{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T04:25:53Z","timestamp":1729657553751,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,7]]},"DOI":"10.1109\/isit.2008.4595264","type":"proceedings-article","created":{"date-parts":[[2008,8,13]],"date-time":"2008-08-13T18:33:52Z","timestamp":1218652432000},"page":"1631-1635","source":"Crossref","is-referenced-by-count":9,"title":["Matriochka symmetric Boolean functions"],"prefix":"10.1109","author":[{"given":"Cedric","family":"Lauradoux","sequence":"first","affiliation":[]},{"given":"Marion","family":"Videau","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"13"},{"key":"14","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1007\/BF00202268","article-title":"further enumerating boolean functions of cryptographic significance","volume":"8","author":"xian yang","year":"1995","journal-title":"J Cryptology"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb03624.x"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2003.09.004"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2004.833361"},{"key":"2","first-page":"157","article-title":"on pseudorandom sequences as crypto generators","author":"bruer","year":"1984","journal-title":"Proc of the 1984 International Zurich Seminar on Digital Communications"},{"key":"1","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1109\/PGEC.1963.263535","article-title":"algebraic properties of symmetric and partially symmetric boolean functions","volume":"12","author":"arnold","year":"1963","journal-title":"IEEE Trans Comput"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1006\/eujc.1994.1044"},{"key":"7","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1007\/BF00190802","article-title":"enumerating boolean functions of cryptographic significance","volume":"2","author":"mitchell","year":"1990","journal-title":"J Cryptology"},{"article-title":"symmetric and partially symmetric boolean functions","year":"1962","author":"harrison","key":"6"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.851743"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-010-2196-8"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/SECON.1981.673522"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2002.801482"}],"event":{"name":"2008 IEEE International Symposium on Information Theory - ISIT","start":{"date-parts":[[2008,7,6]]},"location":"Toronto, ON, Canada","end":{"date-parts":[[2008,7,11]]}},"container-title":["2008 IEEE International Symposium on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4586217\/4594928\/04595264.pdf?arnumber=4595264","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,7]],"date-time":"2020-05-07T14:06:59Z","timestamp":1588860419000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4595264\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,7]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/isit.2008.4595264","relation":{},"subject":[],"published":{"date-parts":[[2008,7]]}}}