{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T09:50:32Z","timestamp":1764841832315,"version":"3.37.3"},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2016,1,13]],"date-time":"2016-01-13T00:00:00Z","timestamp":1452643200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"National Key Basic Research Program of China","award":["2013CB834204"],"award-info":[{"award-number":["2013CB834204"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1007\/s12095-015-0176-z","type":"journal-article","created":{"date-parts":[[2016,1,13]],"date-time":"2016-01-13T05:00:13Z","timestamp":1452661213000},"page":"345-361","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["On the nonlinearity of S-boxes and linear codes"],"prefix":"10.1007","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9104-2975","authenticated-orcid":false,"given":"Jian","family":"Liu","sequence":"first","affiliation":[]},{"given":"Sihem","family":"Mesnager","sequence":"additional","affiliation":[]},{"given":"Lusheng","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,13]]},"reference":[{"key":"176_CR1","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1017\/CBO9780511780448.011","volume-title":"Boolean models and methods in mathematics, computer science, and engineering","author":"C Carlet","year":"2010","unstructured":"Carlet, C.: Boolean functions for cryptography and error correcting codes. In: Crama, Y., Hammer, P. (eds.) Boolean models and methods in mathematics, computer science, and engineering, pp 257\u2013397. University Press, Cambridge (2010)"},{"key":"176_CR2","doi-asserted-by":"crossref","first-page":"398","DOI":"10.1017\/CBO9780511780448.012","volume-title":"Boolean models and methods in mathematics, computer science, and engineering","author":"C Carlet","year":"2010","unstructured":"Carlet, C.: Vectorial boolean functions for cryptography. In: Crama, Y., Hammer, P. (eds.) Boolean models and methods in mathematics, computer science, and engineering, pp 398\u2013469. University Press, Cambridge (2010)"},{"issue":"1\u20133","key":"176_CR3","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1007\/s10623-010-9468-7","volume":"59","author":"C Carlet","year":"2011","unstructured":"Carlet, C.: Relating three nonlinearity parameters of vectorial functions and building APN functions from bent functions. Des. Codes Crypt. 59(1\u20133), 89\u2013109 (2011)","journal-title":"Des. Codes Crypt."},{"issue":"2\u20133","key":"176_CR4","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1016\/j.jco.2003.08.008","volume":"20","author":"C Carlet","year":"2004","unstructured":"Carlet, C., Ding, C.: Highly nonlinear mappings. J. Complex. 20(2\u20133), 205\u2013244 (2004)","journal-title":"J. Complex."},{"issue":"1","key":"176_CR5","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1016\/j.ffa.2005.07.003","volume":"13","author":"C Carlet","year":"2007","unstructured":"Carlet, C., Ding, C.: Nonlinearities of S-boxes. Finite Fields Appl. 13(1), 121\u2013135 (2007)","journal-title":"Finite Fields Appl."},{"issue":"6","key":"176_CR6","doi-asserted-by":"crossref","first-page":"2089","DOI":"10.1109\/TIT.2005.847722","volume":"51","author":"C Carlet","year":"2005","unstructured":"Carlet, C., Ding, C., Yuan, J.: Linear codes from perfect nonlinear mappings and their secret sharing schemes. IEEE Trans. Inf. Theory 51(6), 2089\u20132102 (2005)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"176_CR7","first-page":"291","volume-title":"10th Annual International Workshop, Selected Areas in Cryptography 2003","author":"C Carlet","year":"2004","unstructured":"Carlet, C., Prouff, E.: On a new notion of nonlinearity relevant to multi-output pseudo-random generators. In: 10th Annual International Workshop, Selected Areas in Cryptography 2003, vol. 3006, pp 291\u2013305. Springer-Verlag, Berlin (2004)"},{"issue":"4","key":"176_CR8","first-page":"28","volume":"34","author":"L Chen","year":"2001","unstructured":"Chen, L., Fu, F.: On the nonlinearity of multi-output Boolean functions. Acta Sci. Nat. Univ. Nankai. 34(4), 28\u201333 (2001). (in Chinese)","journal-title":"Acta Sci. Nat. Univ. Nankai."},{"key":"176_CR9","volume-title":"Covering Codes","author":"G Cohen","year":"1997","unstructured":"Cohen, G., Honkala, I., Litsyn, S., Lobstein, A.: Covering Codes. Amsterdam, North-Holland (1997)"},{"issue":"5","key":"176_CR10","doi-asserted-by":"crossref","first-page":"575","DOI":"10.1109\/TIT.1975.1055435","volume":"21","author":"P Delsarte","year":"1975","unstructured":"Delsarte, P.: On subfield sub-codes of modified Reed-Solomon codes. IEEE Trans. Inf. Theory 21(5), 575\u2013576 (1975)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"176_CR11","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-54973-0","volume-title":"The stability theory of stream ciphers. Lect. Notes Comput. Sci","author":"C Ding","year":"1991","unstructured":"Ding, C., Xiao, G., Shan, W.: The stability theory of stream ciphers. Lect. Notes Comput. Sci, vol. 561. Springer-Verlag, Berlin (1991)"},{"issue":"1","key":"176_CR12","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1109\/TIT.1968.1054106","volume":"14","author":"R Gold","year":"1968","unstructured":"Gold, R.: Maximal recursive sequences with 3-valued recursive cross-correlation functions. IEEE Trans. Inf. Theory 14(1), 154\u2013156 (1968)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"176_CR13","volume-title":"Encyclopedia of mathematics and its applications. Finite Fields","author":"R Lidl","year":"1983","unstructured":"Lidl, R., Niederreiter, H.: Encyclopedia of mathematics and its applications. Finite Fields, vol. 20. Addison-Wesley Publishing Company, Massachusetts (1983)"},{"issue":"1","key":"176_CR14","doi-asserted-by":"crossref","first-page":"9","DOI":"10.3901\/JME.2014.19.009","volume":"31","author":"J Liu","year":"2014","unstructured":"Liu, J., Chen, L.: On nonlinearity of the second type of multi-output Boolean functions. Chinese Journal of Engineering Mathematics 31(1), 9\u201322 (2014). (in Chinese)","journal-title":"Chinese Journal of Engineering Mathematics"},{"key":"176_CR15","volume-title":"The theory of error-correcting codes","author":"FJ MacWilliams","year":"1977","unstructured":"MacWilliams, F. J., Sloane, N. J. A.: The theory of error-correcting codes. North-Holland Publishing Company, Amsterdam (1977)"},{"key":"176_CR16","first-page":"386","volume-title":"Advances in Cryptology\u2014EUROCRYPT\u201993","author":"M Matsui","year":"1993","unstructured":"Matsui, M.: Linear cryptanalysis method for DES cipher. In: Advances in Cryptology\u2014EUROCRYPT\u201993, vol. 765, pp 386\u2013397. Springer-Verlag, Berlin (1993)"},{"key":"176_CR17","doi-asserted-by":"crossref","DOI":"10.1201\/9781439821916","volume-title":"Handbook of applied cryptography","author":"A Menezes","year":"1996","unstructured":"Menezes, A., VanOorschot, P., Vanstone, S.: Handbook of applied cryptography. CRC Press, Boca Raton (1996)"},{"key":"176_CR18","first-page":"378","volume-title":"Advances in Cryptology\u2014EUROCRYPT\u201991","author":"K Nyberg","year":"1992","unstructured":"Nyberg, K.: Perfect nonlinear S-boxes. In: Advances in Cryptology\u2014EUROCRYPT\u201991, vol. 547, pp 378\u2013386. Springer-Verlag, Berlin (1992)"},{"key":"176_CR19","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1007\/3-540-47555-9_8","volume-title":"Advances in Cryptology\u2014EUROCRYPT\u201992","author":"K Nyberg","year":"1993","unstructured":"Nyberg, K.: On the construction of highly nonlinear permutations. In: Advances in Cryptology\u2014EUROCRYPT\u201992, vol. 658, pp 92\u201398. Springer-Verlag, Berlin (1993)"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-015-0176-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12095-015-0176-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-015-0176-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-015-0176-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T23:54:05Z","timestamp":1559433245000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12095-015-0176-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1,13]]},"references-count":19,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,5]]}},"alternative-id":["176"],"URL":"https:\/\/doi.org\/10.1007\/s12095-015-0176-z","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"type":"print","value":"1936-2447"},{"type":"electronic","value":"1936-2455"}],"subject":[],"published":{"date-parts":[[2016,1,13]]}}}