{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T06:35:51Z","timestamp":1774679751352,"version":"3.50.1"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1109\/isit.2005.1523510","type":"proceedings-article","created":{"date-parts":[[2006,10,11]],"date-time":"2006-10-11T11:51:59Z","timestamp":1160567519000},"page":"1101-1105","source":"Crossref","is-referenced-by-count":22,"title":["On the construction of balanced boolean functions with a good algebraic immunity"],"prefix":"10.1109","author":[{"given":"C.","family":"Carlet","sequence":"first","affiliation":[]},{"given":"P.","family":"Gaborit","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"267","article-title":"Cryptanalysis of block ciphers with overdefined systems of equations","volume":"2501","author":"courtois","year":"2003","journal-title":"Advances in Cryptology - CRYPTO 2002 Lecture Notes in Computer Science"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30556-9_9"},{"key":"ref12","article-title":"Cryptographically Significant Boolean Functions: Construction and Analysis in Terms of Algebraic Immunity","author":"dalai","year":"0","journal-title":"Proceedings of FSE 2005 To appear in LNCS"},{"key":"ref13","first-page":"474","article-title":"Algebraic attacks and decomposition of Boolean functions","volume":"3027","author":"meier","year":"2004","journal-title":"Advances in Cryptology-CRYPTO 2004 Lecture Notes in Computer Science"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46416-6_32"},{"key":"ref15","first-page":"705","article-title":"On cryptographic properties of random Boolean functions","volume":"4","author":"olej\u00e1r","year":"1998","journal-title":"Journal of Universal Computer Science"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45539-6_35"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44598-6_32"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1137\/S0895480195294027"},{"key":"ref19","first-page":"181","article-title":"On constructions and nonlinearity of correlation immune Boolean functions","author":"seberry","year":"1994","journal-title":"Advances in Cryptology-Eurocrypt'93 LNCS"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1137\/S0895480198350057"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1007\/3-540-46766-1_6","article-title":"On correlation-immune functions","volume":"576","author":"camion","year":"1991","journal-title":"Advances in Cryptology Crypto '91 Proceedings Lecture Notes in Computer Science"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2005.1523509"},{"key":"ref5","first-page":"549","article-title":"A larger Class of Cryptographic Boolean Functions via a Study of the Maiorana-McFarland Construction","author":"carlet","year":"2002","journal-title":"Advances in Cryptology - CRYPTO 2002 No 2442 in Lecture Notes in Computer Science"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1098-2418(200003)16:2<209::AID-RSA6>3.0.CO;2-1"},{"key":"ref7","first-page":"54","article-title":"On plateaued functions and their constructions","volume":"2887","author":"carlet","year":"2003","journal-title":"Fast Software Encryption 2003 Lecture Notes in Computer Science"},{"key":"ref2","article-title":"Lower bounds on algebraic immunity for recursive constructions of nonlinear filters","author":"botev","year":"2004","journal-title":"Preprint"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1098-2418(199707)10:4<407::AID-RSA1>3.0.CO;2-Y"},{"key":"ref9","first-page":"346","article-title":"Algebraic Attacks on Stream Ciphers with Linear Feedback","volume":"2656","author":"courtois","year":"2002","journal-title":"Advances in Cryptology-Eurocrypt 2003 Lecture Notes in Computer Science"},{"key":"ref20","first-page":"19","article-title":"On resilient Boolean functions with maximum possible nonlinearity","author":"tarannikov","year":"2000","journal-title":"Progress in Cryptology - INDOCRYPT 2000 number 1977 in Lecture Notes in Computer Science"},{"key":"ref21","author":"welzl","year":"0","journal-title":"Rank of random matrices over GF(2)"}],"event":{"name":"Proceedings. International Symposium on Information Theory, 2005. ISIT 2005.","location":"Adelaide, Australia","start":{"date-parts":[[2005,9,4]]},"end":{"date-parts":[[2005,9,9]]}},"container-title":["Proceedings. International Symposium on Information Theory, 2005. ISIT 2005."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10215\/32581\/01523510.pdf?arnumber=1523510","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,18]],"date-time":"2020-04-18T10:44:42Z","timestamp":1587206682000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1523510\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/isit.2005.1523510","relation":{},"subject":[],"published":{"date-parts":[[2005]]}}}