{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:42:08Z","timestamp":1740148928589,"version":"3.37.3"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,4,20]],"date-time":"2021-04-20T00:00:00Z","timestamp":1618876800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,4,20]],"date-time":"2021-04-20T00:00:00Z","timestamp":1618876800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2021,5]]},"DOI":"10.1007\/s12095-021-00488-w","type":"journal-article","created":{"date-parts":[[2021,4,20]],"date-time":"2021-04-20T03:48:01Z","timestamp":1618890481000},"page":"451-458","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Separation results for boolean function classes"],"prefix":"10.1007","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8113-9378","authenticated-orcid":false,"given":"Aniruddha","family":"Biswas","sequence":"first","affiliation":[]},{"given":"Palash","family":"Sarkar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,20]]},"reference":[{"issue":"5","key":"488_CR1","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1016\/S0020-0190(97)00131-2","volume":"63","author":"RB Boppana","year":"1997","unstructured":"Boppana, R. B.: The average sensitivity of bounded-depth circuits. Inf. Process. Lett. 63(5), 257\u2013261 (1997). https:\/\/doi.org\/10.1016\/S0020-0190(97)00131-2","journal-title":"Inf. Process. Lett."},{"issue":"2","key":"488_CR2","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1137\/0403015","volume":"3","author":"J Bruck","year":"1990","unstructured":"Bruck, J.: Harmonic analysis of polynomial threshold functions. SIAM J. Discret. Math. 3(2), 168\u2013177 (1990). https:\/\/doi.org\/10.1137\/0403015","journal-title":"SIAM J. Discret. Math."},{"issue":"6","key":"488_CR3","doi-asserted-by":"publisher","first-page":"1051","DOI":"10.1007\/s12095-017-0262-5","volume":"10","author":"C Carlet","year":"2018","unstructured":"Carlet, C.: On the nonlinearity of monotone Boolean functions. Cryptogr. Commun. 10(6), 1051\u20131061 (2018). https:\/\/doi.org\/10.1007\/s12095-017-0262-5","journal-title":"Cryptogr. Commun."},{"issue":"1","key":"488_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1515\/jmc-2014-0030","volume":"10","author":"C Carlet","year":"2016","unstructured":"Carlet, C., Joyner, D., St\u0103nic\u0103, P., Tang, D.: Cryptographic properties of monotone Boolean functions. J. Math. Cryptol. 10 (1), 1\u201314 (2016). http:\/\/www.degruyter.com\/view\/j\/jmc.2016.10.issue-1\/jmc-2014-0030\/jmc-2014-0030.xmlhttp:\/\/www.degruyter.com\/view\/j\/jmc.2016.10.issue-1\/jmc-2014-0030\/jmc-2014-0030.xml","journal-title":"J. Math. Cryptol."},{"issue":"2","key":"488_CR5","doi-asserted-by":"publisher","first-page":"19","DOI":"10.32513\/tbilisi\/1528768900","volume":"5","author":"C Celerier","year":"2012","unstructured":"Celerier, C., Joyner, D., Melles, C., Phillips, D.: On the Walsh-Hadamard transform of monotone Boolean functions. Tbilisi Math. J. 5(2), 19\u201335 (2012). https:\/\/projecteuclid.org\/euclid.tbilisi\/1528768900","journal-title":"Tbilisi Math. J."},{"key":"488_CR6","doi-asserted-by":"publisher","unstructured":"Chakraborty, S., Karmalkar, S., Kundu, S., Lokam, S.V., Saurabh, N.: Fourier entropy-influence conjecture for random linear threshold functions. In: Latin American Symposium on Theoretical Informatics, vol. 10807, pp. 275\u2013289. Springer. https:\/\/doi.org\/10.1007\/978-3-319-77404-6_21 (2018)","DOI":"10.1007\/978-3-319-77404-6_21"},{"key":"488_CR7","doi-asserted-by":"crossref","unstructured":"Chow, C.K.: On the characterization of threshold functions. In: 2nd Annual Symposium on Switching Circuit Theory and Logical Design (SWCT 1961). pp. 34\u201338. IEEE. https:\/\/ieeexplore.ieee.org\/document\/5397305 (1961)","DOI":"10.1109\/FOCS.1961.24"},{"key":"488_CR8","volume-title":"Cryptographic Boolean Functions and Applications","author":"TW Cusick","year":"2017","unstructured":"Cusick, T.W., St\u0103nic\u0103, P.: Cryptographic Boolean Functions and Applications. Academic Press, Cambridge (2017). https:\/\/www.elsevier.com\/books\/cryptographic-boolean-functions-and-applications\/cusick\/978-0-12-811129-1"},{"issue":"1","key":"488_CR9","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1137\/110855223","volume":"43","author":"I Diakonikolas","year":"2014","unstructured":"Diakonikolas, I., Raghavendra, P., Servedio, R.A., Tan, L.: Average sensitivity and noise sensitivity of polynomial threshold functions. SIAM J. Comput. 43(1), 231\u2013253 (2014). https:\/\/doi.org\/10.1137\/110855223","journal-title":"SIAM J. Comput."},{"issue":"2","key":"488_CR10","first-page":"8","volume":"12","author":"S Gangopadhyay","year":"2016","unstructured":"Gangopadhyay, S., St\u0103nic\u0103, P.: Fourier entropy-influence conjecture for cryptographic Boolean functions. Trans. Adv. Res. (Special issue on Advances in Cryptology and Information Security) 12(2), 8\u201314 (2016). http:\/\/tar.ipsitransactions.org\/","journal-title":"Trans. Adv. Res. (Special issue on Advances in Cryptology and Information Security)"},{"issue":"1","key":"488_CR11","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/BF01305949","volume":"14","author":"C Gotsman","year":"1994","unstructured":"Gotsman, C., Linial, N.: Spectral properties of threshold functions. Combinatorica 14(1), 35\u201350 (1994). https:\/\/doi.org\/10.1007\/BF01305949","journal-title":"Combinatorica"},{"key":"488_CR12","volume-title":"Computational limitations for small-depth circuits","author":"JT H\u00e5stad","year":"1987","unstructured":"H\u00e5stad, J.T.: Computational limitations for small-depth circuits. MIT press, Cambridge (1987). https:\/\/mitpress.mit.edu\/books\/computational-limitations-small-depth-circuits"},{"key":"488_CR13","doi-asserted-by":"publisher","unstructured":"Kahn, J., Kalai, G., Linial, N.: The influence of variables on Boolean functions (extended abstract). In: [Proceedings 1988] 29th Annual Symposium on Foundations of Computer Science, pp. 68\u201380. IEEE Computer Society. https:\/\/doi.org\/10.1109\/SFCS.1988.21923 (1988)","DOI":"10.1109\/SFCS.1988.21923"},{"issue":"3","key":"488_CR14","doi-asserted-by":"publisher","first-page":"607","DOI":"10.1145\/174130.174138","volume":"40","author":"N Linial","year":"1993","unstructured":"Linial, N., Mansour, Y., Nisan, N.: Constant depth circuits, Fourier transform, and learnability. J. ACM (JACM) 40(3), 607\u2013620 (1993). https:\/\/doi.org\/10.1145\/174130.174138","journal-title":"J. ACM (JACM)"},{"key":"488_CR15","doi-asserted-by":"publisher","unstructured":"Preneel, B., Leekwijck, W.V., Linden, L.V., Govaerts, R., Vandewalle, J.: Propagation characteristics of Boolean functions. In: Advances in Cryptology - EUROCRYPT \u201990, Workshop on the Theory and Application of of Cryptographic Techniques, vol. 473, pp. 161\u2013173. Springer. https:\/\/doi.org\/10.1007\/3-540-46877-3_14 (1990)","DOI":"10.1007\/3-540-46877-3_14"},{"issue":"3","key":"488_CR16","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1016\/0097-3165(76)90024-8","volume":"20","author":"OS Rothaus","year":"1976","unstructured":"Rothaus, O.S.: On \u201cbent\u201d functions. J. Comb. Theory Ser. A. 20 (3), 300\u2013305 (1976). https:\/\/doi.org\/10.1016\/0097-3165(76)90024-8","journal-title":"J. Comb. Theory Ser. A."},{"key":"488_CR17","unstructured":"Shalev, G.: On the Fourier entropy influence conjecture for extremal classes. arXiv:1806.03646 (2018)"},{"key":"488_CR18","doi-asserted-by":"publisher","unstructured":"Webster, A.F., Tavares, S.E.: On the design of S-boxes. In: Advances in Cryptology - CRYPTO \u201985, Conference on the theory and application of cryptographic techniques, vol. 218, pp. 523\u2013534. Springer. https:\/\/doi.org\/10.1007\/3-540-39799-X_41(1985)","DOI":"10.1007\/3-540-39799-X_41"},{"key":"488_CR19","unstructured":"Zhang, S.: Note on the average sensitivity of monotone Boolean functions. http:\/\/www.cse.cuhk.edu.hk\/syzhang\/papers\/Sensitivity.pdf (2004)"},{"key":"488_CR20","doi-asserted-by":"crossref","unstructured":"Zheng, Y., Zhang, X.M.: Relationships between bent functions and complementary plateaued functions. In: International Conference on Information Security and Cryptology, pp. 60\u201375. Springer. https:\/\/link.springer.com\/chapter\/10.1007\/10719994_6 (1999)","DOI":"10.1007\/10719994_6"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-021-00488-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12095-021-00488-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-021-00488-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,12]],"date-time":"2021-05-12T11:35:21Z","timestamp":1620819321000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12095-021-00488-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,20]]},"references-count":20,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,5]]}},"alternative-id":["488"],"URL":"https:\/\/doi.org\/10.1007\/s12095-021-00488-w","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"type":"print","value":"1936-2447"},{"type":"electronic","value":"1936-2455"}],"subject":[],"published":{"date-parts":[[2021,4,20]]},"assertion":[{"value":"6 November 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 March 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 April 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}