{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T05:00:19Z","timestamp":1764997219253,"version":"3.37.3"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2019,1,9]],"date-time":"2019-01-09T00:00:00Z","timestamp":1546992000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1007\/s10623-019-00604-1","type":"journal-article","created":{"date-parts":[[2019,1,9]],"date-time":"2019-01-09T09:49:00Z","timestamp":1547027340000},"page":"2043-2059","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["Transparency order for Boolean functions: analysis and construction"],"prefix":"10.1007","volume":"87","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3474-4115","authenticated-orcid":false,"given":"Qichun","family":"Wang","sequence":"first","affiliation":[]},{"given":"Pantelimon","family":"St\u0103nic\u0103","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,9]]},"reference":[{"issue":"2","key":"604_CR1","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1109\/12.73590","volume":"40","author":"RE Bryant","year":"1991","unstructured":"Bryant R.E.: On the complexity of VLSI implementations and graph representations of Boolean functions with application to integer multiplication. IEEE Trans. Comput. 40(2), 205\u2013213 (1991).","journal-title":"IEEE Trans. Comput."},{"key":"604_CR2","doi-asserted-by":"publisher","first-page":"2791","DOI":"10.1109\/TIT.2005.851743","volume":"51","author":"A Canteaut","year":"2005","unstructured":"Canteaut A., Videau M.: Symmetric Boolean functions. IEEE Trans. Inf. Theory 51, 2791\u20132811 (2005).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"604_CR3","unstructured":"Carlet C.: On Highly Nonlinear S-Boxes and Their Inability to Thwart DPA Attacks. Progress in Cryptology-INDOCRYPT 2005, LNCS 3797, pp. 49\u201362. Springer, Berlin (2005)."},{"key":"604_CR4","doi-asserted-by":"crossref","unstructured":"Carlet C.: Boolean functions for cryptography and error correcting codes, chapter of the monography. In: Boolean Models and Methods in Mathematics, Computer Science, and Engineering, pp. 257\u2013397. Cambridge University Press, Cambridge (2010). \n                    http:\/\/www-roc.inria.fr\/secret\/Claude.Carlet\/pubs.html\n                    \n                  .","DOI":"10.1017\/CBO9780511780448.011"},{"key":"604_CR5","unstructured":"Carlet C., Feng K.: An Infinite Class of Balanced Functions with Optimal Algebraic Immunity, Good Immunity to Fast Algebraic Attacks and Good Nonlinearity. Advances in Cryptology-ASIACRYPT 2008, LNCS 5350, pp. 425\u2013440. Springer, Berlin (2008)."},{"issue":"7","key":"604_CR6","doi-asserted-by":"publisher","first-page":"3105","DOI":"10.1109\/TIT.2006.876253","volume":"52","author":"C Carlet","year":"2006","unstructured":"Carlet C., Dalai D.K., Gupta K.C., Maitra S.: Algebraic immunity for cryptographically significant Boolean functions: analysis and construction. IEEE Trans. Inf. Theory 52(7), 3105\u20133121 (2006).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"604_CR7","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/s10623-016-0250-3","volume":"82","author":"K Chakraborty","year":"2017","unstructured":"Chakraborty K., Sarkar S., Maitra S., Mazumdar B., Mukhopadhyay D., Prouff E.: Redefining the transparency order. Des. Codes Cryptogr. 82, 95\u2013115 (2017).","journal-title":"Des. Codes Cryptogr."},{"key":"604_CR8","volume-title":"Cryptographic Boolean Functions and Applications","author":"TW Cusick","year":"2017","unstructured":"Cusick T.W., St\u0103nic\u0103 P.: Cryptographic Boolean Functions and Applications, 2nd edn. Elsevier, Academic Press (2017).","edition":"2"},{"key":"604_CR9","unstructured":"Evci M.A., Kavut S.: DPA Resilience of Rotation-Symmetric S-boxes, IWSEC, pp. 146\u2013157 (2014)."},{"key":"604_CR10","unstructured":"Fei Y., Luo Q., Ding A.A.: A Statistical Model for DPA with Novel Algorithmic Confusion Analysis, CHES 2012, LNCS 7428, pp. 233\u2013250. Springer, Berlin (2012)."},{"key":"604_CR11","unstructured":"Fei Y., Ding A.A., Lao J., Zhang L.: A Statistics-Based Fundamental Model for Side-Channel Attack Analysis, IACR Cryptology ePrint Archive, Report 2014\/152 (2014)."},{"issue":"2","key":"604_CR12","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/s10623-008-9228-0","volume":"50","author":"K Feng","year":"2009","unstructured":"Feng K., Liao Q., Yang J.: Maximum values of generalized algebraic immunity. Des. Codes Cryptogr. 50(2), 243\u2013252 (2009).","journal-title":"Des. Codes Cryptogr."},{"key":"604_CR13","unstructured":"Fischer W., Gammel B.M., Kniffler O., Velten J.: Differential Power Analysis of Stream Ciphers, CT-RSA 2007, LNCS 4377, pp. 257\u2013270. Springer, Berlin (2006)."},{"key":"604_CR14","unstructured":"Guilley S., Pacalet R.: Differential Power Analysis Model and Some Results, CARDIS, pp. 127\u2013142 (2004)."},{"issue":"2","key":"604_CR15","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1137\/0112026","volume":"12","author":"MA Harrison","year":"1964","unstructured":"Harrison M.A.: On the classification of Boolean functions by the general linear and affine groups. J. Soc. Ind. Appl. Math. 12(2), 285\u2013299 (1964).","journal-title":"J. Soc. Ind. Appl. Math."},{"key":"604_CR16","unstructured":"Jain A., Chaudhari N.S.: Evolving Highly Nonlinear Balanced Boolean Functions with Improved Resistance to DPA Attacks, NSS 2015, LNCS 9408, pp. 316\u2013330. Springer, Berlin (2015)."},{"key":"604_CR17","unstructured":"Kocher P.: Timing attacks on implementations of Diffie\u2013Hellman, RSA, DSS, and other systems, Advances in Cryptology\u2013CRYPTO\u201996, LNCS 1109, pp. 104\u2013113. Springer, Berlin (1996)."},{"key":"604_CR18","unstructured":"Kocher P., Jaffe J., Jun B.: Differential Power Analysis, Advances in Cryptology\u2013CRYPTO\u201999, LNCS 1666, pp. 388\u2013397. Springer, Berlin (1999)."},{"key":"604_CR19","unstructured":"Langevin P.: Classification of Boolean functions under the affine group. \n                    http:\/\/langevin.univ-tln.fr\/project\/agl\/agl.html\n                    \n                  ."},{"issue":"195","key":"604_CR20","first-page":"403","volume":"57","author":"JA Maiorana","year":"1991","unstructured":"Maiorana J.A.: A classification of the cosets of the Reed\u2013Muller code R(1,6). Math. Comput. 57(195), 403\u2013414 (1991).","journal-title":"Math. Comput."},{"key":"604_CR21","volume-title":"Power Analysis Attacks-Revealing the Secrets of Smart Cards","author":"S Mangard","year":"2007","unstructured":"Mangard S., Oswald E., Popp T.: Power Analysis Attacks-Revealing the Secrets of Smart Cards. Springer, Berlin (2007)."},{"issue":"1","key":"604_CR22","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1109\/TC.2016.2569410","volume":"66","author":"B Mazumdar","year":"2017","unstructured":"Mazumdar B., Mukhopadhyay D.: Construction of rotation symmetric \n                    \n                      \n                    \n                    $$S$$\n                    \n                      \n                        S\n                      \n                    \n                  -boxes with high nonlinearity and improved DPA resistivity. IEEE Trans. Comput. 66(1), 59\u201372 (2017).","journal-title":"IEEE Trans. Comput."},{"key":"604_CR23","doi-asserted-by":"crossref","unstructured":"Mazumdar B., Mukhopadhyay D., Sengupta I.: Design and implementation of rotation symmetric S-boxes with high nonlinearity and high DPA resilience. In: 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp. 87\u201392 (2013).","DOI":"10.1109\/HST.2013.6581571"},{"issue":"12","key":"604_CR24","doi-asserted-by":"publisher","first-page":"2154","DOI":"10.1109\/TIFS.2013.2285522","volume":"8","author":"B Mazumdar","year":"2013","unstructured":"Mazumdar B., Mukhopadhyay D., Sengupta I.: Constrained search for a class of good bijective S-boxes with improved DPA resistivity. IEEE Trans. Inf. Forensics Secur. 8(12), 2154\u20132163 (2013).","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"604_CR25","unstructured":"Nguyen C., Tran L., Nguyen K.: On the resistance of Serpent-type 4 bit S-boxes against differential power attacks, 2014 IEEE Fifth International Conference on Communication and Electronics (ICCE), pp. 542\u2013547 (2014)."},{"key":"604_CR26","unstructured":"Patranabis S., Roy D.B., Chakraborty A., Nagar N., Singh A., Mukhopadhyay D., Ghosh S.: Lightweight design-for-security strategies for combined countermeasures against side channel and fault analysis in IoT applications. Journal of Hardware and Systems Security (to appear)."},{"key":"604_CR27","unstructured":"Picek S., Batina L., Jakobovic D.: Evolving DPA-Resistant Boolean Functions, PPSN 2014, LNCS 8672, pp. 812\u2013821. Springer, Berlin (2014)."},{"key":"604_CR28","unstructured":"Picek S., Ege B., Batina L., Jakobovic D., Chmielewski L., Golub M.: On Using Genetic Algorithms for Intrinsic Side-channel Resistance: The Case of AES S-box. In: Proceedings of the First Workshop on Cryptography and Security in Computing Systems, ser. CS2, pp. 13\u201318 (2014)."},{"key":"604_CR29","unstructured":"Picek S., Ege B., Papagiannopoulos K., Batina L., Jakobovic D.: Optimality and beyond: the case of 4x4 S-boxes, 2014 In: IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp. 80\u201383 (2014)."},{"key":"604_CR30","unstructured":"Picek S., Papagiannopoulos K., Ege B., Batina L., Jakobovic D.: Confused by Confusion: Systematic Evaluation of DPA Resistance of Various S-boxes, Progress in Cryptology-INDOCRYPT 2014, LNCS 8885, pp. 374\u2013390. Springer, Berlin (2014)."},{"key":"604_CR31","unstructured":"Picek S., Mazumdar B., Mukhopadhyay D., Batina L.: Modified Transparency Order Property: Solution or Just Another Attempt, SPACE 2015, LNCS 9354, pp. 210\u2013227. Springer, Berlin (2015)."},{"key":"604_CR32","unstructured":"Prouff E.: DPA Attacks and S-Boxes, FSE 2005, LNCS 3557, pp. 424\u2013441. Springer, Berlin (2005)."},{"issue":"8","key":"604_CR33","doi-asserted-by":"publisher","first-page":"4014","DOI":"10.1109\/TIT.2010.2050801","volume":"56","author":"P Rizomiliotis","year":"2010","unstructured":"Rizomiliotis P.: On the resistance of boolean functions against algebraic attacks using univariate polynomial representation. IEEE Trans. Inf. Theory 56(8), 4014\u20134024 (2010).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"604_CR34","unstructured":"Sarkar S., Maitra S., Chakraborty K.: Differential Power Analysis in Hamming Weight Model: How to Choose among (Extended) Affine Equivalent S-boxes, Progress in Cryptology-INDOCRYPT 2014, LNCS 8885, pp. 360\u2013373. Springer, Berlin (2014)."},{"key":"604_CR35","unstructured":"Selvam R., Shanmugam D., Annadurai S.: Decomposed \n                    \n                      \n                    \n                    $$S$$\n                    \n                      \n                        S\n                      \n                    \n                  -Boxes and DPA Attacks: A Quantitative Case Study Using PRINCE, SPACE, pp. 179\u2013193 (2016)."},{"key":"604_CR36","doi-asserted-by":"publisher","first-page":"1567","DOI":"10.1016\/j.dam.2007.04.029","volume":"156","author":"P St\u0103nic\u0103","year":"2008","unstructured":"St\u0103nic\u0103 P., Maitra S.: Rotation symmetric boolean functions-count and cryptographic properties. Discret. Appl. Math. 156, 1567\u20131580 (2008).","journal-title":"Discret. Appl. Math."},{"key":"604_CR37","doi-asserted-by":"crossref","unstructured":"St\u0103nic\u0103 P., Maitra S., Clark J.: Results on rotation symmetric bent and correlation immune Boolean functions, FSE 2004, LNCS 3017, pp. 161\u2013177. Springer, Berlin (2004)","DOI":"10.1007\/978-3-540-25937-4_11"},{"issue":"1","key":"604_CR38","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1587\/transfun.E94.A.165","volume":"E94.A","author":"C Tan","year":"2011","unstructured":"Tan C., Goh S.: Several classes of even-variable balanced Boolean functions with optimal algebraic immunity. IEICE Trans. E94.A(1), 165\u2013171 (2011).","journal-title":"IEICE Trans."},{"issue":"1","key":"604_CR39","doi-asserted-by":"publisher","first-page":"653","DOI":"10.1109\/TIT.2012.2217476","volume":"59","author":"D Tang","year":"2013","unstructured":"Tang D., Carlet C., Tang X.: Highly nonlinear boolean functions with optimal algebraic immunity and good behavior against fast algebraic attacks. IEEE Trans. Inf. Theory 59(1), 653\u2013664 (2013).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"604_CR40","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10623-010-9413-9","volume":"60","author":"Z Tu","year":"2011","unstructured":"Tu Z., Deng Y.: A conjecture about binary strings and its applications on constructing Boolean functions with optimal algebraic immunity. Des. Codes Cryptogr. 60(1), 1\u201314 (2011).","journal-title":"Des. Codes Cryptogr."},{"issue":"6","key":"604_CR41","doi-asserted-by":"publisher","first-page":"3048","DOI":"10.1109\/TIT.2010.2046195","volume":"56","author":"Q Wang","year":"2010","unstructured":"Wang Q., Peng J., Kan H., Xue X.: Constructions of cryptographically significant Boolean functions using primitive polynomials. IEEE Trans. Inf. Theory 56(6), 3048\u20133053 (2010).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"604_CR42","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.dam.2014.01.010","volume":"174","author":"Q Wang","year":"2014","unstructured":"Wang Q., Carlet C., St\u0103nic\u0103 P., Tan C.: Cryptographic properties of the hidden weighted bit function. Discret. Appl. Math. 174, 1\u201310 (2014).","journal-title":"Discret. Appl. Math."},{"issue":"9","key":"604_CR43","doi-asserted-by":"publisher","first-page":"6310","DOI":"10.1109\/TIT.2011.2109935","volume":"57","author":"X Zeng","year":"2011","unstructured":"Zeng X., Carlet C., Shan J., Hu L.: More balanced Boolean functions with optimal algebraic immunity, and good nonlinearity and resistance to fast algebraic attacks. IEEE Trans. Inf. Theory 57(9), 6310\u20136320 (2011).","journal-title":"IEEE Trans. Inf. Theory"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-019-00604-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-019-00604-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-019-00604-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,8]],"date-time":"2020-01-08T19:12:46Z","timestamp":1578510766000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-019-00604-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,9]]},"references-count":43,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2019,9]]}},"alternative-id":["604"],"URL":"https:\/\/doi.org\/10.1007\/s10623-019-00604-1","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"type":"print","value":"0925-1022"},{"type":"electronic","value":"1573-7586"}],"subject":[],"published":{"date-parts":[[2019,1,9]]},"assertion":[{"value":"4 April 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 October 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 January 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 January 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}