{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T11:27:08Z","timestamp":1740137228344,"version":"3.37.3"},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2019,1,3]],"date-time":"2019-01-03T00:00:00Z","timestamp":1546473600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Science and Technology Project of Henan Province","award":["162102210103"],"award-info":[{"award-number":["162102210103"]}]},{"name":"Natural Science foundation of Henan Province","award":["162300410191"],"award-info":[{"award-number":["162300410191"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2019,2]]},"DOI":"10.1007\/s11128-018-2162-9","type":"journal-article","created":{"date-parts":[[2019,1,3]],"date-time":"2019-01-03T02:08:40Z","timestamp":1546481320000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A quantum algorithm for testing and learning resiliency of a Boolean function"],"prefix":"10.1007","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8375-9519","authenticated-orcid":false,"given":"Hongwei","family":"Li","sequence":"first","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2019,1,3]]},"reference":[{"issue":"3","key":"2162_CR1","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1007\/s12095-015-0156-3","volume":"8","author":"K Chakraborty","year":"2016","unstructured":"Chakraborty, K., Maitra, S.: Application of Grover\u2019s algorithm to check non-resiliency of a Boolean function. Cryptogr. Commun. 8(3), 401\u2013413 (2016)","journal-title":"Cryptogr. Commun."},{"issue":"6","key":"2162_CR2","doi-asserted-by":"publisher","first-page":"1787","DOI":"10.1007\/s11128-015-0954-8","volume":"14","author":"H Li","year":"2015","unstructured":"Li, H., Yang, L.: A quantum algorithm for approximating the influences of Boolean functions and its applications. Quantum Inf. Process. 14(6), 1787\u20131797 (2015)","journal-title":"Quantum Inf. Process."},{"key":"2162_CR3","unstructured":"Montanaro, A., de Wolf, R.: A Survey of Quantum Property Testing, \n                    arXiv:1310.2035v3\n                    \n                   [quant-ph] 10 Dec (2014)"},{"key":"2162_CR4","doi-asserted-by":"crossref","unstructured":"Chor, B., Goldreich, O., Hastad, J., Freidmann, J., Rudich, S., Smolensky, R.: The bit extraction problem or t-resilient functions. In: Proceedings of the 26th IEEE Symposium on Foundations of Computer Science, pp. 396\u2013407 (1985)","DOI":"10.1109\/SFCS.1985.55"},{"issue":"2","key":"2162_CR5","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1137\/0217014","volume":"17","author":"CH Bennett","year":"1988","unstructured":"Bennett, C.H., Brassard, G., Robert, J.-M.: Privacy amplification by public discussion. SIAM J. Comput. 17(2), 210\u2013229 (1988)","journal-title":"SIAM J. Comput."},{"issue":"4","key":"2162_CR6","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/s00145-001-0010-y","volume":"14","author":"K Kurosawa","year":"2001","unstructured":"Kurosawa, K., Johansson, T., Stinson, D.: Almost k-wise independent sample spaces and their applications. J. Cryptol. 14(4), 231\u2013253 (2001)","journal-title":"J. Cryptol."},{"issue":"3","key":"2162_CR7","doi-asserted-by":"publisher","first-page":"569","DOI":"10.1109\/18.6037","volume":"34","author":"GZ Xiao","year":"1988","unstructured":"Xiao, G.Z., Massey, J.L.: A spectral characterization of correlation-immune combining functions. IEEE Trans. Inf. Theory 34(3), 569\u2013571 (1988)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"3","key":"2162_CR8","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/BF01388386","volume":"5","author":"K Gopalakrishnan","year":"1995","unstructured":"Gopalakrishnan, K., Stinson, D.R.: Three characterizations of non-binary correlation-immune and resilient functions. Des. Codes Cryptogr. 5(3), 241\u2013251 (1995)","journal-title":"Des. Codes Cryptogr."},{"issue":"2","key":"2162_CR9","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1023\/A:1008337029047","volume":"16","author":"P Camion","year":"1999","unstructured":"Camion, P., Canteaut, A.: Correlation-immune and resilient functions over a finite alphabet and their applications in cryptography. Des. Codes Cryptogr. 16(2), 121\u2013149 (1999)","journal-title":"Des. Codes Cryptogr."},{"issue":"5","key":"2162_CR10","doi-asserted-by":"publisher","first-page":"1740","DOI":"10.1109\/18.623184","volume":"43","author":"X-M Zhang","year":"1997","unstructured":"Zhang, X.-M., Zheng, Y.: Cryptographically resilient functions. IEEE Trans. Inf. Theory 43(5), 1740\u20131747 (1997)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"2162_CR11","doi-asserted-by":"crossref","unstructured":"Sarkar, P., Maitra, S.: Construction of nonlinear Boolean functions with important cryptographic properties. In: Advances in Cryptology\u2014EUROCRYPT 2000, Lecture Notes in Computer Science. Springer, pp. 485-506 (2000)","DOI":"10.1007\/3-540-45539-6_35"},{"issue":"12","key":"2162_CR12","doi-asserted-by":"publisher","first-page":"5822","DOI":"10.1109\/TIT.2009.2032736","volume":"55","author":"WG Zhang","year":"2009","unstructured":"Zhang, W.G., Xiao, G.Z.: Constructions of almost optimal resilient Boolean functions on large even number of variables. IEEE Trans. Inf. Theory 55(12), 5822\u20135831 (2009)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"10","key":"2162_CR13","doi-asserted-by":"publisher","first-page":"6681","DOI":"10.1109\/TIT.2014.2345772","volume":"60","author":"W-G Zhang","year":"2014","unstructured":"Zhang, W.-G., Pasalic, E.: Generalized Maiorana\u2013McFarland construction of resilient Boolean functions with high nonlinearity and good algebraic properties. IEEE Trans. Inf. Theory 60(10), 6681\u20136695 (2014)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"11","key":"2162_CR14","doi-asserted-by":"publisher","first-page":"2752","DOI":"10.1109\/TIT.2004.836684","volume":"50","author":"K Kurosawa","year":"2004","unstructured":"Kurosawa, K., Matsumoto, R.: Almost security of cryptographic Boolean functions. IEEE Trans. Inf. Theory 50(11), 2752\u20132761 (2004)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"2162_CR15","doi-asserted-by":"crossref","unstructured":"Ke, P., Zhang, J., Wen, Q.: Results on almost resilient functions. ACNS 2006, LNCS, vol. 3989, pp. 421\u2013432 (2006)","DOI":"10.1007\/11767480_29"},{"issue":"4","key":"2162_CR16","doi-asserted-by":"publisher","first-page":"1494","DOI":"10.1109\/18.923730","volume":"47","author":"A Canteaut","year":"2001","unstructured":"Canteaut, A., Carlet, C., Charpin, P., Fontaine, C.: On cryptographic properties of the cosets of R(1, m). IEEE Trans. Inf. Theory 47(4), 1494\u20131513 (2001)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"2162_CR17","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1098\/rspa.1992.0167","volume":"A439","author":"D Deutsch","year":"1992","unstructured":"Deutsch, D., Jozsa, R.: Rapid solution of problems by quantum computation. Proc. R. Soc. Lond. A439, 553\u2013558 (1992)","journal-title":"Proc. R. Soc. Lond."},{"issue":"301","key":"2162_CR18","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1080\/01621459.1963.10500830","volume":"58","author":"W Hoeffding","year":"1963","unstructured":"Hoeffding, W.: Probability inequalities for sums of bounded random variables. Am. Stat. Assoc. J. 58(301), 13\u201330 (1963)","journal-title":"Am. Stat. Assoc. J."},{"key":"2162_CR19","doi-asserted-by":"crossref","unstructured":"Bierbrauer, J., Schellwat, H.: Almost independent and weakly biased arrays: efficient constructions and cryptologic applications. CRYPTO 2000, LNCS, vol. 1880, pp. 533\u2013543 (2000)","DOI":"10.1007\/3-540-44598-6_33"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-018-2162-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-018-2162-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-018-2162-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,2]],"date-time":"2020-01-02T19:22:17Z","timestamp":1577992937000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-018-2162-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,3]]},"references-count":19,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,2]]}},"alternative-id":["2162"],"URL":"https:\/\/doi.org\/10.1007\/s11128-018-2162-9","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"type":"print","value":"1570-0755"},{"type":"electronic","value":"1573-1332"}],"subject":[],"published":{"date-parts":[[2019,1,3]]},"assertion":[{"value":"8 November 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 December 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 January 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"51"}}