{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:22:45Z","timestamp":1740122565512,"version":"3.37.3"},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2015,7,28]],"date-time":"2015-07-28T00:00:00Z","timestamp":1438041600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1007\/s10623-015-0121-3","type":"journal-article","created":{"date-parts":[[2015,7,27]],"date-time":"2015-07-27T06:13:18Z","timestamp":1437977598000},"page":"619-633","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Authentication codes based on resilient Boolean maps"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9347-5018","authenticated-orcid":false,"given":"Juan Carlos","family":"Ku-Cauich","sequence":"first","affiliation":[]},{"given":"Guillermo","family":"Morales-Luna","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,28]]},"reference":[{"key":"121_CR1","doi-asserted-by":"crossref","unstructured":"Bennett C.H., Brassard G., Robert J.M.: Privacy amplification by public discussion. SIAM J. Comput. 17(2), 210\u2013229 (1988).","DOI":"10.1137\/0217014"},{"key":"121_CR2","doi-asserted-by":"crossref","unstructured":"Carlet C.: More correlation-immune and resilient functions over Galois fields and Galois rings. In: W. Fumy (ed.) EUROCRYPT. Lecture Notes in Computer Science, vol. 1233, pp. 422\u2013433. Springer, Berlin (1997).","DOI":"10.1007\/3-540-69053-0_29"},{"key":"121_CR3","doi-asserted-by":"crossref","unstructured":"Carlet C., Ding C., Niederreiter H.: Authentication schemes from highly nonlinear functions. Des. Codes Cryptogr. 40(1), 71\u201379 (2006).","DOI":"10.1007\/s10623-005-6407-0"},{"key":"121_CR4","doi-asserted-by":"crossref","unstructured":"Carlet C., Ku-Cauich J.C., Tapia-Recillas H.: Bent functions on a Galois ring and systematic authentication codes. Adv. Math. Commun. 6(2), 249\u2013258 (2012).","DOI":"10.3934\/amc.2012.6.249"},{"key":"121_CR5","doi-asserted-by":"crossref","unstructured":"Chabaud F., Vaudenay S.: Links between differential and linear cryptanalysis. In: Advances in Cryptology. EuroCrypt\u201994, pp. 356\u2013365. Springer, Berlin (1995).","DOI":"10.1007\/BFb0053450"},{"key":"121_CR6","doi-asserted-by":"publisher","unstructured":"Chanson S.T., Ding C., Salomaa A.: Cartesian authentication codes from functions with optimal nonlinearity. Theory Comput. Sci. 290(3), 1737\u20131752 (2003). doi: 10.1016\/S0304-3975(02)00077-4 .","DOI":"10.1016\/S0304-3975(02)00077-4"},{"key":"121_CR7","unstructured":"Chor B., Goldreich O., H\u00e5stad J., Friedman J., Rudich S., Smolensky R.: The bit extraction problem of $$t$$ t -resilient functions (preliminary version). In: FOCS, pp. 396\u2013407. IEEE Computer Society (1985). http:\/\/ieeexplore.ieee.org\/xpl\/mostRecentIssue.jsp?punumber=4568115 ."},{"key":"121_CR8","doi-asserted-by":"crossref","unstructured":"Coulter R.S., Matthews R.W.: Bent polynomials over finite fields. Bull. Aust. Math. Soc. 56(3), 429\u2013437 (1997).","DOI":"10.1017\/S000497270003121X"},{"key":"121_CR9","doi-asserted-by":"crossref","unstructured":"Ding C., Niederreiter H.: Systematic authentication codes from highly nonlinear functions. IEEE Trans. Inf. Theory 50(10), 2421\u20132428 (2004).","DOI":"10.1109\/TIT.2004.834788"},{"key":"121_CR10","doi-asserted-by":"crossref","unstructured":"Ding C., Wang X.: A coding theory construction of new systematic authentication codes. Theor. Comput. Sci. 330(1), 81\u201399 (2005). Insightful Theory.","DOI":"10.1016\/j.tcs.2004.09.011"},{"key":"121_CR11","doi-asserted-by":"crossref","unstructured":"Hou X.D.: $$p$$ p -ary versions of certain results about bent functions and resilient functions. Finite Fields Appl. 10(4), 566\u2013582 (2004).","DOI":"10.1016\/j.ffa.2003.12.004"},{"key":"121_CR12","doi-asserted-by":"crossref","unstructured":"Ireland K., Rosen M.: A Classical Introduction to Modern Number Theory. Graduate Texts in Mathematics, Springer, New York (1990).","DOI":"10.1007\/978-1-4757-2103-4"},{"key":"121_CR13","doi-asserted-by":"crossref","unstructured":"\u00d6zbudak F., Saygi Z.: Some constructions of systematic authentication codes using Galois rings. Des. Codes Cryptogr. 41(3), 343\u2013357 (2006).","DOI":"10.1007\/s10623-006-9021-x"},{"key":"121_CR14","doi-asserted-by":"publisher","unstructured":"Rees R.S., Stinson D.R.: Combinatorial characterizations of authentication codes II. Des. Codes Cryptogr. 7(3), 239\u2013259 (1996). doi: 10.1023\/A:1018094824862 .","DOI":"10.1023\/A:1018094824862"},{"key":"121_CR15","doi-asserted-by":"crossref","unstructured":"Rueppel R.: Analysis and design of stream ciphers. Communications and Control Engineering Series, Springer, Berlin (1986).","DOI":"10.1007\/978-3-642-82865-2"},{"key":"121_CR16","doi-asserted-by":"crossref","unstructured":"Stinson D.R.: Combinatorial characterizations of authentication codes. Des. Codes Cryptogr. 2(2), 175\u2013187 (1992).","DOI":"10.1007\/BF00124896"},{"key":"121_CR17","doi-asserted-by":"crossref","unstructured":"Zhang X.M., Zheng Y.: Cryptographically resilient functions. IEEE Trans. Inf. Theory 43(5), 1740\u20131747 (1997).","DOI":"10.1109\/18.623184"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-015-0121-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-015-0121-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-015-0121-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T15:58:40Z","timestamp":1559231920000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-015-0121-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7,28]]},"references-count":17,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2016,9]]}},"alternative-id":["121"],"URL":"https:\/\/doi.org\/10.1007\/s10623-015-0121-3","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"type":"print","value":"0925-1022"},{"type":"electronic","value":"1573-7586"}],"subject":[],"published":{"date-parts":[[2015,7,28]]}}}