{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T05:08:15Z","timestamp":1648962495409},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2014,11,28]],"date-time":"2014-11-28T00:00:00Z","timestamp":1417132800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Syst Sci Complex"],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1007\/s11424-014-2133-x","type":"journal-article","created":{"date-parts":[[2014,12,1]],"date-time":"2014-12-01T18:44:16Z","timestamp":1417459456000},"page":"725-742","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A combinatorial condition and Boolean functions with optimal algebraic immunity"],"prefix":"10.1007","volume":"28","author":[{"given":"Qingfang","family":"Jin","sequence":"first","affiliation":[]},{"given":"Zhuojun","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Baofeng","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Xiaoming","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,11,28]]},"reference":[{"key":"2133_CR1","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1017\/CBO9780511780448.011","volume-title":"The Momography Boolean Methods and Models in Mathematics, Computer Science, and Engineering","author":"C Carlet","year":"2010","unstructured":"Carlet C, Boolean functions for cryptography and error correcting codes, in The Momography Boolean Methods and Models in Mathematics, Computer Science, and Engineering (ed. by Crama Y and Hammer P), Cambridge University Press, 2010, 257\u2013397."},{"key":"2133_CR2","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1007\/3-540-39200-9_21","volume":"2656","author":"N Courtois","year":"2003","unstructured":"Courtois N and Meier W, Algebraic attacks on stream ciphers with linear feedback, Eurocrypt 2003, Lecture Notes in Computer Science, 2003, 2656: 345\u2013359.","journal-title":"Lecture Notes in Computer Science"},{"key":"2133_CR3","doi-asserted-by":"crossref","first-page":"474","DOI":"10.1007\/978-3-540-24676-3_28","volume":"3027","author":"W Meier","year":"2004","unstructured":"Meier W, Pasalic E, and Carlet C, Algebraic attacks and decomposition of Boolean functions, Eurocrypt 2004, Lecture Notes in Computer Science, 2004, 3027: 474\u2013491.","journal-title":"Lecture Notes in Computer Science"},{"key":"2133_CR4","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1007\/978-3-540-25937-4_5","volume":"3017","author":"F Armkneckt","year":"2004","unstructured":"Armkneckt F, Improving fast algebraic attacks, FSE 2004, Lecture Notes in Computer Science, 2004, 3017: 65\u201382.","journal-title":"Lecture Notes in Computer Science"},{"key":"2133_CR5","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1007\/978-3-540-45146-4_11","volume":"2729","author":"N T Courtois","year":"2003","unstructured":"Courtois N T, Fast algebraic attacks on stream ciphers with linear feedback, Crypto 2003, Lecture Notes in Computer Science, 2003, 2729: 176\u2013194.","journal-title":"Lecture Notes in Computer Science"},{"key":"2133_CR6","volume-title":"A method of construction of balanced functions with optimum algebraic immunity, Cryptology ePrint Archive","author":"C Carlet","year":"2006","unstructured":"Carlet C, A method of construction of balanced functions with optimum algebraic immunity, Cryptology ePrint Archive, 2006, Report 2006\/149."},{"issue":"7","key":"2133_CR7","doi-asserted-by":"crossref","first-page":"3105","DOI":"10.1109\/TIT.2006.876253","volume":"52","author":"C Carlet","year":"2006","unstructured":"Carlet C, Dalai D K, Gupta K C, and Maitra S, Algebraic immunity for cryptographically significant Boolean functions: Analysis and construction, IEEE Transaction on Information Theory, 2006, 52(7): 3105\u20133121.","journal-title":"IEEE Transaction on Information Theory"},{"issue":"3","key":"2133_CR8","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1007\/s10623-009-9284-0","volume":"52","author":"C Carlet","year":"2009","unstructured":"Carlet C, Zeng X, Li C, and Hu L, Further properties of several classes of Boolean functions with optimum algebraic immunity, Designs, Codes, Cryptography, 2009, 52(3): 303\u2013338.","journal-title":"Designs, Codes, Cryptography"},{"issue":"1","key":"2133_CR9","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1007\/s10623-005-6300-x","volume":"40","author":"D K Dalai","year":"2006","unstructured":"Dalai D K, Maitra S, and Sarkar S, Basic theory in construction of Boolean functions with maximum possible annihilator immunity, Designs, Codes, Cryptography, 2006, 40(1): 41\u201358.","journal-title":"Designs, Codes, Cryptography"},{"key":"2133_CR10","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1007\/11935230_6","volume":"4284","author":"N Li","year":"2006","unstructured":"Li N and Qi W, Construction and analysis of Boolean functions of 2t+1 variables with maximum algebraic immunity, Asiacrypt 2006, Lecture Notes in Computer Science, 2006, 4284: 84\u201398.","journal-title":"Lecture Notes in Computer Science"},{"issue":"2","key":"2133_CR11","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1007\/s10623-008-9228-0","volume":"50","author":"K Feng","year":"2009","unstructured":"Feng K, Liao Q, and Yang J, Maximal values of generalized algebraic immunity, Designs, Codes, Cryptography, 2009, 50(2): 243\u2013252.","journal-title":"Designs, Codes, Cryptography"},{"key":"2133_CR12","doi-asserted-by":"crossref","first-page":"425","DOI":"10.1007\/978-3-540-89255-7_26","volume":"5350","author":"C Carlet","year":"2008","unstructured":"Carlet C and Feng K, An infinite class of balanced functions with optimal algebraic immunity, good immunity to fast algebraic attacks and good nonliearity, Asiacrypt 2008, Lecture Notes in Computer Science, 2008, 5350: 425\u2013440.","journal-title":"Lecture Notes in Computer Science"},{"issue":"1","key":"2133_CR13","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10623-010-9413-9","volume":"60","author":"Z Tu","year":"2011","unstructured":"Tu Z and Deng Y, A conjecture about binary strings and its applications on constructing Boolean functions with optimal algebraic immunity, Designs, Codes, Cryptography, 2011, 60(1): 1\u201314.","journal-title":"Designs, Codes, Cryptography"},{"key":"2133_CR14","volume-title":"On a weakness of the Tu-Deng function and its repair, Cryptology ePrint Archive","author":"C Carlet","year":"2009","unstructured":"Carlet C, On a weakness of the Tu-Deng function and its repair, Cryptology ePrint Archive, 2009, Report 2009\/606."},{"key":"2133_CR15","volume-title":"Balanced boolean functions with (almost) optimal algebraic immunity and very high nonlinearity, Cryptology ePrint Archive","author":"X Tang","year":"2010","unstructured":"Tang X, Tang D, Zeng X, and Hu L, Balanced boolean functions with (almost) optimal algebraic immunity and very high nonlinearity, Cryptology ePrint Archive, 2010, Report 2010\/443."},{"issue":"4\u20135","key":"2133_CR16","doi-asserted-by":"crossref","first-page":"427","DOI":"10.1016\/j.dam.2011.08.006","volume":"160","author":"Z Tu","year":"2012","unstructured":"Tu Z and Deng Y, Boolean functions optimizing most of the cryptographic criteria, Discrete Applied Mathematics, 2012, 160(4\u20135): 427\u2013435.","journal-title":"Discrete Applied Mathematics"},{"issue":"1","key":"2133_CR17","doi-asserted-by":"crossref","first-page":"653","DOI":"10.1109\/TIT.2012.2217476","volume":"59","author":"D Tang","year":"2013","unstructured":"Tang D, Carlet C, and Tang X, Highly nonlinear Boolean functions with optimum algebraic immunity and good behavior against fast algebraic attacks, IEEE Transaction on Information Theory, 2013, 59(1): 653\u2013664.","journal-title":"IEEE Transaction on Information Theory"},{"key":"2133_CR18","volume-title":"On a generalized combinatorial conjecture involving addition mod 2 k \u22121, Cryptology ePrint Archive","author":"G Cohen","year":"2011","unstructured":"Cohen G and Flori J P, On a generalized combinatorial conjecture involving addition mod 2 k \u22121, Cryptology ePrint Archive, 2011, Report 2011\/400."},{"key":"2133_CR19","volume-title":"The Theory of Error-Correcting Codes","author":"F J MacWilliams","year":"1977","unstructured":"MacWilliams F J and Sloane N J A, The Theory of Error-Correcting Codes, North-Holland, Amsterdam, 1977."},{"key":"2133_CR20","volume-title":"Finite Fields","author":"R Lidl","year":"1997","unstructured":"Lidl R and Niederreiter H, Finite Fields, 2nd Edition, Cambridge University Press, 1997.","edition":"2nd Edition"},{"key":"2133_CR21","volume-title":"On a combinatorial conjecture, Cryptology ePrint Archive","author":"T W Cusick","year":"2009","unstructured":"Cusick T W, Li Y, and Stanica P, On a combinatorial conjecture, Cryptology ePrint Archive, 2009, Report 2009\/554."},{"key":"2133_CR22","volume-title":"On a conjecture about binary strings distribution, Cryptology ePrint Archive","author":"J P Flori","year":"2010","unstructured":"Flori J P, Randriambololona H, Cohen G, and Mesnager S, On a conjecture about binary strings distribution, Cryptology ePrint Archive, 2010, Report 2010\/170."},{"key":"2133_CR23","volume-title":"Elementary hadamard difference sets","author":"J F Dillon","year":"1974","unstructured":"Dillon J F, Elementary hadamard difference sets, PhD thesis, University of Maryland, 1974."}],"container-title":["Journal of Systems Science and Complexity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11424-014-2133-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11424-014-2133-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11424-014-2133-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T14:54:06Z","timestamp":1559400846000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11424-014-2133-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11,28]]},"references-count":23,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2015,6]]}},"alternative-id":["2133"],"URL":"https:\/\/doi.org\/10.1007\/s11424-014-2133-x","relation":{},"ISSN":["1009-6124","1559-7067"],"issn-type":[{"value":"1009-6124","type":"print"},{"value":"1559-7067","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,11,28]]}}}