{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,3,5]],"date-time":"2024-03-05T08:53:35Z","timestamp":1709628815687},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2023,7,17]],"date-time":"2023-07-17T00:00:00Z","timestamp":1689552000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,7,17]],"date-time":"2023-07-17T00:00:00Z","timestamp":1689552000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2023,9]]},"DOI":"10.1007\/s12095-023-00653-3","type":"journal-article","created":{"date-parts":[[2023,7,17]],"date-time":"2023-07-17T17:02:12Z","timestamp":1689613332000},"page":"995-1009","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Distribution of the autocorrelation of random Boolean functions"],"prefix":"10.1007","volume":"15","author":[{"given":"Fran\u00e7ois","family":"Rodier","sequence":"first","affiliation":[]},{"given":"Florian","family":"Caullery","sequence":"additional","affiliation":[]},{"given":"Eric","family":"F\u00e9rard","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,17]]},"reference":[{"key":"653_CR1","doi-asserted-by":"publisher","DOI":"10.1002\/0471722154","volume-title":"The probabilistic method","author":"Noga Alon","year":"2000","unstructured":"Alon, Noga, Spencer, Joel H.: The probabilistic method. Wiley & Sons, Hoboken, NJ, USA (2000)"},{"key":"653_CR2","doi-asserted-by":"crossref","unstructured":"Anne Canteaut, Claude Carlet, Pascale Charpin, et al., Propagation characteristics and correlation-immunity of highly nonlinear Boolean functions. Advances in Cryptology EUROCRYPT 2000, Springer, pp. 507-522 (2000)","DOI":"10.1007\/3-540-45539-6_36"},{"key":"653_CR3","doi-asserted-by":"crossref","unstructured":"Carlet, Claude, Boolean Models and Methods in Mathematics, In: Computer Science, and Engineering, Cambridge University Press, New York, NY, USA, pp 398-469, (2010)","DOI":"10.1017\/CBO9780511780448.012"},{"key":"653_CR4","unstructured":"Florian Caullery, Alexander Getmanenko, Vito Mandorino, et al. Semaine d\u2019Etude Math\u00e9matiques et Entreprises 9 : Testing the reliability of a true random generator at run time, working paper or preprint, url: https:\/\/hal.archives-ouvertes.fr\/hal-01021026 (Apr. 2014)"},{"key":"653_CR5","unstructured":"Florian Caullery, Fran\u00e7ois Rodier, Distribution of the autocorrelation of random Boolean functions. In: Proceedings of The Tenth International Workshop on Coding and Cryptography, http:\/\/wcc2017.suai.ru\/proceedings.html, (2017)"},{"key":"653_CR6","unstructured":"Cramer, Harald: Sur un nouveau th\u00e9or\u00e8me limite de la th\u00e9orie des probabilit\u00e9s. In: Actualit\u00e9s Sci. Indust. 736, pp. 5\u201323 (1938)"},{"issue":"1","key":"653_CR7","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1109\/TIT.2017.2769092","volume":"64","author":"Deng Tang","year":"2018","unstructured":"Tang, Deng, Maitra, Subhamoy: Construction of $$n$$-variable ($$n \\equiv 2 (\\text{ mod } \\; 4)$$) balanced Boolean functions with maximum absolute value in autocorrelation spectra $$< 2^{n\/2}$$. IEEE Trans. Inform. Theory 64(1), 393\u2013402 (2018)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"653_CR8","doi-asserted-by":"crossref","unstructured":"St\u00e9phanie Dib, Distribution of Boolean Functions According to the Second-Order Nonlinearity. In: Arithmetic of Finite Fields: Third International Workshop, WAIFI 2010, Istanbul, Turkey, June 27-30, pp. 86-96 (2010)","DOI":"10.1007\/978-3-642-13797-6_7"},{"key":"653_CR9","doi-asserted-by":"crossref","unstructured":"St\u00e9phanie Dib, Asymptotic Nonlinearity of Vectorial Boolean Functions, In: Cryptography Commun, 6.2, pp. 103-115 (2014)","DOI":"10.1007\/s12095-013-0090-1"},{"key":"653_CR10","doi-asserted-by":"crossref","unstructured":"Simon Litsyn and Alexander Shpunt, On the Distribution of Boolean Function Nonlinearity. In: SIAM Journal on Discrete Mathematics 23.1, pp. 79-95 (2009)","DOI":"10.1137\/060665361"},{"key":"653_CR11","unstructured":"Colin McDarmid, On the method of bounded differences. In: Surveys in Combinatorics, Ed. by J. Siemons. Vol. 141, London Mathematical Society Lectures Notes, Cambridge Univ. Press, Cambridge, pp. 148-188 (1989)"},{"key":"653_CR12","doi-asserted-by":"crossref","unstructured":"Idris David Mercer. Autocorrelations of random binary sequences. In: Combinatorics, Probability and Computing 15.05, pp. 663-671 (2006)","DOI":"10.1017\/S0963548306007589"},{"key":"653_CR13","unstructured":"Fran\u00e7ois Rodier, On the nonlinearity of Boolean functions. In: Proceedings of WCC2003, Workshop on coding and cryptography, pp. 397-405 (2003)"},{"key":"653_CR14","doi-asserted-by":"crossref","unstructured":"Fran\u00e7ois Rodier, Asymptotic nonlinearity of Boolean functions. In: Des. Codes Cryptogr. 40.1, pp. 59-70 (2006)","DOI":"10.1007\/s10623-005-6363-8"},{"key":"653_CR15","doi-asserted-by":"crossref","unstructured":"Kai-Uwe Schmidt, The peak sidelobe level of random binary sequences. In: Bulletin of the London Mathematical Society, 46 (2014), no. 3, 643-652","DOI":"10.1112\/blms\/bdu021"},{"key":"653_CR16","unstructured":"Kai-Uwe Schmidt, Nonlinearity measures of random Boolean functions. In: Cryptography and Communications, pp. 1-9 (2015)"},{"key":"653_CR17","doi-asserted-by":"crossref","unstructured":"Yuriy Tarannikov, Peter Korolev, and Anton Botev, Advances in Cryptology, ASIACRYPT 2001 Proceedings, In: Chap. Autocorrelation Coefficients and Correlation Immunity of Boolean Functions, pp. 460-479 (2001)","DOI":"10.1007\/3-540-45682-1_27"},{"key":"653_CR18","doi-asserted-by":"crossref","unstructured":"Xian-Mo Zhang and Yuliang Zheng, Information Security and Cryptology, ICISC 2000 Proceedings. In: Chap. New Results on Correlation Immunity, pp. 49-63 (2001)","DOI":"10.1007\/3-540-45247-8_5"},{"key":"653_CR19","doi-asserted-by":"crossref","unstructured":"Y. Zhou, On the distribution of auto-correlation value of balanced Boolean functions. In: Advances in Mathematics of Communications 7.3, pp. 335-347 (2013)","DOI":"10.3934\/amc.2013.7.335"},{"key":"653_CR20","doi-asserted-by":"crossref","unstructured":"Y. Zhou, M. Xie, and G. Xiao. On cross-correlation properties of Boolean functions. In: Communications and Networking in China, ChinaCOM 2009, Fourth International Conference on Communications and Networking in China, pp. 1-5 (2009)","DOI":"10.1109\/CHINACOM.2009.5339812"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-023-00653-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12095-023-00653-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-023-00653-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,12]],"date-time":"2023-09-12T07:11:59Z","timestamp":1694502719000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12095-023-00653-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,17]]},"references-count":20,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2023,9]]}},"alternative-id":["653"],"URL":"https:\/\/doi.org\/10.1007\/s12095-023-00653-3","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"value":"1936-2447","type":"print"},{"value":"1936-2455","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7,17]]},"assertion":[{"value":"6 April 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 May 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 July 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval and consent to participate"}},{"value":"All authors read and approved the final manuscript.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors have no competing interests as defined by Springer, or other interests that might be perceived to influence the results and\/or discussion reported in this paper.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}