{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T21:22:01Z","timestamp":1649193721149},"reference-count":26,"publisher":"Informa UK Limited","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["International Journal of Computer Mathematics"],"published-print":{"date-parts":[[2011,1]]},"DOI":"10.1080\/00207160903530957","type":"journal-article","created":{"date-parts":[[2010,11,27]],"date-time":"2010-11-27T09:25:42Z","timestamp":1290849942000},"page":"239-248","source":"Crossref","is-referenced-by-count":0,"title":["Cryptographic properties of Boolean functions defining elementary cellular automata"],"prefix":"10.1080","volume":"88","author":[{"given":"J. Escuadra","family":"Burrieza","sequence":"first","affiliation":[{"name":"a Department of Informatic and Automatic, E.P.S. de Zamora , Universidad de Salamanca. , Avda. Cardenal Requejo 34, 49022, Zamora, Spain"}]},{"given":"A. Mart\u00edn","family":"del Rey","sequence":"additional","affiliation":[{"name":"b Department of Applied Mathematics, E.P.S. de \u00c1vila , Universidad de Salamanca. , C\/ Hornos Caleros 50, 05003, \u00c1vila, Spain"}]},{"given":"J. L.","family":"P\u00e9rez Iglesias","sequence":"additional","affiliation":[{"name":"a Department of Informatic and Automatic, E.P.S. de Zamora , Universidad de Salamanca. , Avda. Cardenal Requejo 34, 49022, Zamora, Spain"}]},{"given":"G. Rodr\u00edguez","family":"S\u00e1nchez","sequence":"additional","affiliation":[{"name":"c Department of Applied Mathematics, E.P.S. de Zamora , Universidad de Salamanca. , Avda. Cardenal Requejo 34, 49022, Zamora, Spain"}]},{"given":"A. Queiruga","family":"Dios","sequence":"additional","affiliation":[{"name":"d Department of Applied Mathematics, E.T.S.S.I. de B\u00e9jar , Universidad de Salamanca. , Avda. Fern\u00e1ndez Ballesteros 2, 37700, B\u00e9jar, Salamanca, Spain"}]},{"given":"A.","family":"de la Villa Cuenca","sequence":"additional","affiliation":[{"name":"e Department of Applied Mathematics and Computation, E.T.S.I. (ICAI) , Universidad Pontifica de Comillas. , C\/ Alberto Aguilera 23, 28015, Madrid, Spain"}]}],"member":"301","published-online":{"date-parts":[[2010,11,26]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(92)90258-W"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1007\/BF00630563"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4613-9314-6"},{"key":"CIT0004","volume-title":"Additive Cellular Automata. Theory and Applications","volume":"1","author":"Chaudhuri P. P.","year":"1997"},{"key":"CIT0005","first-page":"249","volume-title":"Advances in Cryptology","author":"Evertse J. H.","year":"1988"},{"issue":"2","key":"CIT0006","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1007\/s10440-006-9041-6","volume":"93","author":"F\u00faster A.","year":"2006","journal-title":"Acta Appl. Math."},{"key":"CIT0007","doi-asserted-by":"crossref","unstructured":"F\u00faster , A. and de la Gu\u00eda , D. 2004.Cellular automata applications to the linearization of stream cipher generators, 612\u2013621. Berlin\/Heidelberg: Springer. Proceedings of ACRI 2004, Lecture Notes in Computer Science, vol. 3305","DOI":"10.1007\/978-3-540-30479-1_63"},{"key":"CIT0008","doi-asserted-by":"crossref","unstructured":"Knudsen , L. R. 1995.Truncated and higher order differentials, 196\u2013211. Berlin\/Heidelberg: Springer.Proceedings of 2nd FSE, Lecture Notes in Computer Science, vol. 1008","DOI":"10.1007\/3-540-60590-8_16"},{"key":"CIT0009","doi-asserted-by":"crossref","unstructured":"Lai , X. 1994.Higher order derivatives and differential cryptanalysis, Edited by: Blahut , R. E. Costello , D. J. Jr. Maurer , U. and Mittelholzer , T. 227\u2013233. Berlin: Kluwer Academic Publishers.Communications and Cryptology","DOI":"10.1007\/978-1-4615-2694-0_23"},{"issue":"2","key":"CIT0010","first-page":"145","volume":"3","author":"Martin B.","year":"2008","journal-title":"J. Cellular Automata"},{"key":"CIT0011","doi-asserted-by":"crossref","first-page":"1707","DOI":"10.1142\/S0129183107011613","volume":"18","author":"Mart\u00edn del Rey A.","year":"2007","journal-title":"Int. J. Mod. Phys. C"},{"key":"CIT0012","doi-asserted-by":"crossref","unstructured":"Matsui , M. 1995.On correlation between the order of S-boxes and the strength of DES, Edited by: Pieprzyk , J. and Safavi-Nauti , R. Vol. 950, 366\u2013375. Berlin\/Heidelberg: Springer.Advances in Cryptology, Proceedings of Asiacrypt\u201994, Lecture Notes in Computer Science","DOI":"10.1007\/BFb0053451"},{"key":"CIT0013","doi-asserted-by":"crossref","unstructured":"Meier , W. and Staffelbach , O. 1990.Nonlinearity criteria for cryptographic functions, Edited by: Quisquater , J.J. and Vandewalle , J. Vol. 434, 549\u2013562. Berlin\/Heidelberg: Springer.Advances in Cryptology, Proceedings of Eurocrypt\u201989, Lecture Notes in Computer Science","DOI":"10.1007\/3-540-46885-4_53"},{"key":"CIT0014","doi-asserted-by":"crossref","unstructured":"Mukherjee , M. Ganguly , N. and Chaudhuri , P. P. 2002.Cellular automata based authenticationVol. 2493, 259\u2013269. in Proceedings of ACRI 2002, Lecture Notes in Computer Science","DOI":"10.1007\/3-540-45830-1_25"},{"issue":"12","key":"CIT0015","doi-asserted-by":"crossref","first-page":"1346","DOI":"10.1109\/12.338094","volume":"43","author":"Nandi S.","year":"1994","journal-title":"IEEE Trans. Comput."},{"key":"CIT0016","doi-asserted-by":"crossref","unstructured":"Preneel , B. Van Leekwijck , W. Van Linden , L. Govaerts , R. and Vandevalle , J. 1991.Propagation characteristic of boolean functionsVol. 473, 161\u2013173.Advances in Cryptology, Proceedings of Eurocrypt\u201990, Lecture Notes in Computer Science","DOI":"10.1007\/3-540-46877-3_14"},{"issue":"1","key":"CIT0017","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1109\/TIT.1987.1057268","volume":"33","author":"Rueppel R. A.","year":"1987","journal-title":"IEEE Trans. Inform. Theory"},{"key":"CIT0018","doi-asserted-by":"crossref","unstructured":"Seredynski , M. and Bouvry , P. 2004.Block encryption using reversible cellular automataVol. 3305, 785\u2013792. Proceedings of ACRI 2004, Lecture Notes in Computer Science","DOI":"10.1007\/978-3-540-30479-1_81"},{"issue":"5","key":"CIT0019","doi-asserted-by":"crossref","first-page":"776","DOI":"10.1109\/TIT.1984.1056949","volume":"30","author":"Siegenthaler T.","year":"1984","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"3","key":"CIT0020","doi-asserted-by":"crossref","first-page":"1131","DOI":"10.1016\/j.asoc.2006.10.003","volume":"7","author":"Tan S. K.","year":"2007","journal-title":"Appl. Soft Comput."},{"key":"CIT0021","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1016\/S1568-4946(01)00015-1","volume":"1","author":"Tomassini M.","year":"2001","journal-title":"Appl. Software Comput."},{"key":"CIT0022","first-page":"523","volume-title":"Advances in Cryptology","volume":"219","author":"Webster A. F.","year":"1985"},{"key":"CIT0023","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1016\/0196-8858(86)90028-X","volume":"7","author":"Wolfram S.","year":"1986","journal-title":"Adv. Appl. Math."},{"key":"CIT0024","first-page":"429","volume-title":"Advances in Cryptology","volume":"218","author":"Wolfram S.","year":"1986"},{"key":"CIT0025","volume-title":"A New Kind of Science","author":"Wolfram S.","year":"2002"},{"issue":"3","key":"CIT0026","doi-asserted-by":"crossref","first-page":"569","DOI":"10.1109\/18.6037","volume":"34","author":"Xiao G. Z.","year":"1988","journal-title":"IEEE Trans. Inform. Theory"}],"container-title":["International Journal of Computer Mathematics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/00207160903530957","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,6]],"date-time":"2019-06-06T15:49:37Z","timestamp":1559836177000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/00207160903530957"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,11,26]]},"references-count":26,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2010,11,26]]},"published-print":{"date-parts":[[2011,1]]}},"alternative-id":["10.1080\/00207160903530957"],"URL":"https:\/\/doi.org\/10.1080\/00207160903530957","relation":{},"ISSN":["0020-7160","1029-0265"],"issn-type":[{"value":"0020-7160","type":"print"},{"value":"1029-0265","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,11,26]]}}}