{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,11]],"date-time":"2024-08-11T11:09:59Z","timestamp":1723374599701},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,9,27]],"date-time":"2021-09-27T00:00:00Z","timestamp":1632700800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,9,27]],"date-time":"2021-09-27T00:00:00Z","timestamp":1632700800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Front. Comput. Sci."],"published-print":{"date-parts":[[2022,6]]},"DOI":"10.1007\/s11704-020-0182-y","type":"journal-article","created":{"date-parts":[[2021,9,27]],"date-time":"2021-09-27T15:03:11Z","timestamp":1632754991000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["New construction of highly nonlinear resilient S-boxes via linear codes"],"prefix":"10.1007","volume":"16","author":[{"given":"Haixia","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Yongzhuang","family":"Wei","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,27]]},"reference":[{"key":"182_CR1","volume-title":"Handbook of Applied Cryptography","author":"A J Menezes","year":"1997","unstructured":"Menezes A J, Vanstone S A, Van Oorschot P C. Handbook of Applied Cryptography. 1st ed. Cleveland: CRC Press, 1997","edition":"1st ed."},{"key":"182_CR2","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/3-540-54973-0_3","volume":"561","author":"C S Ding","year":"1991","unstructured":"Ding C S, Shan W J, Xiao G Z. The stability theory of stream ciphers. Lecture Notes in Computer Science, 1991, 561: 13\u201328","journal-title":"Lecture Notes in Computer Science"},{"issue":"5","key":"182_CR3","doi-asserted-by":"publisher","first-page":"776","DOI":"10.1109\/TIT.1984.1056949","volume":"30","author":"T Siegenthaler","year":"2003","unstructured":"Siegenthaler T. Correlation-immunity of nonlinear combining functions for cryptographic applications (Corresp.). IEEE Transactions on Information Theory, 2003, 30(5): 776\u2013780","journal-title":"IEEE Transactions on Information Theory"},{"key":"182_CR4","doi-asserted-by":"crossref","unstructured":"Courtois N. Fast algebraic attacks on stream ciphers with linear feedback. In: Proceedings of Advances in Cryptology \u2014 EUROCRYPT 2003: International Conference on the Theory and Applications of Cryptographic Techniques. 2003: 176\u2013194","DOI":"10.1007\/978-3-540-45146-4_11"},{"key":"182_CR5","volume-title":"The Design and Analysis of Boolean Function","author":"Y Zhou","year":"2015","unstructured":"Zhou Y, Hu Y P, Dong X F. The Design and Analysis of Boolean Function. 1st ed. Beijin: National Defense Industry Press, 2015","edition":"1st ed."},{"key":"182_CR6","doi-asserted-by":"crossref","unstructured":"Camion P, Carlet C, Charpin P, Sendrier N. On correlation-immune functions. In: Proceedings of International Cryptology Conference on Advances in Cryptology. 1991: 86\u2013100","DOI":"10.1007\/3-540-46766-1_6"},{"key":"182_CR7","doi-asserted-by":"crossref","unstructured":"Carlet C. A larger class of cryptographic boolean functions via a study of the Maiorana-McFarland construction. In: Proceedings of International Cryptology Conference on Advances in Cryptology. 2002: 549\u2013564","DOI":"10.1007\/3-540-45708-9_35"},{"issue":"10","key":"182_CR8","doi-asserted-by":"publisher","first-page":"4581","DOI":"10.1109\/TIT.2006.881721","volume":"52","author":"E Pasalic","year":"2006","unstructured":"Pasalic E. Maiorana-McFarland class: degree optimization and algebraic properties. IEEE Transactions on Information Theory, 2006, 52(10): 4581\u20131594","journal-title":"IEEE Transactions on Information Theory"},{"issue":"8","key":"182_CR9","doi-asserted-by":"publisher","first-page":"2182","DOI":"10.1109\/TIR.2002.800492","volume":"48","author":"E Pasalic","year":"2002","unstructured":"Pasalic E, Maitra S. Linear codes in generalized construction of resilient functions with very high nonlinearity. IEEE Transactions on Information Theory, 2002, 48(8): 2182\u20132191","journal-title":"IEEE Transactions on Information Theory"},{"issue":"2","key":"182_CR10","doi-asserted-by":"publisher","first-page":"494","DOI":"10.1109\/TIT.2002.807297","volume":"49","author":"T Johansson","year":"2003","unstructured":"Johansson T, Pasalic E. A construction of resilient functions with high nonlinearity. IEEE Transactions on Information Theory, 2003, 49(2): 494\u2013501","journal-title":"IEEE Transactions on Information Theory"},{"issue":"3","key":"182_CR11","doi-asserted-by":"publisher","first-page":"1638","DOI":"10.1109\/TIT.2014.2300067","volume":"60","author":"W G Zhang","year":"2014","unstructured":"Zhang W G, Pasalic E. Constructions of resilient S-boxes with strictly almost optimal nonlinearity through disjoint linear codes. IEEE Transactions on Information Theory, 2014, 60(3): 1638\u20131651","journal-title":"IEEE Transactions on Information Theory"},{"issue":"12","key":"182_CR12","doi-asserted-by":"publisher","first-page":"5822","DOI":"10.1109\/TIT.2009.2032736","volume":"55","author":"W G Zhang","year":"2009","unstructured":"Zhang W G, Xiao G Z. Constructions of almost optimal resilient Boolean functions on large even number of variables. IEEE Transactions on Information Theory, 2009, 55(12): 5822\u20135831","journal-title":"IEEE Transactions on Information Theory"},{"issue":"10","key":"182_CR13","doi-asserted-by":"publisher","first-page":"6681","DOI":"10.1109\/TIT.2014.2345772","volume":"60","author":"W G Zhang","year":"2014","unstructured":"Zhang W G, Pasalic E. Generalized Maiorana-McFarland construction of resilient Boolean functions with high nonlinearity and good algebraic properties. IEEE Transactions on Information Theory, 2014, 60(10): 6681\u20136695","journal-title":"IEEE Transactions on Information Theory"},{"issue":"1","key":"182_CR14","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1587\/transfun.E92.A.11","volume":"92","author":"K Khoo","year":"2009","unstructured":"Khoo K, Chew G, Gong G, Lee H K. Time-memory-data trade-off attack on stream ciphers based on Maiorana-McFarland functions. IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences, 2009, 92(1): 11\u201321","journal-title":"IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences"},{"issue":"2","key":"182_CR15","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1049\/iet-ifs.2011.0107","volume":"6","author":"M Mihaljevic","year":"2012","unstructured":"Mihaljevic M, Gangopadhyay S, Paul G, Imaiand H. Internal state recovery of Grain-v1 employing normality order of the filter function. Information Security Iet, 2012, 6(2): 55\u201364","journal-title":"Information Security Iet"},{"issue":"7","key":"182_CR16","doi-asserted-by":"publisher","first-page":"3398","DOI":"10.1109\/TIT.2009.2021316","volume":"55","author":"E Pasalic","year":"2009","unstructured":"Pasalic E. On guess and determine cryptanalysis of LFSR-based stream ciphers. IEEE Transactions on Information Theory, 2009, 55(7): 3398\u20133406","journal-title":"IEEE Transactions on Information Theory"},{"key":"182_CR17","doi-asserted-by":"crossref","unstructured":"Boura C, Canteaut A. A new criterion for avoiding the propagation of linear relations through an S-box. In: Proceedings of International Workshop on Fast Software Encryption. 2013: 585\u2013604","DOI":"10.1007\/978-3-662-43933-3_30"},{"key":"182_CR18","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1016\/j.ins.2017.06.036","volume":"415","author":"Y Z Wei","year":"2017","unstructured":"Wei Y Z, Pasalic E, Zhang F R. New constructions of resilient functions with strictly almost optimal nonlinearity via non-overlap spectra functions. Information Sciences, 2017, 415: 377\u2013396","journal-title":"Information Sciences"},{"key":"182_CR19","volume-title":"Cryptographic Boolean Functions and Applications","author":"T W Cusick","year":"2009","unstructured":"Cusick T W, Stanica P. Cryptographic Boolean Functions and Applications. 1st ed. San Diego: Elsevier, 2009","edition":"1st ed."},{"issue":"3","key":"182_CR20","doi-asserted-by":"publisher","first-page":"569","DOI":"10.1109\/18.6037","volume":"34","author":"G Z Xiao","year":"1988","unstructured":"Xiao G Z, Massey J L. A spectral characterization of correlation immune combining functions. IEEE Transactions on Information Theory, 1988, 34(3): 569\u2013571","journal-title":"IEEE Transactions on Information Theory"},{"key":"182_CR21","volume-title":"Boolean Functions in Modern Cryptography","author":"Q Y Wen","year":"2000","unstructured":"Wen Q Y, Niu X X, Yang Y X. Boolean Functions in Modern Cryptography. 1st ed. Beijing: Science Press, 2000","edition":"1st ed."},{"issue":"5","key":"182_CR22","doi-asserted-by":"publisher","first-page":"1740","DOI":"10.1109\/18.623184","volume":"43","author":"X M Zhang","year":"1997","unstructured":"Zhang X M, Zheng Y L. Cryptographically resilient functions. IEEE Transactions on Information Theory, 1997, 43(5): 1740\u20131747","journal-title":"IEEE Transactions on Information Theory"},{"key":"182_CR23","volume-title":"Error Correcting Code \u2014 Principle and Method","author":"X M Wang","year":"2003","unstructured":"Wang X M, Xiao G Z. Error Correcting Code \u2014 Principle and Method. 1st ed. Xian: Xidian University Press, 2003","edition":"1st ed."},{"key":"182_CR24","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1016\/j.ins.2013.10.015","volume":"269","author":"S J Fu","year":"2014","unstructured":"Fu S J, Li C, Qu L J. A recursive construction of highly nonlinear resilient vectorial functions. Information Science, 2014, 269: 388\u2013396","journal-title":"Information Science"}],"container-title":["Frontiers of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-020-0182-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11704-020-0182-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-020-0182-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,20]],"date-time":"2023-07-20T21:04:30Z","timestamp":1689887070000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11704-020-0182-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,27]]},"references-count":24,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,6]]}},"alternative-id":["182"],"URL":"https:\/\/doi.org\/10.1007\/s11704-020-0182-y","relation":{},"ISSN":["2095-2228","2095-2236"],"issn-type":[{"value":"2095-2228","type":"print"},{"value":"2095-2236","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,9,27]]},"assertion":[{"value":"4 May 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 August 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 September 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"163805"}}