{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T12:04:27Z","timestamp":1648987467755},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2014,8,1]],"date-time":"2014-08-01T00:00:00Z","timestamp":1406851200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Syst Sci Complex"],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1007\/s11424-014-2132-y","type":"journal-article","created":{"date-parts":[[2014,8,8]],"date-time":"2014-08-08T01:47:26Z","timestamp":1407462446000},"page":"785-794","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A note on two classes of Boolean functions with optimal algebraic immunity"],"prefix":"10.1007","volume":"27","author":[{"given":"Baofeng","family":"Wu","sequence":"first","affiliation":[]},{"given":"Zhuojun","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Qingfang","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Xiaoming","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,8,9]]},"reference":[{"key":"2132_CR1","volume-title":"Boolean Methods and Models in Mathematics, Computer Science, and Engineering","author":"C Carlet","year":"2010","unstructured":"Carlet C, Boolean functions for Cryptography and Error Correcting Codes, Boolean Methods and Models in Mathematics, Computer Science, and Engineering (eds. by Crama Y and Hammer P), Cambridge University Press, Cambridge, 2010."},{"key":"2132_CR2","volume-title":"Advances in Cryptology\u2014EUROCRYPT 2003","author":"N Courtois","year":"2003","unstructured":"Courtois N and Meier W, Algebraic attacks on stream ciphers with linear feedback, Advances in Cryptology\u2014EUROCRYPT 2003 (ed. by Biham E), Warsaw, 2003."},{"key":"2132_CR3","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C Shannon","year":"1949","unstructured":"Shannon C, Communication theory of secrecy systems, Bell System Technical Journal, 1949, 28: 656\u2013715.","journal-title":"Bell System Technical Journal"},{"key":"2132_CR4","volume-title":"Advances in Cryptology\u2014EUROCRYPT 2004","author":"W Meier","year":"2004","unstructured":"Meier W, Pasalic E, and Carlet C, Algebraic attacks and decomposition of Boolean functions, Advances in Cryptology\u2014EUROCRYPT 2004 (eds. by Cachin C and Camenisch J), Interlaken, 2004."},{"issue":"7","key":"2132_CR5","doi-asserted-by":"crossref","first-page":"3105","DOI":"10.1109\/TIT.2006.876253","volume":"52","author":"C Carlet","year":"2006","unstructured":"Carlet C, Dalai D, Gupta K, and Maitra S, Algebraic immunity for cryptographically significant Boolean functions: Analysis and construction, IEEE Transactions on Information Theory, 2006, 52(7): 3105\u20133121.","journal-title":"IEEE Transactions on Information Theory"},{"key":"2132_CR6","volume-title":"Progress in Cryptology\u2014INDOCRYPT 2004","author":"D Dalai","year":"2004","unstructured":"Dalai D, Gupta K, and Maitra S, Results on algebraic immunity for cryptographically significant Boolean functions, Progress in Cryptology\u2014INDOCRYPT 2004 (eds. by Canteaut A and Viswanathan K), Chennai, 2004."},{"key":"2132_CR7","volume-title":"Progress in Cryptology\u2014INDOCRYPT 2006","author":"F Didier","year":"2006","unstructured":"Didier F, Using Wiedemann\u2019s algorithm to compute the immunity against algebraic and fast algebraic attacks, Progress in Cryptology\u2014INDOCRYPT 2006 (eds. by Barua R and Lange T), Kolkata, 2006."},{"key":"2132_CR8","volume-title":"IACR Cryptology ePrint Archive","author":"M Lobanov","year":"2005","unstructured":"Lobanov M, Tight bound between nonlinearity and algebraic immunity, IACR Cryptology ePrint Archive, 2005, report 2005\/441."},{"key":"2132_CR9","volume-title":"IACR Cryptology ePrint Archive","author":"C Carlet","year":"2006","unstructured":"Carlet C, A method of construction of balanced functions with optimum algebraic immunity, IACR Cryptology ePrint Archive, 2006, reprot 2006\/149."},{"issue":"3","key":"2132_CR10","doi-asserted-by":"crossref","first-page":"1330","DOI":"10.1109\/TIT.2007.915914","volume":"54","author":"N Li","year":"2008","unstructured":"Li N, Qu L, and Qi W, On the construction of Boolean functions with optimal algebraic immunity, IEEE Transactions on Information Theory, 2008, 54(3): 1330\u20131334.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"4","key":"2132_CR11","doi-asserted-by":"crossref","first-page":"792","DOI":"10.1007\/s11424-012-0286-z","volume":"25","author":"Y Xie","year":"2012","unstructured":"Xie Y and Hu L, A matrix construction of Boolean functions with maximum algebraic immunity, Journal of Systems Science and Complexity, 2012, 25(4): 792\u2013801.","journal-title":"Journal of Systems Science and Complexity"},{"key":"2132_CR12","volume-title":"Advances in Cryptology\u2014ASIACRYPT 2008","author":"C Carlet","year":"2008","unstructured":"Carlet C and Feng K, An infinite class of balanced functions with optimal algebraic immunity, good immunity to fast algebraic attacks and good nonliearity, Advances in Cryptology\u2014ASIACRYPT 2008 (ed. by Pieprzyk J), Melbourne, 2008."},{"issue":"1","key":"2132_CR13","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10623-010-9413-9","volume":"60","author":"Z Tu","year":"2011","unstructured":"Tu Z and Deng Y, A conjecture about binary strings and its applications on constructing Boolean functions with optimal algebraic immunity, Design Codes and Cryptography, 2011, 60(1): 1\u201314.","journal-title":"Design Codes and Cryptography"},{"key":"2132_CR14","volume-title":"IACR Cryptology ePrint Archive","author":"D Tang","year":"2011","unstructured":"Tang D, Carlet C, and Tang X, Highly nonlinear boolean functions with optimum algebraic immunity and good behavior against fast algebraic attacks, IACR Cryptology ePrint Archive, 2011, report 2011\/366."},{"key":"2132_CR15","volume-title":"IACR Cryptology ePrint Archive","author":"G Cohen","year":"2011","unstructured":"Cohen G and Flori J P, On a generalized combinatorial conjecture involving addition mod 2 k \u22121, IACR Cryptology ePrint Archive, 2011, report 2011\/400."},{"issue":"2","key":"2132_CR16","doi-asserted-by":"crossref","first-page":"302","DOI":"10.1007\/s11424-013-1125-6","volume":"26","author":"Y Zhang","year":"2013","unstructured":"Zhang Y and Deng Y, Results on permutation symmetric Boolean functions, Journal of Systems Science and Complexity, 2013, 26(2): 302\u2013312.","journal-title":"Journal of Systems Science and Complexity"},{"issue":"2","key":"2132_CR17","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1515\/integ.2011.017","volume":"11","author":"T Cusick","year":"2011","unstructured":"Cusick T, Li Y, and Stanica P, On a conbinatoric conjecture, Integers, 2011, 11(2): 185\u2013203.","journal-title":"Integers"},{"key":"2132_CR18","volume-title":"Elementary hadamard difference sets","author":"J Dillon","year":"1974","unstructured":"Dillon J, Elementary hadamard difference sets, Doctor\u2019s degree thesis, University of Maryland, College Park, 1974."},{"issue":"3","key":"2132_CR19","doi-asserted-by":"crossref","first-page":"686","DOI":"10.1109\/18.54892","volume":"36","author":"G Lachaud","year":"1990","unstructured":"Lachaud G and Wolfmann J, The weights of the orthogonals of the extended quadratic binary Goppa codes, IEEE Transactions on Information Theory, 1990, 36(3): 686\u2013692.","journal-title":"IEEE Transactions on Information Theory"}],"container-title":["Journal of Systems Science and Complexity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11424-014-2132-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11424-014-2132-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11424-014-2132-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T14:54:06Z","timestamp":1559400846000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11424-014-2132-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":19,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2014,8]]}},"alternative-id":["2132"],"URL":"https:\/\/doi.org\/10.1007\/s11424-014-2132-y","relation":{},"ISSN":["1009-6124","1559-7067"],"issn-type":[{"value":"1009-6124","type":"print"},{"value":"1559-7067","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,8]]}}}