{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,27]],"date-time":"2025-01-27T05:42:02Z","timestamp":1737956522350,"version":"3.33.0"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2008,2,7]],"date-time":"2008-02-07T00:00:00Z","timestamp":1202342400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["AAECC"],"published-print":{"date-parts":[[2008,4]]},"DOI":"10.1007\/s00200-008-0061-5","type":"journal-article","created":{"date-parts":[[2008,2,6]],"date-time":"2008-02-06T11:00:45Z","timestamp":1202295645000},"page":"99-133","source":"Crossref","is-referenced-by-count":0,"title":["t-resilient functions and the partial exposure problem"],"prefix":"10.1007","volume":"19","author":[{"given":"Paul","family":"Camion","sequence":"first","affiliation":[]},{"given":"Jacques","family":"Patarin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2008,2,7]]},"reference":[{"issue":"2","key":"61_CR1","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1137\/0217014","volume":"17","author":"C. Bennett","year":"1988","unstructured":"Bennett, C., Brassard, G., Robert, J.: Privacy amplification by public discussion. SIAM. J. Comput. 17(2), 210\u2013229 (1988)","journal-title":"SIAM. J. Comput."},{"key":"61_CR2","doi-asserted-by":"crossref","first-page":"424","DOI":"10.1137\/S0895480194270950","volume":"9","author":"J. Bierbauer","year":"1996","unstructured":"Bierbauer, J., Gopalakrishna, K., Stinson, D.: Orthogonal Arrays, resilient functions, error-correcting codes and linear programming bounds. SIAM. J. Discr. Math. 9, 424\u2013452 (1996)","journal-title":"SIAM. J. Discr. Math."},{"key":"61_CR3","doi-asserted-by":"crossref","unstructured":"Camion, P., Carlet, C., Charpin, P., Sendrier, N.: On correlation-immune functions. In: Feigenbaum, J. (ed.) Advances in Cryptology\u2014CRYPTO\u201991. Lecture Notes in Computer Science, N 576, pp. 86\u2013100. Springer, Heidelberg (1992)","DOI":"10.1007\/3-540-46766-1_6"},{"key":"61_CR4","doi-asserted-by":"crossref","unstructured":"Camion, P., Canteaut, A.: Construction of t-Resilient Functions over a Finite Alphabet. In: Ueli Maurer (ed.) Advances in Cryptology\u2014EUROCRYPT\u201996, N 1070. Lecture Notes in Computer Science, pp. 283\u2013293. Springer, Heidelberg (1996)","DOI":"10.1007\/3-540-68339-9_25"},{"key":"61_CR5","doi-asserted-by":"crossref","unstructured":"Camion, P., Canteaut, A.: Generalization of Siegenthaler inequality and Schnorr-Vaudenay multipermutations, In: Koblitz, N. (ed.) Advances in Cryptology\u2014CRYPTO\u201996. Lecture Notes in Computer Science, N 1109, Springer, Heidelberg (1996)","DOI":"10.1007\/3-540-68697-5_28"},{"key":"61_CR6","unstructured":"Camion, P.: Codes and association schemes. Handbook of Coding Theory, Chap. 18, pp. 1441\u20131556, North Holland (1998)"},{"issue":"2","key":"61_CR7","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1023\/A:1008337029047","volume":"16","author":"P. Camion","year":"1999","unstructured":"Camion, P., Canteaut, A.: Correlation-immune and resilient functions over a finite alphabet and their applications in cryptography. Designs Codes Cryptography 16(2), 121\u2013 (1999)","journal-title":"Designs Codes Cryptography"},{"key":"61_CR8","doi-asserted-by":"crossref","unstructured":"Camion, P.: Codes over $${{\\mathbb Z}_{p^n}}$$ and association schemes. In: Barg, A. Litsyn, S. (eds.) Codes and Association Schemes AMS\u2014DIMACS, 2001, 303 pages, ISBN 0-8218-2074-5. DIMACS\/56, American Mathematical Society, Providence, pp. 59\u201386 (2001)","DOI":"10.1090\/dimacs\/056\/05"},{"key":"61_CR9","doi-asserted-by":"crossref","unstructured":"Chor, B., Friedman, J., Golreich, O., Ha\u0307stad, J., Rudich, S., Smolensky, R.: The bit extraction problem or t-resilient Functions. Proceedings of FOCS, pp. 396\u2013407 (1985)","DOI":"10.1109\/SFCS.1985.55"},{"key":"61_CR10","unstructured":"Delsarte, P.: An algebraic approach to association schemes of coding theory Thesis, Universit\u00e9 catholique de Louvain, June 1973"},{"key":"61_CR11","unstructured":"Dodis, Y.: Exposure-Resilient Cryptography PHD Thesis, Massachusetts Institute of Technology, August 2000. http:\/\/theory.lcs.mit.edu\/yevgen\/ps\/phd-thesis.ps"},{"key":"61_CR12","doi-asserted-by":"crossref","unstructured":"Friedman, J.: On the bit extraction Problem. Proceedings of FOCS, pp. 314\u2013319 (1992)","DOI":"10.1109\/SFCS.1992.267760"},{"key":"61_CR13","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1007\/BF01388386","volume":"5","author":"K. Gopalakrishnan","year":"1995","unstructured":"Gopalakrishnan, K., Stinson, D.R.: Three characterizations of non-binary correlation-immune and resilient functions. Designs Codes Cryptography. 5, 241\u2013251 (1995)","journal-title":"Designs Codes Cryptography."},{"key":"61_CR14","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1109\/18.312154","volume":"40","author":"A. Roger Hammons Jr","year":"1994","unstructured":"Roger Hammons, A., Vijay Kumar, P., Calderbank, A.R., Sloane, N.J.A., Sol\u00e9, P.: The $${{\\mathbb Z}_{4}}$$ -Linearity of Kerdock, Preparata, Goethals and Related Codes. IEEE. Trans. Inf. Theory 40, 301\u2013319 (1994)","journal-title":"IEEE. Trans. Inf. Theory"},{"key":"61_CR15","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4612-1478-6","volume-title":"Orthogonal arrays: theory and applications","author":"A.S. Hedayat","year":"1999","unstructured":"Hedayat, A.S., Sloane, N.J.A., Stufken, J.: Orthogonal arrays: theory and applications. Springer, New York (1999)"},{"key":"61_CR16","unstructured":"Lidl, R., Niederreiter, H.: Finite fields, encyclopedia of mathematics and its applications, vol. 20, Cambridge University Press, Cambridge, London (1987)"},{"key":"61_CR17","unstructured":"MacWilliams, F.J., Sloane, N.J.: The theory of error correcting codes. North-Holland (1977)"},{"key":"61_CR18","doi-asserted-by":"crossref","unstructured":"Maurer, U.M., Massey, J.L.: Perfect local randomness in pseudo-random sequences. In: Brassard, G. (ed.) Advances in Cryptology\u2014CRYPTO\u201989, N 435 in Lecture Notes in Computer Science, pp. 100\u2013112. Springer, Heidelberg (1990)","DOI":"10.1007\/0-387-34805-0_11"},{"key":"61_CR19","doi-asserted-by":"crossref","unstructured":"Ozarow, L.H., Wyner, A.D.: Wire-tap Channel II. In: Beth, T., Cot, N., Ingemarson, I. (eds.) Advances in Cryptology\u2014Proceedings of Eurocrypt 84, Lecture Notes in Computer Science, No. 209, pp. 33\u201350 Springer, Berlin (1985)","DOI":"10.1007\/3-540-39757-4_5"},{"key":"61_CR20","doi-asserted-by":"crossref","first-page":"128","DOI":"10.2307\/2983576","volume":"9","author":"C.R. Rao","year":"1947","unstructured":"Rao, C.R.: Factorial experiments derivable from combinatorial arrangements of arrays. J. R. Statist. 9, 128\u2013139 (1947)","journal-title":"J. R. Statist."},{"key":"61_CR21","doi-asserted-by":"crossref","unstructured":"Schnorr, C.P.: On the construction of random number generators and random function generators. In: Christof G. Gnther (ed.) Advances in Cryptology\u2014Proceedings of EUROCRYPT\u201988, Lecture Notes in Computer Science, N. 330, pp. 225\u2013232, Springer, Berlin (1988)","DOI":"10.1007\/3-540-45961-8_19"},{"key":"61_CR22","doi-asserted-by":"crossref","unstructured":"Siegenthaler, T.: Correlation-immunity of nonlinear combining functions for cryptographic applications, IEEE Inf. Theory, vol. IT-30, N 5, Sept. 84","DOI":"10.1109\/TIT.1984.1056949"},{"issue":"3","key":"61_CR23","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1007\/BF00202271","volume":"8","author":"D.R. Stinson","year":"1995","unstructured":"Stinson, D.R., Massey, J.L.: An infinite class of counterexamples to a conjecture concerning nonlinear resilient functions. J. Cryptology. 8(3), 157\u2013166 (1995)","journal-title":"J. Cryptology."},{"issue":"3","key":"61_CR24","doi-asserted-by":"crossref","first-page":"569","DOI":"10.1109\/18.6037","volume":"IT-34","author":"G. Xiao","year":"1988","unstructured":"Xiao, G., Massey, J.L.: A spectral characterization of correlation-immune combining functions. IEEE Trans. Inform. Theory IT-34(3), 569\u2013571 (1988)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"61_CR25","doi-asserted-by":"crossref","unstructured":"Zhang, X., Zheng, U.: On nonlinear resilient functions. In: Guillou, L., Quisquater, J.J. (eds.) Advances in Cryptology\u2014EUROCRYPT\u201995, N 921 in Lecture Notes in Computer Science, pp. 274\u2013288. Springer Heidelberg (1995)","DOI":"10.1007\/3-540-49264-X_22"},{"key":"61_CR26","doi-asserted-by":"crossref","unstructured":"Wan, Z.-X.: Quaternary Codes. World Scientific (1997)","DOI":"10.1142\/3603"}],"container-title":["Applicable Algebra in Engineering, Communication and Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00200-008-0061-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00200-008-0061-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00200-008-0061-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,26]],"date-time":"2025-01-26T19:33:55Z","timestamp":1737920035000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00200-008-0061-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,2,7]]},"references-count":26,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2008,4]]}},"alternative-id":["61"],"URL":"https:\/\/doi.org\/10.1007\/s00200-008-0061-5","relation":{},"ISSN":["0938-1279","1432-0622"],"issn-type":[{"type":"print","value":"0938-1279"},{"type":"electronic","value":"1432-0622"}],"subject":[],"published":{"date-parts":[[2008,2,7]]}}}