{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,7,30]],"date-time":"2023-07-30T11:40:19Z","timestamp":1690717219603},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2014,11,30]],"date-time":"2014-11-30T00:00:00Z","timestamp":1417305600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1007\/s12095-014-0120-7","type":"journal-article","created":{"date-parts":[[2014,12,2]],"date-time":"2014-12-02T14:41:41Z","timestamp":1417531301000},"page":"297-315","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Characterization of robust immune symmetric boolean functions"],"prefix":"10.1007","volume":"7","author":[{"given":"Yuan","family":"Li","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,11,30]]},"reference":[{"key":"120_CR1","doi-asserted-by":"crossref","unstructured":"Alekhnovich, M., Razborov, A.: Lower bounds for polynomial calculus non binomial case. In: 42nd IEEE Symposium on Foundations of Computer Science, pp. 190\u2013199 (2001)","DOI":"10.1109\/SFCS.2001.959893"},{"key":"120_CR2","doi-asserted-by":"crossref","unstructured":"An, B., Preneel, B.: On the algebraic immunity of symmetric boolean functions. In: Progress in Cryptology\u2014Indocrypt 2004, LNCS 3797, pp. 35\u201348 (2005)","DOI":"10.1007\/11596219_4"},{"key":"120_CR3","unstructured":"Beck, C., Li, Y.: Represent MOD function by low degree polynomial with unbounded one-sided error. arXiv: http:\/\/arxiv.org\/abs\/1304.0713 (2013)"},{"issue":"7","key":"120_CR4","doi-asserted-by":"crossref","first-page":"3105","DOI":"10.1109\/TIT.2006.876253","volume":"52","author":"C Carlet","year":"2006","unstructured":"Carlet, C., Dalai, D. K., Gupta, K. C., Maitra, S.: Algebraic immunity for cryptographically significant boolean functions: analysis and construction. IEEE Trans. Inf. Theory 52(7), 3105\u20133121 (2006)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"120_CR5","doi-asserted-by":"crossref","unstructured":"Carlet, C., Feng, K.: An infinite class of balanced functions with optimum algebraic immunity, good immunity to fast algebraic attacks and good nonlinearity. In: Proceedings of ASIACRYPT 2008, LNCS 5350, pp. 425\u2013440 (2008)","DOI":"10.1007\/978-3-540-89255-7_26"},{"key":"120_CR6","doi-asserted-by":"crossref","unstructured":"Courtois, N. T., Meier, W.: Algebraic attacks on stream ciphers with linear feedback. In: Advances in Cryptology\u2014EUROCRYPT 2003, LNCS 2656, pp. 346\u2013359 (2003)","DOI":"10.1007\/3-540-39200-9_21"},{"key":"120_CR7","doi-asserted-by":"crossref","unstructured":"Chaudhuri, S., Radhakrishnan, J.: Deterministic restrictions in circuit complexity. STOC 96: Proceedings of the twenty-eighth annual ACM symposium on Theory of computing, pp 30\u201336. ACM Press (1996)","DOI":"10.1145\/237814.237824"},{"issue":"1","key":"120_CR8","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1007\/PL00001599","volume":"9","author":"F Green","year":"2000","unstructured":"Green, F.: A complex-number Fourier technique for lower bounds on the Mod-m degree. Comput. Complex. 9(1), 16\u201338 (2000)","journal-title":"Comput. Complex."},{"key":"120_CR9","unstructured":"Kopparty, S., Srinivasan, S.: Certifying polynomials for AC0[ \u2295] circuits, with applications. In: 32nd Intl Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2012), pp. 36\u201347"},{"key":"120_CR10","first-page":"318","volume":"4484","author":"F Liu","year":"2007","unstructured":"Liu, F., Feng, K.: Efficient computation of algebraic immunity of symmetric boolean functions. LNCS 4484, 318\u2013329 (2007)","journal-title":"LNCS"},{"issue":"5","key":"120_CR11","doi-asserted-by":"crossref","first-page":"2271","DOI":"10.1109\/TIT.2006.872977","volume":"52","author":"L Na","year":"2006","unstructured":"Na, L., Qi, W.: Symmetric boolean functions depending on an odd number of variables with maximum algebraic immunity. IEEE Trans. Inf. Theory 52(5), 2271\u20132273 (2006)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"120_CR12","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1007\/s12095-011-0057-z","volume":"4","author":"E Pasalic","year":"2012","unstructured":"Pasalic, E.: A design of boolean functions resistant to (fast) algebraic cryptanalysis with efficient implementation. Cryptogr. Commun. 4(1), 25\u201345 (March 2012)","journal-title":"Cryptogr. Commun."},{"issue":"10","key":"120_CR13","doi-asserted-by":"crossref","first-page":"7205","DOI":"10.1109\/TIT.2011.2132113","volume":"57","author":"J Peng","year":"2011","unstructured":"Peng, J., Quanshui, W., Kan, H.: On symmetric boolean functions with high algebraic immunity on even number of variables. IEEE Trans. Inf. Theory 57(10), 7205\u20137220 (2011)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"2","key":"120_CR14","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1007\/s11427-008-0013-0","volume":"51","author":"Q Longjiang","year":"2008","unstructured":"Longjiang, Q., Li, C.: On the 2 m -variable symmetric boolean functions with maximum algebraic immunity. Sci. China Ser. F: Inf. Sci. 51(2), 120\u2013127 (2008)","journal-title":"Science in China Series F: Information Sciences"},{"issue":"1","key":"120_CR15","doi-asserted-by":"crossref","first-page":"653","DOI":"10.1109\/TIT.2012.2217476","volume":"59","author":"D Tang","year":"2013","unstructured":"Tang, D., Carlet, C., Tang, X.: Highly nonlinear boolean functions with optimal algebraic immunity and good behavior against fast algebraic attacks. IEEE Trans. Inf. Theory 59(1), 653\u2013664 (2013)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"8","key":"120_CR16","doi-asserted-by":"crossref","first-page":"5612","DOI":"10.1109\/TIT.2012.2201350","volume":"58","author":"Hui Wang","year":"2012","unstructured":"Wang, Hui, Peng, Jie, Li, Yuan, Kan, Haibin: On 2k-variable symmetric boolean functions with maximum algebraic immunity k. IEEE Trans. Inf. Theory 58(8), 5612\u20135624 (2012)","journal-title":"IEEE Trans. Inf. Theory"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-014-0120-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12095-014-0120-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-014-0120-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,30]],"date-time":"2023-07-30T11:15:44Z","timestamp":1690715744000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12095-014-0120-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11,30]]},"references-count":16,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2015,9]]}},"alternative-id":["120"],"URL":"https:\/\/doi.org\/10.1007\/s12095-014-0120-7","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"value":"1936-2447","type":"print"},{"value":"1936-2455","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,11,30]]}}}