{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T12:59:37Z","timestamp":1772283577127,"version":"3.50.1"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2010,6,17]],"date-time":"2010-06-17T00:00:00Z","timestamp":1276732800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2011,7]]},"DOI":"10.1007\/s10623-010-9413-9","type":"journal-article","created":{"date-parts":[[2010,6,16]],"date-time":"2010-06-16T05:56:41Z","timestamp":1276667801000},"page":"1-14","source":"Crossref","is-referenced-by-count":97,"title":["A conjecture about binary strings and its applications on constructing Boolean functions with optimal algebraic immunity"],"prefix":"10.1007","volume":"60","author":[{"given":"Ziran","family":"Tu","sequence":"first","affiliation":[]},{"given":"Yingpu","family":"Deng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,6,17]]},"reference":[{"key":"9413_CR1","doi-asserted-by":"crossref","unstructured":"Armknecht F.: Improving fast algebraic attacks. In: 11th International Workshop on Fast Software Encryption, FSE 2004. Lecture Notes in Computer Science, vol. 3017, pp. 65\u201382 (2004).","DOI":"10.1007\/978-3-540-25937-4_5"},{"key":"9413_CR2","unstructured":"Carlet C.: On the higher order nonlinearities of algebraic immune functions. In: Advances in Cryptology, Crypto 2006. Lecture Notes in Computer Science, vol. 4117, pp. 584\u2013601 (2006)."},{"key":"9413_CR3","unstructured":"Carlet C.: On a weakness of the Tu-Deng function and its repair. Cryptology ePrint Archive, Report 2009\/606. http:\/\/eprint.iacr.org\/2009\/606 ."},{"key":"9413_CR4","unstructured":"Carlet C., Feng K.: An infinite class of balanced functions with optimal algebraic immunity, good immunity to fast algebraic attacks and good nonlinearity. In: Advances in Cryptology, Asiacrypt 2008. Lecture Notes in Computer Science, vol. 5350, pp. 425\u2013440 (2008)."},{"key":"9413_CR5","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1007\/s10623-009-9284-0","volume":"52","author":"C. Carlet","year":"2009","unstructured":"Carlet C., Zeng X., Li C., Hu L.: Further properties of several classes of Boolean functions with optimum algebraic immunity. Des. Codes Cryptogr. 52, 303\u2013338 (2009)","journal-title":"Des. Codes Cryptogr."},{"key":"9413_CR6","unstructured":"Courtois N.T.: Fast algebraic attacks on stream ciphers with linear feedback. In: Advances in Cryptology, Crypto 2003. Lecture Notes in Computer Science, vol. 2729, pp. 176\u2013194 (2003)."},{"key":"9413_CR7","unstructured":"Courtois N.T., Meier W.: Algebraic attacks on stream ciphers with linear feedback. In: Advances in Cryptology, Eurocrypt 2003. Lecture Notes in Computer Science, vol. 2656, pp. 345\u2013359 (2003)."},{"key":"9413_CR8","unstructured":"Cusick T.W., Li Y., St\u0103nic\u0103 P.: On a combinatoric conjecture. Cryptology ePrint Archive, Report 2009\/554. http:\/\/eprint.iacr.org\/2009\/554 ."},{"key":"9413_CR9","unstructured":"Dalai D.K., Gupta K.C., Maitra S.: Results on algebraic immunity for cryptographically significant Boolean functions. In: Progress in Cryptology, Indocrypt 2004. Lecture Notes in Computer Science, vol. 3348, pp. 92\u2013106 (2005)."},{"key":"9413_CR10","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1007\/s10623-005-6300-x","volume":"40","author":"D.K. Dalai","year":"2006","unstructured":"Dalai D.K., Maitra S., Sarkar S.: Basic theory in construction of boolean functions with maximum possible annihilator immunity. Des. Codes Cryptogr. 40, 41\u201358 (2006)","journal-title":"Des. Codes Cryptogr."},{"key":"9413_CR11","unstructured":"Dillon J.F.: Elementary Hadamard Difference Sets. PhD thesis, University of Maryland (1974)."},{"key":"9413_CR12","unstructured":"Gong G.: On existence and invariant of algebraic attacks. The Centre for Applied Cryptographic Research (CACR) at the University of Waterloo, Canada, Technical Report CORR 2004-17. http:\/\/www.cacr.math.uwaterloo.ca ."},{"key":"9413_CR13","unstructured":"Li N., Qi W.: Construction and analysis of boolean functions of 2t+1 variables with maximum algebraic immunity. In: Advances in Cryptology, Asiacrypt 2006. Lecture Notes in Computer Science, vol. 4284, pp. 84\u201398 (2006)."},{"key":"9413_CR14","doi-asserted-by":"crossref","first-page":"1330","DOI":"10.1109\/TIT.2007.915914","volume":"54","author":"N. Li","year":"2008","unstructured":"Li N., Qu L., Qi W., Feng G., Li C., Xie D.: On the construction of Boolean functions with optimal algebraic immunity. IEEE Trans. Inform. Theory 54, 1330\u20131334 (2008)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"9413_CR15","doi-asserted-by":"crossref","first-page":"453","DOI":"10.1515\/156939206779238418","volume":"16","author":"M. Lobanov","year":"2006","unstructured":"Lobanov M.: Exact relation between nonlinearity and algebraic immunity. Discrete Math. Appl. 16, 453\u2013460 (2006)","journal-title":"Discrete Math. Appl."},{"key":"9413_CR16","volume-title":"The Theory of Error-Correcting Codes","author":"F.J. MacWilliams","year":"1977","unstructured":"MacWilliams F.J., Sloane N.J.A.: The Theory of Error-Correcting Codes. North-Holland, Amsterdam (1977)"},{"key":"9413_CR17","unstructured":"Meier W., Pasalic E., Carlet C.: Algebraic attacks and decomposition of boolean functions. In: Advances in Cryptology, Eurocrypt 2004. Lecture Notes in Computer Science, vol. 3027, pp. 474\u2013491 (2004)."},{"key":"9413_CR18","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1016\/0097-3165(76)90024-8","volume":"20","author":"O.S. Rothaus","year":"1976","unstructured":"Rothaus O.S.: On bent functions. J. Combin. Theory A 20, 300\u2013305 (1976)","journal-title":"J. Combin. Theory A"},{"key":"9413_CR19","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511805967","volume-title":"Enumerative Combinatorics, vol. 1","author":"R.P. Stanley","year":"1997","unstructured":"Stanley R.P.: Enumerative Combinatorics, vol. 1. Cambridge University Press, Cambridge (1997)"},{"key":"9413_CR20","unstructured":"Tu Z., Deng Y.: Boolean functions with algebraic immunity one (Submitted)."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-010-9413-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-010-9413-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-010-9413-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T19:58:28Z","timestamp":1559246308000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-010-9413-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,6,17]]},"references-count":20,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011,7]]}},"alternative-id":["9413"],"URL":"https:\/\/doi.org\/10.1007\/s10623-010-9413-9","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,6,17]]}}}