{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T00:48:34Z","timestamp":1649033314557},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Syst Sci Complex"],"published-print":{"date-parts":[[2019,2]]},"DOI":"10.1007\/s11424-019-8346-2","type":"journal-article","created":{"date-parts":[[2019,2,14]],"date-time":"2019-02-14T00:53:25Z","timestamp":1550105605000},"page":"356-374","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Recent Results on Constructing Boolean Functions with (Potentially) Optimal Algebraic Immunity Based on Decompositions of Finite Fields"],"prefix":"10.1007","volume":"32","author":[{"given":"Zhuojun","family":"Liu","sequence":"first","affiliation":[]},{"given":"Baofeng","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,2,14]]},"reference":[{"key":"8346_CR1","volume-title":"Proc. Adv. Cryptol. \u2014 EUROCRYPT\u201904","author":"M Meier","year":"2004","unstructured":"Meier M, Pasalic E, and Carlet C, Algebraic attacks and decomposition of boolean functions, Proc. Adv. Cryptol. \u2014 EUROCRYPT\u201904 (Eds. by Cachin C and Camenisch J), Switzerland, 2004."},{"key":"8346_CR2","volume-title":"Proc. Adv. Cryptol. \u2014 EUROCRYPT\u201903","author":"N Courtois","year":"2003","unstructured":"Courtois N and Meier M, Algebraic attack on stream ciphers with linear feedback, Proc. Adv. Cryptol. \u2014 EUROCRYPT\u201903 (Ed. by Biham E), Warsaw, 2003."},{"key":"8346_CR3","doi-asserted-by":"publisher","first-page":"3105","DOI":"10.1109\/TIT.2006.876253","volume":"52","author":"C Carlet","year":"2006","unstructured":"Carlet C, Dalai D, Gupta K, et al., Algebraic immunity for cryptographically significant boolean fucntions, analysis and construction, IEEE Trans. Inform. Theory, 2006, 52: 3105\u20133121.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"8346_CR4","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/s10623-005-6300-x","volume":"40","author":"D Dalai","year":"2006","unstructured":"Dalai D, Maitra S, and Sarkar S, Basic theory in construction of boolean functions with maximum possible annihilator immunity, Des. Codes Cryptogr., 2006, 40: 41\u201358.","journal-title":"Des. Codes Cryptogr."},{"key":"8346_CR5","volume-title":"Proc. Adv. Cryptol. \u2014 ASIACRYPT\u201906","author":"N Li","year":"2006","unstructured":"Li N and Qi W, Construction and analysis of boolean functions of 2t + 1 variables with maximum algebraic immunity, Proc. Adv. Cryptol. \u2014 ASIACRYPT\u201906 (Eds. by Lai X and Chen K), Shanghai, 2006."},{"key":"8346_CR6","doi-asserted-by":"publisher","first-page":"1330","DOI":"10.1109\/TIT.2007.915914","volume":"54","author":"N Li","year":"2008","unstructured":"Li N, Qu L, Qi W, et al., On the construction of Boolean functions with optimal algebraic immunity, IEEE Trans. Inform. Theory, 2008, 54: 1330\u20131334.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"8346_CR7","volume-title":"Proc. Adv. Cryptol. \u2014 CRYPTO\u201903","author":"N Courtois","year":"2003","unstructured":"Courtois N, Fast algebraic attacks on stream ciphers with linear feedback, Proc. Adv. Cryptol. \u2014 CRYPTO\u201903 (Ed. by Boneh D), California, 2003."},{"key":"8346_CR8","volume-title":"Proc. Adv. Cryptol. \u2014 ASIACRYPT\u201908","author":"C Carlet","year":"2008","unstructured":"Carlet C and Feng K, An infinite class of balanced functions with optimal algebraic immunity, good immunity to fast algebraic attacks and good nonlinearity, Proc. Adv. Cryptol. \u2014 ASIACRYPT\u201908 (Ed. by Pieprzyk J), Melbourne, 2008."},{"key":"8346_CR9","volume-title":"Proc. Adv. Cryptol. \u2014 ASIACRYPT\u2019 12","author":"M Liu","year":"2012","unstructured":"Liu M, Zhang Y, and Lin D, Perfect algebraic immune functions, Proc. Adv. Cryptol. \u2014 ASIACRYPT\u2019 12 (Eds. Wang X and Sako K), Beijing, 2012."},{"key":"8346_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10623-010-9413-9","volume":"60","author":"Z Tu","year":"2011","unstructured":"Tu Z and Deng Y, A conjecture about binary strings and its applications on constructing Boolean functions with optimal algebraic immunity, Des. Codes Cryptogr., 2011, 60: 1\u201314.","journal-title":"Des. Codes Cryptogr."},{"key":"8346_CR11","doi-asserted-by":"publisher","first-page":"653","DOI":"10.1109\/TIT.2012.2217476","volume":"59","author":"D Tang","year":"2013","unstructured":"Tang D, Carlet C and Tang X, Highly nonlinear Boolean functions with optimum algebraic immunity and good behavior against fast algebraic attacks, IEEE Trans. Inform. Theory, 2013, 59: 653\u2013664.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"8346_CR12","volume-title":"Cryptology ePrint Archive","author":"G Cohen","year":"2011","unstructured":"Cohen G and Flori J P, On a generalized combinatorial conjecture involving addition mod 2k-1, Cryptology ePrint Archive, Report 2011\/400, 2011, http:\/\/eprint.iacr.org\/."},{"issue":"2","key":"8346_CR13","first-page":"419","volume":"5","author":"H Han","year":"2013","unstructured":"Han H and Tang C, New classes of even-variable Boolean functions with optimal algebraic immunity and very high nonlinearity, Int. J. Adv. Comput. Techn., 2013, 5(2): 419\u2013428.","journal-title":"Int. J. Adv. Comput. Techn."},{"issue":"3","key":"8346_CR14","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1080\/00207160.2014.910304","volume":"92","author":"Y Lou","year":"2015","unstructured":"Lou Y, Han H, Tang C, et al., Constructing vectorial Boolean functions with high algebraic immunity based on group decomposition, Int. J. Comput. Math., 2015, 92(3): 451\u2013462.","journal-title":"Int. J. Comput. Math."},{"key":"8346_CR15","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1016\/j.dam.2011.08.006","volume":"160","author":"Z Tu","year":"2012","unstructured":"Tu Z and Deng Y, Boolean functions optimizing most of the cryptographic criteria, Discrete Appl. Math., 2012, 160: 427\u2013435.","journal-title":"Discrete Appl. Math."},{"issue":"3","key":"8346_CR16","doi-asserted-by":"publisher","first-page":"725","DOI":"10.1007\/s11424-014-2133-x","volume":"28","author":"Q Jin","year":"2015","unstructured":"Jin Q, Liu Z, Wu B, et al., A combinatorial condition and Boolean functions with optimal algebraic immunity, Journal of Systems Science & Complexity, 2015, 28(3): 725\u2013742.","journal-title":"Journal of Systems Science & Complexity"},{"key":"8346_CR17","doi-asserted-by":"crossref","unstructured":"Wang T, Liu M, and Lin D, Construction of resilient and nonlinear boolean functions with almost perfect immunity to algebraic and fast algebraic attacks, Inscrypt 2012 (Eds. by Kutylowski M and Yung M), Beijing, 2012.","DOI":"10.1007\/978-3-642-38519-3_18"},{"issue":"5","key":"8346_CR18","doi-asserted-by":"publisher","first-page":"537","DOI":"10.1142\/S0129054114500208","volume":"25","author":"J Zheng","year":"2014","unstructured":"Zheng J, Wu B, Chen Y, et al., Constructing 2m-variable Boolean functions with optimal algebraic immunity based on polar decomposition of \n                    \n                      \n                    \n                    $$\\mathbb{F}_{{2^{2m}}}^*$$\n                    \n                      \n                        \n                          \n                            F\n                            \n                              \n                                2\n                                \n                                  2\n                                  m\n                                \n                              \n                            \n                            *\n                          \n                        \n                      \n                    \n                  , Int. J. Found. Comput. Sci., 2014, 25(5): 537\u2013551.","journal-title":"Int. J. Found. Comput. Sci."},{"key":"8346_CR19","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1016\/j.ins.2014.02.157","volume":"273","author":"M Khan","year":"2014","unstructured":"Khan M and \u00d6zbudak F, Hybrid classes of balanced Boolean functions with good cryptographic properties, Inform. Sci., 2014, 273: 319\u2013328.","journal-title":"Inform. Sci."},{"key":"8346_CR20","volume-title":"Proceeding of 2014 IEEE International Symposium on Information Theory","author":"B Wu","year":"2014","unstructured":"Wu B, Jin Q, and Liu Z, Constructing Boolean functions with potential optimal algebraic immunity based on additive decompositions of finite fields (extended abstract), Proceeding of 2014 IEEE International Symposium on Information Theory (Eds. by H\u00f8st-Madsen A, Kavcic A, and Veeravalli V), Honolulu, 2014."},{"key":"8346_CR21","doi-asserted-by":"crossref","unstructured":"Wang Q and Tan C, Properties of a Family of Cryptographic Boolean Functions, SETA 2014 (Eds. by Schmidt K U and Winterhof A), Melbourne, 2014.","DOI":"10.1007\/978-3-319-12325-7_3"},{"key":"8346_CR22","volume-title":"Proceeding of 2015 IEEE International Symposium on Information Theory","author":"B Wu","year":"2015","unstructured":"Wu B, Zheng J, and Lin D, Constructing Boolean functions with (potentially) optimal alge braic immunity based on multiplicative decompositions of finite fields, Proceeding of 2015 IEEE International Symposium on Information Theory (Eds. by Tse D and Yeung R), Hong Kong, 2015."},{"issue":"3","key":"8346_CR23","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1080\/00207160.2014.999051","volume":"93","author":"Z Wang","year":"2016","unstructured":"Wang Z, Zhang X, Wang S, et al., Construction of Boolean functions with excellent cryptographic criteria using bivariate polynomial representation, International Journal of Computer Mathematics, 2016, 93(3): 425\u2013444.","journal-title":"International Journal of Computer Mathematics"},{"key":"8346_CR24","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1016\/j.ins.2017.08.097","volume":"421","author":"M Liu","year":"2017","unstructured":"Liu M and Lin D, Results on highly nonlinear Boolean functions with provably good immunity to fast algebraic attacks, Inf. Sci., 2017, 421: 181\u2013203.","journal-title":"Inf. Sci."},{"key":"8346_CR25","first-page":"6113","volume":"63","author":"D Tang","year":"2017","unstructured":"Tang D, Carlet C, Tang X, et al., Construction of highly nonlinear 1-resilient Boolean functions with optimal algebraic immunity and provably high fast algebraic immunity, IEEE Trans. Inform. Theory, 2017, 63: 6113\u20136125.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"8346_CR26","volume-title":"Monography Boolean Methods and Models","author":"C Carlet","year":"2010","unstructured":"Carlet C, Boolean functions for cryptography and error correcting codes, Monography Boolean Methods and Models (Eds. by Crama Y and Hammer P), Cambridge University Press, London, 2010."},{"key":"8346_CR27","volume-title":"Cryptology ePrint Archive","author":"C Carlet","year":"2009","unstructured":"Carlet C, On a weakness of the Tu-Deng function and its repair, Cryptology ePrint Archive, report 2009\/606, 2009, http:\/\/eprint.iacr.org\/."},{"key":"8346_CR28","volume-title":"Sequences and Their Applications \u2014 SETA 2010","author":"J P Flori","year":"2010","unstructured":"Flori J P, Randriam H, Cohen G, et al., On a Conjecture about Binary Strings Distribution, Sequences and Their Applications \u2014 SETA 2010 (Eds. by Carlet C and Pott A), Paris, 2010."},{"issue":"2","key":"8346_CR29","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1515\/integ.2011.017","volume":"11","author":"T Cusick","year":"2011","unstructured":"Cusick T, Li Y, and St\u0103nic\u0103 P, On a combinatorial conjecture, Integers, 2011, 11(2): 185\u2013203.","journal-title":"Integers"},{"issue":"3","key":"8346_CR30","doi-asserted-by":"publisher","first-page":"702","DOI":"10.1007\/s11424-015-2240-3","volume":"28","author":"K Cheng","year":"2015","unstructured":"Cheng K, Hong S, and Zhong Y, A note on the Tu-Deng conjecture, Journal of Systems Science and Complexity, 2015, 28(3): 702\u2013724.","journal-title":"Journal of Systems Science and Complexity"},{"key":"8346_CR31","volume-title":"2016 IEEE International Symposium on Information Theory (ISIT)","author":"S Qarboua","year":"2016","unstructured":"Qarboua S, Schrek J, and Fontaine C, New results about Tu-Deng\u2019s conjecture, 2016 IEEE International Symposium on Information Theory (ISIT) (Eds. by F\u00e0bregas A, Martinez A, and Verd\u00fa S), Barcelona, 2016."},{"key":"8346_CR32","volume-title":"The Tu-Deng conjecture holds almost surely","author":"L Spiegelhofer","year":"2017","unstructured":"Spiegelhofer L and Wallner M, The Tu-Deng conjecture holds almost surely, arXiv: 1707.07945v2 [math.CO], 2017, https:\/\/arxiv.org\/pdf\/1707.07945.pdf."}],"container-title":["Journal of Systems Science and Complexity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11424-019-8346-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11424-019-8346-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11424-019-8346-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,13]],"date-time":"2020-02-13T19:07:24Z","timestamp":1581620844000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11424-019-8346-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2]]},"references-count":32,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,2]]}},"alternative-id":["8346"],"URL":"https:\/\/doi.org\/10.1007\/s11424-019-8346-2","relation":{},"ISSN":["1009-6124","1559-7067"],"issn-type":[{"value":"1009-6124","type":"print"},{"value":"1559-7067","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,2]]},"assertion":[{"value":"2 September 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 October 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 February 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}