{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T10:00:32Z","timestamp":1740132032004,"version":"3.37.3"},"reference-count":44,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"9","license":[{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172075"],"award-info":[{"award-number":["62172075"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Chengdu Innovation and Technology Project","award":["2021-YF05-02414-GX"],"award-info":[{"award-number":["2021-YF05-02414-GX"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst."],"published-print":{"date-parts":[[2023,9]]},"DOI":"10.1109\/tcad.2023.3235802","type":"journal-article","created":{"date-parts":[[2023,1,10]],"date-time":"2023-01-10T19:08:51Z","timestamp":1673377731000},"page":"2966-2979","source":"Crossref","is-referenced-by-count":0,"title":["Generalized Affine Equivalence Checking of Boolean Functions via Reachability Analysis"],"prefix":"10.1109","volume":"42","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5015-9835","authenticated-orcid":false,"given":"Xiao","family":"Zeng","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China"}]},{"given":"Huijun","family":"Liang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China"}]},{"given":"Jun","family":"Yuan","sequence":"additional","affiliation":[{"name":"Arcas-Tech company, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6583-9400","authenticated-orcid":false,"given":"Xiaoyu","family":"Song","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Portland State University, Portland, OR, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5133-0320","authenticated-orcid":false,"given":"Guowu","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China"}]}],"member":"263","reference":[{"journal-title":"Field-Programmable Gate Array Technology","year":"2012","author":"trimberger","key":"ref13"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1137\/0112026"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/5.231340"},{"key":"ref34","first-page":"125","article-title":"Efficient implementation of property directed reachability","author":"e\u00e9n","year":"2011","journal-title":"Proc Formal Methods in Computer Aided Design (FMCAD)"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxm042"},{"key":"ref37","volume":"211","author":"lang","year":"2012","journal-title":"Algebra"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2003.811448"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2016.2557329"},{"key":"ref31","first-page":"457","article-title":"Bounded model checking","volume":"185","author":"biere","year":"2009","journal-title":"Handbook of Satisfiability"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011276507260"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2019.2909910"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/FAMCAD.2007.15"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"672","DOI":"10.1109\/TIT.2012.2213064","article-title":"The nonexistence of permutations EA-equivalent to certain AB functions","volume":"59","author":"li","year":"2013","journal-title":"IEEE Trans Inf Theory"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-18275-4_7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/43.573830"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2008.923256"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.E102.A.594"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s00224-021-10029-w"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1006\/jabr.1995.1043"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s00224-018-9903-0"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.26421\/QIC8.3-4-4"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-017-0329-5"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-007-0030-9"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39887-5_7"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/0376-5075(78)90015-6"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2018.12.002"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3474226"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxac072"},{"journal-title":"AveMC","year":"2021","key":"ref41"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1972.1054732"},{"journal-title":"Elementary Hadamard Difference sets","year":"1974","author":"dillon","key":"ref44"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1017\/9781108606806"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/0097-3165(73)90031-9"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/196244.196467"},{"key":"ref27","first-page":"1","article-title":"Efficient BDD algorithms for FSM synthesis and verification","volume":"253","author":"ranjan","year":"1995","journal-title":"Proc IWLS"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.21236\/ADA360973"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1991-1079027-8"},{"article-title":"Solving circuit optimisation problems in cryptography and cryptanalysis","year":"2011","author":"courtois","key":"ref7"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/11523468_27"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2008.2003272"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2003.810744"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ECCTD.2009.5274957"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/31.99163"},{"journal-title":"BuDDy Binary decision diagram package","year":"1999","author":"lind-nielsen","key":"ref40"}],"container-title":["IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/43\/10225609\/10013750.pdf?arnumber=10013750","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,11]],"date-time":"2023-09-11T18:08:07Z","timestamp":1694455687000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10013750\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9]]},"references-count":44,"journal-issue":{"issue":"9"},"URL":"https:\/\/doi.org\/10.1109\/tcad.2023.3235802","relation":{},"ISSN":["0278-0070","1937-4151"],"issn-type":[{"type":"print","value":"0278-0070"},{"type":"electronic","value":"1937-4151"}],"subject":[],"published":{"date-parts":[[2023,9]]}}}