007\/3-540-46885-4_53"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"K. Nyberg, \u201cOn the construction of highly nonlinear permutations\u201d, Advances in Cryptology \u2014 EUROCRYPT'92, Springer-Verlag, pp. 92\u201398, 1993.","DOI":"10.1007\/3-540-47555-9_8"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"K. Nyberg, \u201cDifferentially uniform mappings for cryptography\u201d, Advances in Cryptology \u2014 EUROCRYPT'93, Springer-Verlag, pp. 55\u201364, 1994.","DOI":"10.1007\/3-540-48285-7_6"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"K. Nyberg and L.R. Knudsen, \u201cProvable Security against Differential Cryptanalysis\u201d, Advances in Cryptology \u2014 CRYPTO'92, Springer-Verlag, pp. 566\u2013574, 1993.","DOI":"10.1007\/3-540-48071-4_41"},{"key":"9_CR10","first-page":"325","volume":"135","author":"J. Pieprzyk","year":"1988","unstructured":"J. Pieprzyk and G. Finkelstein, \u201cTowards effective nonlinear cryptosystem design\u201d, IEE Proceedings, Part E: Computers and Digital Techniques, Vol. 135, pp. 325\u2013335, 1988.","journal-title":"IEE Proceedings, Part E: Computers and Digital Techniques"},{"key":"9_CR11","unstructured":"B. Preneel, \u201cAnalysis and design of cryptographic hash functions\u201d, Ph.D. Dissertation, Katholieke Universiteit Leuven, 1993."},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"B. Preneel, W. Van Leekwijck and L. Van Linden, \u201cPropagation characteristics of Boolean functions\u201d, Advances in Cryptology \u2014 EUROCRYPT'90, Springer-Verlag, pp. 161\u2013173, 1991.","DOI":"10.1007\/3-540-46877-3_14"},{"key":"9_CR13","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1016\/0097-3165(76)90024-8","volume":"20","author":"O.S. Rothaus","year":"1976","unstructured":"O.S. Rothaus, \u201cOn \u201cbent\u201d functions\u201d, Journal of Combinatorial Theory (A), Vol. 20, pp. 300\u2013305, 1976.","journal-title":"Journal of Combinatorial Theory (A)"},{"key":"9_CR14","unstructured":"R.A. Rueppel, Stream Ciphers, in \u201cContemporary Cryptology: The Science of Information Integrity\u201d, G.J. Simmons, Ed., IEEE Press, pp. 65\u2013134, 1992."},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"J. Seberry, X. M. Zhang and Y. Zheng, \u201cSystematic generation of cryptographically robust S-boxes\u201d, In Proceedings of the first ACM Conference on Computer and Communications Security, pp. 172\u2013182, 1993.","DOI":"10.1145\/168588.168610"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"J. Seberry, X. M. Zhang and Y. Zheng, \u201cOn constructions and nonlinearity of correlation immune functions\u201d, Advances in Cryptology \u2014 EUROCRYPT'93, Springer-Verlag, pp. 181\u2013199, 1994.","DOI":"10.1007\/3-540-48285-7_16"},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"J. Seberry, X. M. Zhang and Y. Zheng, \u201cNonlinearly balanced Boolean functions and their propagation characteristics\u201d, Advances in Cryptology \u2014 CRYPTO'93, Springer-Verlag, pp. 49\u201360, 1994.","DOI":"10.1007\/3-540-48329-2_5"},{"key":"9_CR18","doi-asserted-by":"crossref","first-page":"776","DOI":"10.1109\/TIT.1984.1056949","volume":"IT-30","author":"T. Siegenthaler","year":"1984","unstructured":"T. Siegenthaler, \u201cCorrelation immunity of non-linear combining functions for cryptographic applications\u201d, IEEE Trans. Inform. Theory IT-30, pp. 776\u2013780, 1984.","journal-title":"IEEE Trans. Inform. Theory"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 ASIACRYPT'94"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0000428","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,29]],"date-time":"2019-03-29T15:21:14Z","timestamp":1553872874000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0000428"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995]]},"ISBN":["9783540593393","9783540492368"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/bfb0000428","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[1995]]}}}