{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T13:28:56Z","timestamp":1648560536891},"reference-count":19,"publisher":"Informa UK Limited","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["International Journal of Computer Mathematics"],"published-print":{"date-parts":[[2011,1]]},"DOI":"10.1080\/00207160903496985","type":"journal-article","created":{"date-parts":[[2010,12,1]],"date-time":"2010-12-01T09:31:49Z","timestamp":1291195909000},"page":"222-238","source":"Crossref","is-referenced-by-count":5,"title":["Construction of 1-resilient Boolean functions with optimum algebraic immunity"],"prefix":"10.1080","volume":"88","author":[{"given":"Wei","family":"Su","sequence":"first","affiliation":[{"name":"a Faculty of Mathematics and Computer Science , Hubei University , Wuhan, 430062, China"}]},{"given":"Xiangyong","family":"Zeng","sequence":"additional","affiliation":[{"name":"a Faculty of Mathematics and Computer Science , Hubei University , Wuhan, 430062, China"},{"name":"b State Key Laboratory of Information Security , Graduate School of Chinese Academy of Sciences , Beijing, 100049, China"}]},{"given":"Lei","family":"Hu","sequence":"additional","affiliation":[{"name":"b State Key Laboratory of Information Security , Graduate School of Chinese Academy of Sciences , Beijing, 100049, China"},{"name":"c Key Laboratory of Mathematics Mechanization , Institute of System Sciences, AMSS, Chinese Academy of Sciences , Beijing, 100190, China"}]}],"member":"301","published-online":{"date-parts":[[2010,12]]},"reference":[{"key":"CIT0001","doi-asserted-by":"crossref","unstructured":"Armknecht , F. 2004. \u201cImproving fast algebraic attacks\u201d. Vol. 3017, 65\u201382. Berlin, Germany: Springer-Verlag. Lecture Notes in Computer Science","DOI":"10.1007\/978-3-540-25937-4_5"},{"key":"CIT0002","doi-asserted-by":"crossref","unstructured":"Braeken , A. and Preneel , B. 2005. \u201cOn the algebraic immunity of symmetric Boolean functions\u201d. Vol. 3797, 35\u201348. Berlin, Germany: Springer-Verlag. Lecture Notes in Computer Science","DOI":"10.1007\/11596219_4"},{"key":"CIT0003","volume-title":"Proceedings of the International Workshop on Coding and Cryptography, The Wuyi Mountain, Fujiang, China, 11\u201315 June 2007","volume":"4","author":"Carlet C."},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.876253"},{"issue":"9","key":"CIT0005","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1007\/s10623-009-9284-0","volume":"52","author":"Carlet C.","year":"2009","journal-title":"Des. Codes Cryptogr."},{"key":"CIT0006","doi-asserted-by":"crossref","unstructured":"Courtois , N. 2003. \u201cFast algebraic attacks on stream ciphers with linear feedback\u201d. Vol. 2729, 176\u2013194. Berlin, Germany: Springer-Verlag. Lecture Notes in Computer Science","DOI":"10.1007\/978-3-540-45146-4_11"},{"key":"CIT0007","doi-asserted-by":"crossref","unstructured":"Courtois , N. and Meier , W. 2003. \u201cAlgebraic attacks on stream ciphers with linear feedback, Advances in Cryptology-Eurocrypt 2003\u201d. Vol. 2656, 345\u2013359. Berlin, Germany: Springer-Verlag. Lecture Notes in Computer Science","DOI":"10.1007\/3-540-39200-9_21"},{"key":"CIT0008","doi-asserted-by":"crossref","unstructured":"Courtois , N. and Pieprzyk , J. 2002. \u201cCryptanalysis of block ciphers with overdefined systems of equations, Advances in Cryptology \u2013 Asiacrypt 2002\u201d. Vol. 2501, 267\u2013287. Berlin, Germany: Springer-Verlag. Lecture Notes in Computer Science","DOI":"10.1007\/3-540-36178-2_17"},{"key":"CIT0009","doi-asserted-by":"crossref","unstructured":"Dalai , D. and Maitra , S. 2006. \u201cReducing the number of homogeneous linear equations in finding annihilators\u201d. Vol. 4086, 376\u2013390. Berlin, Germany: Springer-Verlag. Sequences and Their Applications \u2013 SETA 2006, Lecture Notes in Computer Science","DOI":"10.1007\/11863854_33"},{"key":"CIT0010","first-page":"99","volume-title":"Proceedings of the Workshop on Coding and Cryptography, WCC 07","author":"Dalai D."},{"key":"CIT0011","doi-asserted-by":"crossref","unstructured":"Dalai , D. K. Gupta , K. C. and Maitra , S. 2005. \u201cCryptographically significant Boolean functions: Construction and analysis in terms of algebraic immunity\u201d. Vol. 3557, 98\u2013111. Berlin, Germany: Springer-Verlag. Lecture Notes in Computer Science","DOI":"10.1007\/11502760_7"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-005-6300-x"},{"issue":"5","key":"CIT0013","doi-asserted-by":"crossref","first-page":"2271","DOI":"10.1109\/TIT.2006.872977","volume":"52","author":"Li N.","year":"2006","journal-title":"IEEE Trans. Inf. Theory"},{"key":"CIT0014","doi-asserted-by":"crossref","unstructured":"Li , N. and Qi , W. 2006. \u201cConstruction and analysis of Boolean functions of 2t+1 variables with maximum algebraic immunity\u201d. Vol. 4284, 84\u201398. Berlin, Germany: Springer-Verlag. Lecture Notes in Computer Science","DOI":"10.1007\/11935230_6"},{"key":"CIT0015","unstructured":"Lobanov , M. \u201cTight bound between nonlinearity and algebraic immunity\u201d. Available athttp:\/\/eprint.iacr.org\/2005\/441"},{"key":"CIT0016","unstructured":"MacWilliams , F. J. and Sloane , N. J.A. 1977. \u201cThe Theory of Error-Correcting Codes\u201d. 150\u2013153. Amsterdam, The Netherlands: North-Holland."},{"key":"CIT0017","doi-asserted-by":"crossref","unstructured":"Meier , W. Pasalic , E. and Carlet , C. 2004. \u201cAlgebraic attacks and decomposition of Boolean functions, Advances in Cryptology-Eurocrypt 2004\u201d. Vol. 3027, 474\u2013491. Berlin, Germany: Springer-Verlag. Lecture Notes in Computer Science","DOI":"10.1007\/978-3-540-24676-3_28"},{"key":"CIT0018","doi-asserted-by":"crossref","unstructured":"Sarkar , S. and Maitra , S. 2007. \u201cConstruction of rotation symmetric Boolean functions with maximum algebraic immunity on odd number of variables\u201d. Vol. 4851, 271\u2013280. Berlin, Germany: Springer-Verlag. Lecture Notes in Computer Science","DOI":"10.1007\/978-3-540-77224-8_32"},{"issue":"10","key":"CIT0019","doi-asserted-by":"crossref","first-page":"1567","DOI":"10.1016\/j.dam.2007.04.029","volume":"156","author":"St\u0103nic\u0103 P.","year":"2008","journal-title":"Discrete Appl. Math."}],"container-title":["International Journal of Computer Mathematics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/00207160903496985","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,6]],"date-time":"2019-06-06T18:16:18Z","timestamp":1559844978000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/00207160903496985"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,12]]},"references-count":19,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2010,11,26]]},"published-print":{"date-parts":[[2011,1]]}},"alternative-id":["10.1080\/00207160903496985"],"URL":"https:\/\/doi.org\/10.1080\/00207160903496985","relation":{},"ISSN":["0020-7160","1029-0265"],"issn-type":[{"value":"0020-7160","type":"print"},{"value":"1029-0265","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,12]]}}}