{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T17:06:31Z","timestamp":1778605591953,"version":"3.51.4"},"reference-count":13,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2014,4,1]],"date-time":"2014-04-01T00:00:00Z","timestamp":1396310400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2014,4]]},"DOI":"10.1007\/s11432-014-5073-0","type":"journal-article","created":{"date-parts":[[2014,3,26]],"date-time":"2014-03-26T13:32:25Z","timestamp":1395840745000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Construction of highly nonlinear resilient Boolean functions satisfying strict avalanche criterion"],"prefix":"10.1007","volume":"57","author":[{"given":"WeiGuo","family":"Zhang","sequence":"first","affiliation":[]},{"given":"FuQiang","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Deng","family":"Tang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,6,17]]},"reference":[{"key":"5073_CR1","first-page":"028104","volume":"57","author":"L J Qu","year":"2014","unstructured":"Qu L J, Tan Y, Li C. On the Walsh spectrum of a family of quadratic APN functions with five terms. Sci China Inf Sci, 2014, 57: 028104","journal-title":"Sci China Inf Sci"},{"key":"5073_CR2","doi-asserted-by":"crossref","first-page":"1638","DOI":"10.1109\/TIT.2014.2300067","volume":"60","author":"W G Zhang","year":"2014","unstructured":"Zhang W G, Pasalic E. Constructions of resilient S-boxes with strictly almost optimal nonlinearity through disjoint linear codes. IEEE Trans Inf Theory, 2014, 60: 1638\u20131651","journal-title":"IEEE Trans Inf Theory"},{"key":"5073_CR3","doi-asserted-by":"crossref","first-page":"909","DOI":"10.1007\/s11432-011-4230-y","volume":"54","author":"W G Zhang","year":"2011","unstructured":"Zhang W G, Xiao G Z. Construction of almost optimal resilient Boolean functions via concatenating Maiorana-McFarland functions. Sci China Inf Sci, 2011, 54: 909\u2013912","journal-title":"Sci China Inf Sci"},{"key":"5073_CR4","doi-asserted-by":"crossref","first-page":"5822","DOI":"10.1109\/TIT.2009.2032736","volume":"55","author":"W G Zhang","year":"2009","unstructured":"Zhang W G, Xiao G Z. Constructions of almost optimal resilient Boolean functions on large even number of variables. IEEE Trans Inf Theory, 2009, 55: 5822\u20135831","journal-title":"IEEE Trans Inf Theory"},{"key":"5073_CR5","first-page":"470","volume-title":"Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto","author":"X M Zhang","year":"2000","unstructured":"Zhang X M, Zheng Y. On relationship among avalanche, nonlinearity, and propagation criteria. In: Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, 2000. 470\u2013483"},{"key":"5073_CR6","volume-title":"Generalized Maiorana-McFarland constructions for almost optimal resilient functions","author":"W G Zhang","year":"2010","unstructured":"Zhang W G, Xiao G Z. Generalized Maiorana-McFarland constructions for almost optimal resilient functions. arXiv:1003.3492. 2010"},{"key":"5073_CR7","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1007\/3-540-36492-7_13","volume-title":"Selected Areas in Cryptography","author":"P Charpin","year":"2003","unstructured":"Charpin P, Pasalic E. On propagation characteristics of resilient functions. In: NyBerg K, Heys H, eds. Selected Areas in Cryptography. Berlin: Springer, 2003. 175\u2013195"},{"key":"5073_CR8","first-page":"246","volume-title":"Proceedings of the 3rd International Conference on Cryptology in India, Hyderabad","author":"J Clark","year":"2002","unstructured":"Clark J, Jacob J, Stepney S, et al. Evolving Boolean functions satisfying multiple criteria. In: Proceedings of the 3rd International Conference on Cryptology in India, Hyderabad, 2002. 246\u2013259"},{"key":"5073_CR9","first-page":"485","volume-title":"Proceedings of International Conference on the Theory and Application of Cryptographic Techniques, Bruges","author":"P Sarkar","year":"2000","unstructured":"Sarkar P, Maitra S. Construction of nonlinear Boolean functions with important cryptographic properties. In: Proceedings of International Conference on the Theory and Application of Cryptographic Techniques, Bruges, 2000. 485\u2013506"},{"key":"5073_CR10","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1007\/s10623-011-9587-9","volume":"67","author":"D Tang","year":"2013","unstructured":"Tang D, Zhang W G, Tang X. Construction of balanced Boolean functions with high nonlinearity and good autocorrelation properties. Designs Codes Cryptography, 2013, 67: 77\u201391","journal-title":"Designs Codes Cryptography"},{"key":"5073_CR11","doi-asserted-by":"crossref","first-page":"569","DOI":"10.1109\/18.6037","volume":"34","author":"G Z Xiao","year":"1988","unstructured":"Xiao G Z, Massey J L. A spectral characterization of correlation-immune combining functions. IEEE Trans Inf Theory, 1988, 34: 569\u2013571","journal-title":"IEEE Trans Inf Theory"},{"key":"5073_CR12","first-page":"549","volume-title":"Proceedings of Workshop on the Theory and Application of Cryptographic Techniques, Houthalen","author":"W Meier","year":"1990","unstructured":"Meier W, Staffelbach O. Nonlinearity criteria for cryptographic functions. In: Proceedings of Workshop on the Theory and Application of Cryptographic Techniques, Houthalen, 1990. 549\u2013562"},{"key":"5073_CR13","doi-asserted-by":"crossref","first-page":"523","DOI":"10.1007\/3-540-39799-X_41","volume-title":"Advances in Cryptology \u2014 CRYPTO\u201985 Proceedings","author":"A F Webster","year":"1986","unstructured":"Webster A F, Tavares S E. On the design of S-box. In: Williams H C, eds. Advances in Cryptology \u2014 CRYPTO\u201985 Proceedings. Berlin: Springer, 1986. 523\u2013524"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-014-5073-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-014-5073-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-014-5073-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T15:37:56Z","timestamp":1559403476000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-014-5073-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4]]},"references-count":13,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2014,4]]}},"alternative-id":["5073"],"URL":"https:\/\/doi.org\/10.1007\/s11432-014-5073-0","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,4]]}}}