{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T13:00:26Z","timestamp":1772283626181,"version":"3.50.1"},"reference-count":27,"publisher":"World Scientific Pub Co Pte Lt","issue":"06","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Found. Comput. Sci."],"published-print":{"date-parts":[[2014,9]]},"abstract":"<jats:p> Recently, Tang, Carlet and Tang presented a combinatorial conjecture about binary strings, allowing proving that all balanced functions in some infinite class they introduced have optimal algebraic immunity. Later, Cohen and Flori completely proved that the conjecture is true. These functions have good (provable or at least observable) cryptographic properties but they are not 1-resilient, which represents a drawback for their use as filter functions in stream ciphers. We propose a construction of an infinite class of 1-resilient Boolean functions with optimal algebraic immunity by modifying the functions in this class. The constructed functions have optimal algebraic degree, that is, meet the Siegenthaler bound, and high nonlinearity. We prove a lower bound on their nonlinearity, but as for the Carlet-Feng functions and for the functions mentioned above, this bound is not enough for ensuring a nonlinearity sufficient for allowing resistance to the fast correlation attack. Nevertheless, as for previously found functions with the same features, there is a gap between the bound that we can prove and the actual values computed for small numbers of variables. Our computations show that the functions in this class have very good nonlinearity and also good immunity to fast algebraic attacks. This is the first time that an infinite class of functions gathers all of the main criteria allowing these functions to be used as filters in stream ciphers. <\/jats:p>","DOI":"10.1142\/s0129054114500324","type":"journal-article","created":{"date-parts":[[2014,10,28]],"date-time":"2014-10-28T03:47:17Z","timestamp":1414468037000},"page":"763-780","source":"Crossref","is-referenced-by-count":10,"title":["A CLASS OF 1-RESILIENT BOOLEAN FUNCTIONS WITH OPTIMAL ALGEBRAIC IMMUNITY AND GOOD BEHAVIOR AGAINST FAST ALGEBRAIC ATTACKS"],"prefix":"10.1142","volume":"25","author":[{"given":"DENG","family":"TANG","sequence":"first","affiliation":[{"name":"Provincial Key Laboratory of Information Coding and Transmission, Institute of Mobile Communications, Southwest Jiaotong University, Chengdu, 610031, P. R. China"},{"name":"LAGA, Universities of Paris 8 and Paris 13, France"},{"name":"CNRS, UMR 7539, University of Paris 8, Department of Mathematics, 2 rue de la libert\u00e9, 93526 Saint-Denis cedex 02, France"}]},{"given":"CLAUDE","family":"CARLET","sequence":"additional","affiliation":[{"name":"LAGA, Universities of Paris, 8 and Paris 13, France"},{"name":"CNRS, UMR 7539, University of Paris 8, Department of Mathematics, 2 rue de la libert\u00e9, 93526 Saint-Denis cedex 02, France"}]},{"given":"XIAOHU","family":"TANG","sequence":"additional","affiliation":[{"name":"Provincial Key Laboratory of Information Coding and Transmission, Institute of Mobile Communications, Southwest Jiaotong University, Chengdu, 610031, P. R. China"}]}],"member":"219","published-online":{"date-parts":[[2014,10,28]]},"reference":[{"key":"p_2","first-page":"147","volume":"2006","author":"Armknecht F.","year":"2006","journal-title":"Advances in Cryptology-EUROCRYPT"},{"key":"p_3","first-page":"86","volume":"91","author":"Camion P.","year":"1992","journal-title":"Advances in CryptologyCRYPTO"},{"key":"p_4","first-page":"549","volume":"2002","author":"Carlet C.","year":"2002","journal-title":"Advances in Cryptology-CRYPTO"},{"issue":"7","key":"p_6","first-page":"3105","volume":"52","author":"Carlet C.","year":"2006","journal-title":"IEEE Transactions on"},{"key":"p_7","first-page":"425","volume":"2008","author":"Carlet C.","year":"2008","journal-title":"Advances in Cryptology-ASIACRYPT"},{"key":"p_9","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-009-9284-0"},{"key":"p_12","first-page":"176","volume":"2003","author":"Courtois N. T.","year":"2003","journal-title":"Advances in Cryptology-CRYPTO"},{"key":"p_13","first-page":"345","volume":"2003","author":"Courtois N. T.","year":"2003","journal-title":"Advances in Cryptology-EUROCRYPT"},{"key":"p_15","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-005-6300-x"},{"key":"p_19","first-page":"390","volume":"2004","author":"Hawkes P.","year":"2004","journal-title":"Advances in Cryptology-CRYPTO"},{"key":"p_20","first-page":"84","volume":"2006","author":"Li N.","year":"2006","journal-title":"Advances in Cryptology-ASIACRYPT"},{"key":"p_21","first-page":"172","volume":"2012","author":"Liu M.","year":"2012","journal-title":"Advances in Cryptology-ASIACRYPT"},{"issue":"7","key":"p_22","first-page":"1825","volume":"48","author":"Maitra S.","year":"2002","journal-title":"IEEE Transactions on"},{"issue":"1","key":"p_23","first-page":"122","volume":"15","author":"Massey J.","year":"1969","journal-title":"IEEE Transactions on"},{"key":"p_24","first-page":"474","volume":"2004","author":"Meier W.","year":"2004","journal-title":"Advances in Cryptology-EUROCRYPT"},{"key":"p_25","first-page":"301","volume":"1988","author":"Meier W.","year":"1988","journal-title":"Advances in Cryptology-EUROCRYPT"},{"issue":"10","key":"p_26","first-page":"4581","volume":"52","author":"Pasalic E.","year":"2006","journal-title":"IEEE Transactions on"},{"issue":"8","key":"p_27","first-page":"4014","volume":"56","author":"Rizomiliotis P.","year":"2010","journal-title":"IEEE Transactions on"},{"issue":"5","key":"p_28","first-page":"1752","volume":"53","author":"R\u00f8njom S.","year":"2007","journal-title":"IEEE Transactions on"},{"issue":"9","key":"p_29","first-page":"2185","volume":"50","author":"Sarkar P.","year":"2004","journal-title":"IEEE Transactions on"},{"issue":"5","key":"p_30","first-page":"776","volume":"30","author":"Siegenthaler T.","year":"1984","journal-title":"IEEE Transactions on"},{"issue":"1","key":"p_31","first-page":"653","volume":"59","author":"Tang D.","year":"2013","journal-title":"IEEE Transactions on"},{"key":"p_33","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-010-9413-9"},{"issue":"6","key":"p_36","first-page":"3048","volume":"56","author":"Wang Q.","year":"2010","journal-title":"IEEE Transactions on"},{"issue":"3","key":"p_37","first-page":"569","volume":"34","author":"Xiao G.","year":"1988","journal-title":"IEEE Transactions on"},{"issue":"9","key":"p_38","first-page":"6310","volume":"57","author":"Zeng X.","year":"2011","journal-title":"IEEE Transactions on"},{"issue":"12","key":"p_39","first-page":"5822","volume":"55","author":"Zhang W.","year":"2009","journal-title":"IEEE Transactions on"}],"container-title":["International Journal of Foundations of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0129054114500324","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,6]],"date-time":"2019-08-06T14:02:10Z","timestamp":1565100130000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0129054114500324"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9]]},"references-count":27,"journal-issue":{"issue":"06","published-online":{"date-parts":[[2014,10,28]]},"published-print":{"date-parts":[[2014,9]]}},"alternative-id":["10.1142\/S0129054114500324"],"URL":"https:\/\/doi.org\/10.1142\/s0129054114500324","relation":{},"ISSN":["0129-0541","1793-6373"],"issn-type":[{"value":"0129-0541","type":"print"},{"value":"1793-6373","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,9]]}}}