{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,1,18]],"date-time":"2024-01-18T00:22:27Z","timestamp":1705537347754},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2007,6,1]],"date-time":"2007-06-01T00:00:00Z","timestamp":1180656000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["SCI CHINA SER F"],"published-print":{"date-parts":[[2007,6]]},"DOI":"10.1007\/s11432-007-0030-9","type":"journal-article","created":{"date-parts":[[2007,6,27]],"date-time":"2007-06-27T12:56:59Z","timestamp":1182949019000},"page":"299-306","source":"Crossref","is-referenced-by-count":9,"title":["Analysis of affinely equivalent Boolean functions"],"prefix":"10.1007","volume":"50","author":[{"given":"QingShu","family":"Meng","sequence":"first","affiliation":[]},{"given":"HuanGuo","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Min","family":"Yang","sequence":"additional","affiliation":[]},{"given":"ZhangYi","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"30_CR1","first-page":"178","volume":"6","author":"S. Glolmb","year":"1959","unstructured":"Glolmb S. On the classification of Boolean functions. IRE Trans on Circ Theor, 1959, 6: 178\u2013186","journal-title":"IRE Trans on Circ Theor"},{"key":"30_CR2","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1016\/B978-0-12-509850-2.50009-9","volume-title":"Recent Developments in Switching Theory","author":"M. A. Harrison","year":"1971","unstructured":"Harrison M A. Counting theorems and their applications to classifications of switching functions. In: Mukhopadhyay A, ed. Recent Developments in Switching Theory. New York: Academic Press, 1971. 85\u2013120"},{"issue":"1","key":"30_CR3","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1109\/TIT.1972.1054732","volume":"18","author":"E. Berlekamp","year":"1972","unstructured":"Berlekamp E, Welch L. Weight distribution of the cosets of the (32, 6) Reed-Muller code. IEEE Trans Inform Theor, 1972, 18(1): 203\u2013207","journal-title":"IEEE Trans Inform Theor"},{"key":"30_CR4","volume-title":"Boolean Functions in Modern Cryptography (in Chinese)","author":"Q. Wen","year":"2000","unstructured":"Wen Q, Niu X, Yang Y. Boolean Functions in Modern Cryptography (in Chinese). Beijing: Science Press, 2000"},{"key":"30_CR5","volume-title":"Logic Functions in Cryptography (in Chinese)","author":"S. Li","year":"2003","unstructured":"Li S, Zeng B, Lian Y, et al. Logic Functions in Cryptography (in Chinese). Beijing: Beijing Sinosoft Electronic Press, 2003"},{"key":"30_CR6","volume-title":"The Theory of Error-correcting Codes","author":"F. J. Macwillams","year":"1978","unstructured":"Macwillams F J, Solane N J A. The Theory of Error-correcting Codes. Amsterdam: North-holland publishing Company, 1978"},{"key":"30_CR7","first-page":"403","volume":"57","author":"J. A. Maiorana","year":"1991","unstructured":"Maiorana J A. A classification of the cosets of the Reed-Muller code R(1, 6). Math Comput, 1991, 57: 403\u2013414","journal-title":"Math Comput"},{"key":"30_CR8","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1016\/0012-365X(94)00342-G","volume":"149","author":"X. Hou","year":"1996","unstructured":"Hou X. GL(m, 2) acting on R(r, m)\/R(r-1, m). Discrete Math, 1996, 149: 99\u2013122","journal-title":"Discrete Math"},{"key":"30_CR9","doi-asserted-by":"crossref","first-page":"921","DOI":"10.1006\/jabr.1995.1043","volume":"171","author":"X. Hou","year":"1995","unstructured":"Hou X. AGL(m,2) acting on R(r, m)\/R(s, m). J Algebra, 1995, 171: 921\u2013938","journal-title":"J Algebra"},{"key":"30_CR10","doi-asserted-by":"crossref","unstructured":"Brier E, Langevin P. Classification of Boolean cubic forms in nine variables. In: Proceedings of IEEE Information Theory Workshop, 2003. 179\u2013182","DOI":"10.1109\/ITW.2003.1216724"},{"key":"30_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1007\/978-3-540-39887-5_7","volume-title":"Fast Software Encryption","author":"J. Fuller","year":"2003","unstructured":"Fuller J, Millan W. Linear redundancy in S-box. In: Fast Software Encryption, Lect Notes Comput Sci 2887. Berlin: Springer-Verlag, 2003. 74\u201386"},{"issue":"11","key":"30_CR12","first-page":"1528","volume":"27","author":"Q. Meng","year":"2004","unstructured":"Meng Q, Zhang H. The analysis of linear equivalence of Boolean functions and its applications (in Chinese). Chin J Comput, 2004, 27(11): 1528\u20131532","journal-title":"Chin J Comput"},{"key":"30_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"324","DOI":"10.1007\/11523468_27","volume-title":"International Colloquim on Automata, Languages and Programming ICALP 2005","author":"A. Braeken","year":"2005","unstructured":"Braeken A, Borisov Y, Nikova S, et al. Classification of Boolean functions of 6 variables or less with respect to cryptographic properties. In: Yung M, Italiano G F, Palamidessi C, eds. International Colloquim on Automata, Languages and Programming ICALP 2005, Lect Notes Comput Sci 3580. Berlin: Springer-Verlag, 2005. 324\u2013334"},{"issue":"11","key":"30_CR14","first-page":"60","volume":"7","author":"R. Yang","year":"2005","unstructured":"Yang R, Zeng B, Li S. The characteristic of spectrum and self-correlation of some Boolean functions linearly equivalent to specific cryptographic functions. Eng Sci (in Chinese), 2005, 7(11): 60\u201365","journal-title":"Eng Sci (in Chinese)"},{"key":"30_CR15","volume-title":"Analysis and design of cryptographic hash functions","author":"B. Preneel","year":"1993","unstructured":"Preneel B. Analysis and design of cryptographic hash functions. Ph. D Thesis, Leuven (Belgium): Katholieke University, 1993"},{"key":"30_CR16","unstructured":"Meng Q, Zhang G, Yang M, et al. A novel algorithm enumerating bent functions. http:\/\/eprint.iacr.org , 2004\/274"},{"key":"30_CR17","doi-asserted-by":"crossref","first-page":"1655","DOI":"10.1109\/CEC.2003.1299871","volume":"3","author":"J. Fuller","year":"2003","unstructured":"Fuller J, Dawson E, Millan W. Evolutionary generation of bent functions for cryptography. The 2003 Congress on Evolutionary Computation, 2003, 3: 1655\u20131661","journal-title":"The 2003 Congress on Evolutionary Computation"},{"issue":"3","key":"30_CR18","doi-asserted-by":"crossref","first-page":"446","DOI":"10.1111\/j.0824-7935.2004.00245.x","volume":"20","author":"J. A. Clark","year":"2004","unstructured":"Clark J A, Jacob J L, Matria S, et al. Almost Boolean functions: the design of Boolean functions by spectral inversion. Comput Intell, 2004, 20(3): 446\u2013458","journal-title":"Comput Intell"},{"issue":"11","key":"30_CR19","first-page":"1901","volume":"32","author":"Q. Meng","year":"2004","unstructured":"Meng Q, Zhang H, Wang Z, et al. Designing bent functions using evolving method. Acta Elect Sin (in Chinese), 2004, 32(11): 1901\u20131903","journal-title":"Acta Elect Sin (in Chinese)"},{"key":"30_CR20","unstructured":"Meng Q, Zhang H, Cui J, et al. Almost-enumeration of 8-variable bent functions. http:\/\/eprint.iacr.org 2005\/100"}],"container-title":["Science in China Series F: Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-007-0030-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-007-0030-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-007-0030-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T11:35:53Z","timestamp":1559388953000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-007-0030-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,6]]},"references-count":20,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2007,6]]}},"alternative-id":["30"],"URL":"https:\/\/doi.org\/10.1007\/s11432-007-0030-9","relation":{},"ISSN":["1009-2757","1862-2836"],"issn-type":[{"value":"1009-2757","type":"print"},{"value":"1862-2836","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,6]]}}}