{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T22:43:28Z","timestamp":1770072208126,"version":"3.49.0"},"reference-count":8,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2017,11,9]],"date-time":"2017-11-09T00:00:00Z","timestamp":1510185600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1420227"],"award-info":[{"award-number":["CNS-1420227"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.1007\/s12095-017-0267-0","type":"journal-article","created":{"date-parts":[[2017,11,8]],"date-time":"2017-11-08T20:48:08Z","timestamp":1510174088000},"page":"1063-1073","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Correlation immune functions with respect to the q-transform"],"prefix":"10.1007","volume":"10","author":[{"given":"Ting","family":"Gu","sequence":"first","affiliation":[]},{"given":"Zhixiong","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Andrew","family":"Klapper","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,9]]},"reference":[{"key":"267_CR1","doi-asserted-by":"crossref","unstructured":"Carlet, C., Guillot, P., Mesnager, S.: On immunity profile of boolean functions. In: Gong, G., Helleseth, T., Song, H.-Y., Yang, K. (eds.) Sequences and Their Applications\u2013SETA 2006, Lecture Notes in Computer Science, vol. 4086, pp 364\u2013375. Springer, Berlin (2006)","DOI":"10.1007\/11863854_32"},{"key":"267_CR2","volume-title":"Shift Register Sequences","author":"S Golomb","year":"1982","unstructured":"Golomb, S.: Shift Register Sequences. Aegean Park Press, Laguna Hills (1982)"},{"key":"267_CR3","doi-asserted-by":"crossref","unstructured":"Klapper, A.: A new transform related to distance from a boolean function (extended abstract). In: Schmidt, K.-U., Winterhof, A. (eds.) Sequences and Their Applications\u2013SETA 2014, Lecture Notes in Computer Science, vol. 8865, pp 47\u201359. Springer International Publishing (2014)","DOI":"10.1007\/978-3-319-12325-7_4"},{"key":"267_CR4","doi-asserted-by":"crossref","first-page":"2798","DOI":"10.1109\/TIT.2016.2536730","volume":"62.5","author":"A Klapper","year":"2016","unstructured":"Klapper, A.: A new transform related to distance from a boolean function. IEEE Trans. Inf. Theory 62.5, 2798\u20132812 (2016)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"267_CR5","doi-asserted-by":"crossref","unstructured":"Neyman, J., Pearson, E. S.: On the problem of the most efficient tests of statistical hypotheses. In: Kotz, S., Johnson, N. (eds.) Breakthroughs in Statistics, pp 73\u2013108. Springer, New York (1992)","DOI":"10.1007\/978-1-4612-0919-5_6"},{"key":"267_CR6","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1109\/TC.1985.1676518","volume":"100.1","author":"T Siegenthaler","year":"1985","unstructured":"Siegenthaler, T.: Decrypting a class of stream ciphers using ciphertext only. IEEE Trans. Comput. 100.1, 81\u201385 (1985)","journal-title":"IEEE Trans. Comput."},{"key":"267_CR7","first-page":"141","volume":"21","author":"C-K Wu","year":"2000","unstructured":"Wu, C. -K., Dawson, E.: Construction of correlation immune boolean functions. Aust. J. Commun. 21, 141\u2013166 (2000)","journal-title":"Aust. J. Commun."},{"key":"267_CR8","doi-asserted-by":"crossref","first-page":"569","DOI":"10.1109\/18.6037","volume":"34.3","author":"G Xiao","year":"1988","unstructured":"Xiao, G., Massey, J.: A spectral characterization of correlation-immune combining functions. IEEE Trans. Inf. Theory 34.3, 569\u2013571 (1988)","journal-title":"IEEE Trans. Inf. Theory"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12095-017-0267-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-017-0267-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-017-0267-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,8,24]],"date-time":"2018-08-24T04:02:16Z","timestamp":1535083336000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12095-017-0267-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,9]]},"references-count":8,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2018,11]]}},"alternative-id":["267"],"URL":"https:\/\/doi.org\/10.1007\/s12095-017-0267-0","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"value":"1936-2447","type":"print"},{"value":"1936-2455","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,11,9]]}}}