{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T19:22:37Z","timestamp":1774034557599,"version":"3.50.1"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2019,7,22]],"date-time":"2019-07-22T00:00:00Z","timestamp":1563753600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,7,22]],"date-time":"2019-07-22T00:00:00Z","timestamp":1563753600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61672414"],"award-info":[{"award-number":["61672414"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Cryptography Development Fund","award":["MMJJ20170113"],"award-info":[{"award-number":["MMJJ20170113"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1604180"],"award-info":[{"award-number":["U1604180"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1007\/s10623-019-00662-5","type":"journal-article","created":{"date-parts":[[2019,7,22]],"date-time":"2019-07-22T09:04:13Z","timestamp":1563786253000},"page":"3045-3062","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Construction of resilient Boolean functions in odd variables with strictly almost optimal nonlinearity"],"prefix":"10.1007","volume":"87","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8579-576X","authenticated-orcid":false,"given":"Yujuan","family":"Sun","sequence":"first","affiliation":[]},{"given":"Jiafang","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Sugata","family":"Gangopadhyay","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,22]]},"reference":[{"key":"662_CR1","unstructured":"Dillon J.F.: Elementary Hadamard difference sets. PhD dissertation, Dept. Comput. Sci., Univ. Maryland, College Park, MD (1974)."},{"key":"662_CR2","series-title":"LNCS","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-54973-0","volume-title":"The Stability Theory of Stream Ciphers","author":"C Ding","year":"1991","unstructured":"Ding C., Xiao G., Shan W.: The Stability Theory of Stream Ciphers, vol. 561. LNCSSpringer, New York (1991)."},{"key":"662_CR3","doi-asserted-by":"publisher","first-page":"2277","DOI":"10.1109\/TIT.2016.2530795","volume":"62","author":"S Kavut","year":"2016","unstructured":"Kavut S., Maitra S.: Patterson\u2013Wiedemann type functions on 21 variables with nonlinearity greater than bent concatenation bound. IEEE Trans. Inf. Theory 62, 2277\u20132282 (2016).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"662_CR4","doi-asserted-by":"publisher","first-page":"1743","DOI":"10.1109\/TIT.2007.894696","volume":"53","author":"S Kavut","year":"2007","unstructured":"Kavut S., Maitra S., Y\u00fccel M.D.: Search for Boolean functions with excellent profiles in the rotation symmetric class. IEEE Trans. Inf. Theory 53, 1743\u20131751 (2007).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"662_CR5","unstructured":"Kavut S., Y\u00fccel M.D.: Generalized rotation symmetric and dihedral symmetric Boolean functions\u20149 variable Boolean functions with nonlinearity 242. In: Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, LNCS, vol. 4851, pp. 321\u2013329. Springer, New York (2007)."},{"key":"662_CR6","unstructured":"Meier W., Staffelbach O.: Nonlinearity criteria for cryptographic functions. In: Advances in Cryptology\u2014EUROCRYPT\u201989. LNCS, vol. 434, pp. 549\u2013562. Springer, New York (1990)."},{"key":"662_CR7","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1109\/TIT.1980.1056187","volume":"26","author":"J Mykkelveit","year":"1980","unstructured":"Mykkelveit J.: The covering radius of the $$(128,8)$$ Reed\u2013Muller code is $$56$$. IEEE Trans. Inf. Theory 26, 359\u2013362 (1980).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"662_CR8","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.ins.2018.03.052","volume":"450","author":"S Pang","year":"2018","unstructured":"Pang S., Wang X., Wang J., Du J., Feng M.: Construction and count of 1-resilient rotation symmetric Boolean functions. Inf. Sci. 450, 36\u2013342 (2018).","journal-title":"Inf. Sci."},{"key":"662_CR9","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1109\/TIT.1983.1056679","volume":"29","author":"NJ Patterson","year":"1983","unstructured":"Patterson N.J., Wiedemann D.H.: The covering radius of the $$(2^{15}, 16)$$ Reed\u2013Muller code is at least 16276. IEEE Trans. Inf. Theory 29, 354\u2013356 (1983).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"662_CR10","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1016\/0097-3165(76)90024-8","volume":"20","author":"OS Rothaus","year":"1976","unstructured":"Rothaus O.S.: On \u2018bent\u2019 functions. J. Comb. Theory Ser. A 20, 300\u2013305 (1976).","journal-title":"J. Comb. Theory Ser. A"},{"key":"662_CR11","doi-asserted-by":"publisher","first-page":"776","DOI":"10.1109\/TIT.1984.1056949","volume":"30","author":"T Siegenthaler","year":"1984","unstructured":"Siegenthaler T.: Correlation-immunity of nonlinear combining functions for cryptographic applications. IEEE Trans. Inf. Theory 30, 776\u2013780 (1984).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"662_CR12","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1007\/3-540-45539-6_35","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2000","author":"Palash Sarkar","year":"2000","unstructured":"Sarkar P., Maitra S.: Construction of nonlinear Boolean functions with important cryptographic properties. In: Advances in Cryptology\u2014EUROCRYPT 2000. LNCS, vol. 1807, pp. 485\u2013506. Springer, New York (2000)."},{"key":"662_CR13","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/s10623-008-9181-y","volume":"49","author":"S Sarkar","year":"2008","unstructured":"Sarkar S., Maitra S.: Idempotents in the neighbourhood of Patterson\u2013Wiedemann functions having walsh spectra zeros. Des. Codes Cryptogr. 49, 95\u2013103 (2008).","journal-title":"Des. Codes Cryptogr."},{"key":"662_CR14","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1016\/j.ins.2017.06.036","volume":"415","author":"Y Wei","year":"2017","unstructured":"Wei Y., Pasalic E., Zhang F., Wu W., Wang C.: New constructions of resilient functions with strictly almost optimal nonlinearity via non-overlap spectra functions. Inf. Sci. 415, 377\u2013396 (2017).","journal-title":"Inf. Sci."},{"key":"662_CR15","doi-asserted-by":"publisher","first-page":"569","DOI":"10.1109\/18.6037","volume":"34","author":"G Xiao","year":"1988","unstructured":"Xiao G., Massey J.L.: A spectral characterization of correlation-immune combining functions. IEEE Trans. Inf. Theory 34, 569\u2013571 (1988).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"662_CR16","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1016\/j.ins.2014.06.024","volume":"283","author":"F Zhang","year":"2014","unstructured":"Zhang F., Carlet C., Hu Y., Cao T.: Secondary constructions of highly nonlinear Boolean functions and disjoint spectra plateaued functions. Inf. Sci. 283, 94\u2013106 (2014).","journal-title":"Inf. Sci."},{"key":"662_CR17","doi-asserted-by":"publisher","first-page":"2987","DOI":"10.1109\/TIT.2018.2795608","volume":"64","author":"F Zhang","year":"2018","unstructured":"Zhang F., Wei Y., Pasalic E., Xia S.: Large sets of disjoint spectra plateaued functions inequivalent to partially linear functions. IEEE Trans. Inf. Theory 64, 2987\u20132999 (2018).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"9","key":"662_CR18","doi-asserted-by":"publisher","first-page":"5856","DOI":"10.1109\/TIT.2019.2899397","volume":"65","author":"WeiGuo Zhang","year":"2019","unstructured":"Zhang W.-G.: High-Meets-Low: construction of strictly almost optimal resilient Boolean functions via fragmentary walsh spectra. IEEE Trans. Inf. Theory. \n                    https:\/\/doi.org\/10.1109\/TIT.2019.2899397","journal-title":"IEEE Transactions on Information Theory"},{"key":"662_CR19","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1016\/j.ins.2016.10.001","volume":"376","author":"W-G Zhang","year":"2017","unstructured":"Zhang W.-G., Pasalic E.: Improving the lower bound on the maximum nonlinearity of 1-resilient Boolean functions and designing functions satisfying all cryptographic criteria. Inf. Sci. 376, 21\u201330 (2017).","journal-title":"Inf. Sci."},{"key":"662_CR20","doi-asserted-by":"publisher","first-page":"6681","DOI":"10.1109\/TIT.2014.2345772","volume":"60","author":"W-G Zhang","year":"2014","unstructured":"Zhang W.-G., Pasalic E.: Generalized Maiorana\u2013McFarland construction of resilient Boolean functions with high nonlinearity and good algebraic properties. IEEE Trans. Inf. Theory 60, 6681\u20136695 (2014).","journal-title":"IEEE Trans. Inf. Theory"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-019-00662-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-019-00662-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-019-00662-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,20]],"date-time":"2020-07-20T23:35:55Z","timestamp":1595288155000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-019-00662-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,22]]},"references-count":20,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["662"],"URL":"https:\/\/doi.org\/10.1007\/s10623-019-00662-5","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,7,22]]},"assertion":[{"value":"16 November 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 March 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 July 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 July 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}