{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T11:21:11Z","timestamp":1742383271836},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540617488"},{"type":"electronic","value":"9783540706472"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1996]]},"DOI":"10.1007\/bfb0025134","type":"book-chapter","created":{"date-parts":[[2005,11,19]],"date-time":"2005-11-19T06:43:04Z","timestamp":1132382584000},"page":"41-52","source":"Crossref","is-referenced-by-count":2,"title":["Information leakage of a randomly selected boolean function"],"prefix":"10.1007","author":[{"given":"A. M.","family":"Youssef","sequence":"first","affiliation":[]},{"given":"S. E.","family":"Tavares","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,15]]},"reference":[{"key":"4_CR1","volume-title":"PhD thesis","author":"C.M. Adams","year":"1990","unstructured":"C.M. Adams. A Formal and Practical Design Procedure for Substitution-Permutation Network Cryptosystems. PhD thesis, Queen's University, Kingston, Ontario, Canada, September, 1990."},{"issue":"no.1","key":"4_CR2","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E. Biham","year":"1991","unstructured":"E. Biham and A. Shamir. Differential cryptanalysis of DES-like cryptosystems. Journal of Cryptology, vol. 4, no. 1, pp. 3\u201372, 1991.","journal-title":"Journal of Cryptology"},{"key":"4_CR3","first-page":"552","volume-title":"The information leakage through a randomly generated function","author":"L. Brynielsson","year":"1991","unstructured":"L. Brynielsson. The information leakage through a randomly generated function. Advances in Cryptology: Proc. of EUROCRYPT '91, Springer-Verlag, Berlin, pp. 552\u2013553, 1991."},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"B. Chor, O. Goldreich, J. Hastad, J. Friedman, S. Rudich, and R. Smolensky. The bit extraction problem or t-resilient functions. Proc. 26th IEEE Symposium on Foundation of Computer Science, pp. 396\u2013407, 1985.","DOI":"10.1109\/SFCS.1985.55"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"T.M. Cover and J.A. Thomas. Elements of Information Theory. John Wiely & Sons Inc, 1991.","DOI":"10.1002\/0471200611"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"M.H. Dawson and S.E. Tavares. An expanded set of S-box design criteria based on information theory and its relation to differential attacks. Advances in Cryptology: Proc. of EUROCRYPT '91, Springer-Verlag, pp. 352\u2013365, 1992.","DOI":"10.1007\/3-540-46416-6_30"},{"key":"4_CR7","unstructured":"R. Forr\u00e9. The strict avalanche criterion: Spectral properties of boolean functions and an extended definition. Advances in Cryptology: Proc. of CRYPTO '88, Springer-Verlag, pp. 450\u2013468, 1989."},{"issue":"No.3","key":"4_CR8","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1007\/BF00190799","volume":"2","author":"R. Forr\u00e9","year":"1990","unstructured":"R. Forr\u00e9. Methods and instruments for designing S-boxes. Journal of Cryptology, Vol. 2, No.3 pp. 115\u2013130, 1990.","journal-title":"Journal of Cryptology"},{"key":"4_CR9","first-page":"257","volume-title":"Are big S-boxes best ?","author":"J. Gordon","year":"1982","unstructured":"J. Gordon and H. Retkin. Are big S-boxes best ? Lecture Notes in Computer Science: Proc. of the Workshop on Cryptography, Springer-Verlag, Berlin, pp. 257\u2013262, 1982."},{"key":"4_CR10","doi-asserted-by":"crossref","first-page":"747","DOI":"10.1109\/TC.1979.1675242","volume":"C-28","author":"J.B. Kam","year":"1979","unstructured":"J.B. Kam and G.I. Davida. Structured design of substitution-permutation encryption networks. IEEE Trans. Comp. C-28, pp.747\u2013753, 1979.","journal-title":"IEEE Trans. Comp."},{"key":"4_CR11","first-page":"386","volume-title":"Linear cryptanalysis method for DES cipher","author":"M. Matsui","year":"1994","unstructured":"M. Matsui. Linear cryptanalysis method for DES cipher. Advances in Cryptology: Proc. of EUROCRYPT '93, Springer-Verlag, Berlin, pp. 386\u2013397, 1994."},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"W. Meier and O. Staffelbach. Nonlinearity criteria for cryptographic functions. Advances in Cryptology: Proc. of EUROCRYPT 89, Springer-Verlag, pp. 549\u2013562, 1990.","DOI":"10.1007\/3-540-46885-4_53"},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"K. Nyberg. Perfect nonlinear S-boxes. Advances in Cryptology: Proc. of EURO-CRYPT '91, Springer-Verlag, pp. 378\u2013386, 1992.","DOI":"10.1007\/3-540-46416-6_32"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"B. Preneel, W.V. Leekwijk, L.V. Linden, R.Govaerts, and J. Vandewalle. Propagation charachteristic of boolean functions. Advances in Cryptology: Proc. of EUROCRYPT '90, Springer-Verlag, pp. 161\u2013173, 1991.","DOI":"10.1007\/3-540-46877-3_14"},{"key":"4_CR15","volume-title":"Applied Combinatorics","author":"F.S. Roberts","year":"1984","unstructured":"F.S. Roberts. Applied Combinatorics. Englewood Cliffs, N.J.: Prentice-Hall, 1984."},{"issue":"A","key":"4_CR16","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1016\/0097-3165(76)90024-8","volume":"20","author":"O.S Rothaus","year":"1976","unstructured":"O.S Rothaus. On bent functions. Journal of Combinatorial Theory, Vol. 20(A):300\u2013305, 1976.","journal-title":"Journal of Combinatorial Theory"},{"issue":"No.1","key":"4_CR17","doi-asserted-by":"crossref","first-page":"81:85","DOI":"10.1109\/TC.1985.1676518","volume":"C-34","author":"T. Siegenthaler","year":"1985","unstructured":"T. Siegenthaler. Decrypting a class of stream ciphers using ciphertext only. IEEE Trans. Comput., Vol.C-34, No. 1, pp. 81:85, 1985.","journal-title":"IEEE Trans. Comput."},{"issue":"No.5","key":"4_CR18","first-page":"776:780","volume":"IT-30","author":"T. Siegenthaler","year":"1984","unstructured":"T. Siegenthaler. Correlation-immunity of nonlinear combining functions forcryptographic applications. IEEE Trans. on Inform. Theory, Vol.IT-30, No.5, pp. 776:780, Sept. 1984.","journal-title":"IEEE Trans. on Inform. Theory"},{"key":"4_CR19","first-page":"260","volume-title":"On the design of SP networks from an information theoretic point of view","author":"M. Sivabalan","year":"1993","unstructured":"M. Sivabalan, S.E. Tavares, and L.E. Peppard. On the design of SP networks from an information theoretic point of view. Advances in Cryptology: Proc. of CRYPTO '92, Springer-Verlag, Berlin, pp. 260\u2013279, 1993."},{"key":"4_CR20","volume-title":"Master's thesis","author":"A.F. Webster","year":"1985","unstructured":"A.F. Webster. Plaintext \/ ciphertext bit dependencies in cryptographic systems. Master's thesis, Queen's University, Kingston, Ontario, Canada, December, 1985."},{"key":"4_CR21","doi-asserted-by":"crossref","unstructured":"A.F. Webster and S.E. Tavares. On the design of S-boxes. Advances in Cryptology: Proc. of CRYPTO '85, Springer-Verlag, pp. 523\u2013534, 1986.","DOI":"10.1007\/3-540-39799-X_41"},{"key":"4_CR22","doi-asserted-by":"crossref","unstructured":"A.M. Youssef and S.E. Tavares. Spectral properties and information leakage of multi-output boolean functions. In Proceedings of the IEEE International Symposium On Information Theory. Whistler, B.C., Canada, Sep. 17\u201322, 1995.","DOI":"10.1109\/ISIT.1995.550338"},{"issue":"No.25","key":"4_CR23","doi-asserted-by":"crossref","first-page":"2168","DOI":"10.1049\/el:19951466","volume":"31","author":"A.M. Youssef","year":"1995","unstructured":"A.M. Youssef, S.E. Tavares, S. Mister, and C.M. Adams. Linear approximation of injective s-boxes. IEE Electronics Letters, Vol. 31, No. 25, pp. 2168\u20132169, 1995.","journal-title":"IEE Electronics Letters"},{"key":"4_CR24","doi-asserted-by":"crossref","unstructured":"M. Zhang, S.E. Tavares, and L.L. Campbell. Information leakage of boolean functions and its relationship to other cryptographic criteria. Proceedings of 2nd ACM Conference on Computer and Communications Security, Fairfax, Virgina, pp. 156\u2013165., 1994.","DOI":"10.1145\/191177.191209"}],"container-title":["Lecture Notes in Computer Science","Information Theory and Applications II"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0025134","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,11]],"date-time":"2020-04-11T01:30:37Z","timestamp":1586568637000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0025134"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1996]]},"ISBN":["9783540617488","9783540706472"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/bfb0025134","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1996]]}}}