{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T04:11:30Z","timestamp":1746245490546,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,8]]},"DOI":"10.1109\/chinacom.2012.6417470","type":"proceedings-article","created":{"date-parts":[[2013,1,30]],"date-time":"2013-01-30T22:52:09Z","timestamp":1359586329000},"page":"173-178","source":"Crossref","is-referenced-by-count":2,"title":["New bounds on the sum-of-squares indicator"],"prefix":"10.1109","author":[{"family":"Yu Zhou","sequence":"first","affiliation":[]},{"family":"Xinfeng Dong","sequence":"additional","affiliation":[]},{"family":"Wenzheng Zhang","sequence":"additional","affiliation":[]},{"family":"Bing Zeng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1023\/B:DESI.0000012443.88578.69","article-title":"Boolean functions with five controllable cryptographic properties","volume":"31","author":"sta?nica?","year":"2004","journal-title":"Designs Codes and Cryptography"},{"key":"14","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1016\/S0020-0190(00)00221-0","article-title":"Improving the nonlinearity of certain balanced Boolean functions with good local and global avalanche characteristics","volume":"79","author":"sta?nica?","year":"2001","journal-title":"Information Processing Letters"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2032736"},{"key":"12","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1007\/3-540-45539-6_36","article-title":"Propagation characteristics and correlation immunity of highly nonlineaar Boolean functions","volume":"1807","author":"canteaut","year":"2000","journal-title":"Lecture notes in Computer Sceince"},{"key":"3","first-page":"155","article-title":"Propagation characteristics of Boolean functions","volume":"437","author":"preneel","year":"1991","journal-title":"LNCS"},{"journal-title":"Plaintext\/ciphertext bit dependencies in cryptographic system","year":"1985","author":"webster","key":"2"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/18.57222"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/18.915690"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2009.09.012"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-0190(98)00184-7"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-0190(98)00009-X"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-80350-5_30"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/S1571-0653(04)00167-2"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/s00224-001-1019-1"}],"event":{"name":"2012 7th International ICST Conference on Communications and Networking in China (CHINACOM 2012)","start":{"date-parts":[[2012,8,8]]},"location":"Kun Ming","end":{"date-parts":[[2012,8,10]]}},"container-title":["7th International Conference on Communications and Networking in China"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6410218\/6417432\/06417470.pdf?arnumber=6417470","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T06:42:24Z","timestamp":1498027344000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6417470\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,8]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/chinacom.2012.6417470","relation":{},"subject":[],"published":{"date-parts":[[2012,8]]}}}