{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T19:14:49Z","timestamp":1648926889494},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2012,5,16]],"date-time":"2012-05-16T00:00:00Z","timestamp":1337126400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2012,7]]},"DOI":"10.1007\/s11432-012-4597-4","type":"journal-article","created":{"date-parts":[[2012,5,16]],"date-time":"2012-05-16T11:02:47Z","timestamp":1337166167000},"page":"1617-1623","source":"Crossref","is-referenced-by-count":2,"title":["On the construction of multi-output Boolean functions with optimal algebraic immunity"],"prefix":"10.1007","volume":"55","author":[{"given":"Jie","family":"Zhang","sequence":"first","affiliation":[]},{"given":"ShouChao","family":"Song","sequence":"additional","affiliation":[]},{"given":"Jiao","family":"Du","sequence":"additional","affiliation":[]},{"given":"QiaoYan","family":"Wen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,5,16]]},"reference":[{"key":"4597_CR1","doi-asserted-by":"crossref","unstructured":"Courtois N, Meier W. Algebraic attacks on stream ciphers with linear feedback. In: Proceedings of Advances in Cryptology-EUROCRYPT, Berlin, 2003. Lecture Notes in Computer Science, 2656. 345\u2013359","DOI":"10.1007\/3-540-39200-9_21"},{"key":"4597_CR2","doi-asserted-by":"crossref","unstructured":"Courtois N. Fast algebraic attacks on stream ciphers with linear feedback. In: Proceedings of Advances in Cryptology-CRYPTO, Berlin, 2003. Lecture Notes in Computer Science, 2729: 176\u2013194","DOI":"10.1007\/978-3-540-45146-4_11"},{"key":"4597_CR3","doi-asserted-by":"crossref","unstructured":"Armknecht F, Krause M. Algebraic attacks on combiners with memory. In: Proceedings of Advances in Cryptology-CRYPTO, Berlin, 2003. Lecture Notes in Computer Science, 2729: 162\u2013175","DOI":"10.1007\/978-3-540-45146-4_10"},{"key":"4597_CR4","doi-asserted-by":"crossref","unstructured":"Meier W, Pasalic E, Carlet C. Algebraic attacks and decomposition of Boolean functions. In: Proceedings of Advances in Cryptology-EUROCRYPT, Berlin, 2004. Lecture Notes in Computer Science, 3027: 474\u2013491","DOI":"10.1007\/978-3-540-24676-3_28"},{"key":"4597_CR5","first-page":"41","volume":"40","author":"D. K. Dalai","year":"2006","unstructured":"Dalai D K, Maitra S, Sarkar S. Basic theory in construction Boolean functions with maximum possible annihilator immunity, Designs, Codes and Cryptography. Springer Neth, 2006, 40: 41\u201358","journal-title":"Springer Neth"},{"key":"4597_CR6","doi-asserted-by":"crossref","first-page":"2271","DOI":"10.1109\/TIT.2006.872977","volume":"52","author":"N. Li","year":"2006","unstructured":"Li N, Qi W F. Symmetric Boolean functions depending on an odd number of variables with maximum algebraic immunity. IEEE Trans Inf Theory, 2006, 52: 2271\u20132273","journal-title":"IEEE Trans Inf Theory"},{"key":"4597_CR7","doi-asserted-by":"crossref","first-page":"2908","DOI":"10.1109\/TIT.2007.901189","volume":"53","author":"L. J. Qu","year":"2007","unstructured":"Qu L J, Li C, Feng K Q. A note on symmetric Boolean functions with maximum algebraic immunity in odd number of variables. IEEE Trans Inf Theory, 2007, 53: 2908\u20132910","journal-title":"IEEE Trans Inf Theory"},{"key":"4597_CR8","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1007\/s11432-008-0010-8","volume":"51","author":"L. J. Qu","year":"2008","unstructured":"Qu L J, Li C. On the 2m-variable symmetric Boolean functions with maximum algebraic immunity. Sci China Ser F-Inf Sci, 2008, 51: 120\u2013127","journal-title":"Sci China Ser F-Inf Sci"},{"key":"4597_CR9","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1007\/s11425-008-0131-y","volume":"52","author":"Q. Y. Liao","year":"2009","unstructured":"Liao Q Y, Liu F, Feng K Q. On 2m-variable symmetric Boolean functions with submaximum algebraic immunity 2m \u22121. Sci China Ser A-Math, 2009, 52: 17\u201328","journal-title":"Sci China Ser A-Math"},{"key":"4597_CR10","doi-asserted-by":"crossref","first-page":"2406","DOI":"10.1109\/TIT.2009.2015999","volume":"55","author":"L. J. Qu","year":"2009","unstructured":"Qu L J, Feng K Q, Liu F, et al. Constructing symmetric boolean funcitons with maximum algebraic immunity. IEEE Trans Inf Theory, 2009, 55: 2406\u20132412","journal-title":"IEEE Trans Inf Theory"},{"key":"4597_CR11","doi-asserted-by":"crossref","unstructured":"Carlet C. A method of construction of balanced Boolean functions with optimum algebraic immunity. In: Proceedings of the 1st International Workshop on Coding Theory and Cryptology, Wuyi Mountain, 2007. 11\u201315","DOI":"10.1142\/9789812832245_0003"},{"key":"4597_CR12","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1007\/s10623-009-9284-0","volume":"52","author":"C. Carlet","year":"2009","unstructured":"Carlet C, Zeng X Y, Li C L, et al. Further properties of several classes of Boolean functions with optimum algebraic immunity. Des Cod Cryptogr Springer Neth, 2009, 52: 303\u2013338","journal-title":"Des Cod Cryptogr Springer Neth"},{"key":"4597_CR13","unstructured":"Wang Y J, Fan S Q, Han W B. New construction of Boolean function with optimum algebraic immunity. http:\/\/eprint.iacr.org\/2008\/176.pdf"},{"key":"4597_CR14","doi-asserted-by":"crossref","unstructured":"Fu S J, Li C, Matssuura K, et al. Construction of rotation symmetric Boolean functions with maximum algebraic immunity. In: Cryptology and Network Security. Lecture Notes in Computer Science, 2009, 5888: 402\u2013412","DOI":"10.1007\/978-3-642-10433-6_27"},{"key":"4597_CR15","doi-asserted-by":"crossref","first-page":"1330","DOI":"10.1109\/TIT.2007.915914","volume":"54","author":"N. Li","year":"2008","unstructured":"Li N, Qu L J, Qi W F, et al. On the construction of Boolean functions with optimal algebraic immunity. IEEE Trans Inf Theory, 2008, 54: 1330\u20131334","journal-title":"IEEE Trans Inf Theory"},{"key":"4597_CR16","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1007\/978-3-540-77224-8_32","volume-title":"Proceedings of Applied Algebra, Algebraic Algorithms and Error-Correcting Codes(AAECC)","author":"S. Sarkar","year":"2007","unstructured":"Sarkar S, Maitra S. Construction of rotation symmetric Boolean functions with maximum algebraic immunity on odd number of variables. In: Proceedings of Applied Algebra, Algebraic Algorithms and Error-Correcting Codes(AAECC). LNCS 4851. Heidelberg: Springer, 2007. 271\u2013280"},{"key":"4597_CR17","doi-asserted-by":"crossref","first-page":"702","DOI":"10.1007\/s11859-008-0613-3","volume":"13","author":"C. L. Li","year":"2008","unstructured":"Li C L, Zeng X Y, Su W, et al. A class of rotation symmetric Boolean functions with optimum algebraic immunity. Wuhan Univ J Nat Sci, 2008, 13: 702\u2013706","journal-title":"Wuhan Univ J Nat Sci"},{"key":"4597_CR18","doi-asserted-by":"crossref","first-page":"1379","DOI":"10.1007\/s11432-010-3106-x","volume":"53","author":"M. C. Liu","year":"2010","unstructured":"Liu M C, Pei D Y, Du Y S. Identification and construction of Boolean functions with maximum algebraic immunity. Sci China Inf Sci, 2010, 53: 1379\u20131396","journal-title":"Sci China Inf Sci"},{"key":"4597_CR19","doi-asserted-by":"crossref","unstructured":"Carlet C, Feng K Q. An infinite class of balanced functions with optimal algebraic immunity, good immunity to fast algebraic attacks and good nonlinearity. In: Proceedings of Advances in Cryptology \u2014 ASIACRYPT 2008, Berlin, 2008. Lecture Notes in Computer Science, 5350: 425\u2013440","DOI":"10.1007\/978-3-540-89255-7_26"},{"key":"4597_CR20","first-page":"1","volume":"60","author":"Z. R. Tu","year":"2010","unstructured":"Tu Z R, Deng Y P. A conjecture on binary string and its applications on constructing Boolean functions of optimum algebraic immunity. Des Cod Cryptogr, 2010, 60: 1\u201314","journal-title":"Des Cod Cryptogr"},{"key":"4597_CR21","doi-asserted-by":"crossref","unstructured":"Armknecht F, Krause M. Constructing single- and multi-output Boolean functions with maximal algebraic immunity. In: Proceedings of ICALP 2006, Lecture Notes in Computer Science, 2006, 4052: 180\u2013191","DOI":"10.1007\/11787006_16"},{"key":"4597_CR22","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1007\/s10623-008-9228-0","volume":"50","author":"K. Q. Feng","year":"2009","unstructured":"Feng K Q, Liao Q Y, Yang J. Maximal values of generalized algebraic immunity. Des Cod Cryptogr Springer Neth, 2009, 50: 243\u2013252","journal-title":"Des Cod Cryptogr Springer Neth"},{"key":"4597_CR23","unstructured":"Ars G, Faug\u00e8re J C. Algebraic immunity of functions over finite fields. In: Proceedings of Workshop on Boolean Funtions: Cryptography and Applications (BFCA 2005), Rouen, 2005. 21\u201338"},{"key":"4597_CR24","doi-asserted-by":"crossref","unstructured":"Batten L M. Algebraic attacks over GF(q). In: Canteaut A, Viswanathan K, eds. Progress in Cryptology-INDOCRYPT 2004, Lecture Notes in Computer Science, 2004, 3348: 84\u201391","DOI":"10.1007\/978-3-540-30556-9_8"},{"key":"4597_CR25","doi-asserted-by":"crossref","first-page":"3048","DOI":"10.1109\/TIT.2010.2046195","volume":"56","author":"Q. C. Wang","year":"2010","unstructured":"Wang Q C, Peng J, Kan H B, et al. Constructions of cryptographically significant Boolean functions using primitive polynomials. IEEE Trans Inf Theory, 2010, 56: 3048\u20133053","journal-title":"IEEE Trans Inf Theory"},{"key":"4597_CR26","doi-asserted-by":"crossref","unstructured":"Seberry J, Zhang X, Zheng Y. Relationships among nonlinearity criteria. In: Proceedings of Advances in Cryptology-EUROCRYPT, Berlin, 1994. Lecture Notes in Computer Science, 950: 376\u2013388","DOI":"10.1007\/BFb0053452"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-012-4597-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-012-4597-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-012-4597-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,28]],"date-time":"2019-06-28T16:18:39Z","timestamp":1561738719000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-012-4597-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,5,16]]},"references-count":26,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2012,7]]}},"alternative-id":["4597"],"URL":"https:\/\/doi.org\/10.1007\/s11432-012-4597-4","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,5,16]]}}}