{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T01:59:51Z","timestamp":1760061591457},"reference-count":17,"publisher":"World Scientific Pub Co Pte Ltd","issue":"04","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Found. Comput. Sci."],"published-print":{"date-parts":[[2016,6]]},"abstract":"<jats:p>We show the use of a reconfigurable computer in computing the correlation immunity of Boolean functions of up to 6 variables. Boolean functions with high correlation immunity are desired in cryptographic systems because they are immune to correlation attacks. The SRC-6 reconfigurable computer was programmed in Verilog to compute the correlation immunity of functions. This computation is performed at a rate that is 190 times faster than a conventional computer. Our analysis of the correlation immunity is across all n-variable Boolean functions, for 2 \u2264 n \u2264 6, thus obtaining, for the first time, a complete distribution of such functions. We also compare correlation immunity with two other cryptographic properties, nonlinearity and degree.<\/jats:p>","DOI":"10.1142\/s0129054116500131","type":"journal-article","created":{"date-parts":[[2016,7,7]],"date-time":"2016-07-07T07:21:04Z","timestamp":1467876064000},"page":"511-528","source":"Crossref","is-referenced-by-count":4,"title":["A Parallel Approach in Computing Correlation Immunity up to Six Variables"],"prefix":"10.1142","volume":"27","author":[{"given":"Carole J.","family":"Etherington","sequence":"first","affiliation":[{"name":"ECE Department, Naval Postgraduate School, Monterey, CA 93943, USA"}]},{"given":"Matthew W.","family":"Anderson","sequence":"additional","affiliation":[{"name":"Computer Science Department, Union College, 807 Union Street, Schenectady, NY 12308, USA"}]},{"given":"Eric","family":"Bach","sequence":"additional","affiliation":[{"name":"Computer Sciences Department, University of Wisconsin, Madison, WI 53706, USA"}]},{"given":"Jon T.","family":"Butler","sequence":"additional","affiliation":[{"name":"ECE Department, Naval Postgraduate School, Monterey, CA 93943, USA"}]},{"given":"Pantelimon","family":"St\u0103nic\u0103","sequence":"additional","affiliation":[{"name":"Applied Mathematics Department, Naval Postgraduate School, Monterey, CA 93943, USA"}]}],"member":"219","published-online":{"date-parts":[[2016,7,7]]},"reference":[{"key":"p_1","doi-asserted-by":"publisher","DOI":"10.1137\/070705520"},{"key":"p_2","doi-asserted-by":"publisher","DOI":"10.1002\/jcd.3180030304"},{"key":"p_3","first-page":"164","volume":"0","author":"Brayton R. K.","year":"1984","journal-title":"ISBN"},{"key":"p_5","doi-asserted-by":"publisher","DOI":"10.1007\/s12095-010-0019-x"},{"key":"p_12","doi-asserted-by":"publisher","DOI":"10.1515\/dma.1992.2.4.407"},{"key":"p_13","doi-asserted-by":"publisher","DOI":"10.1515\/dma.2000.10.1.87"},{"key":"p_15","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1992.267760"},{"key":"p_16","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2039038"},{"key":"p_17","first-page":"2374","volume":"10","author":"Hellerstein L.","year":"2009","journal-title":"J. Mach. Learn. Res."},{"key":"p_18","first-page":"419","volume":"7","author":"Mesnager S.","year":"2007","journal-title":"Algebraic Geometry and Its Applications, Proc. of the First SAGA Conference, Papeete, France"},{"key":"p_19","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022487918212"},{"key":"p_22","doi-asserted-by":"crossref","first-page":"728","DOI":"10.1145\/1102351.1102443","author":"Rosell B.","year":"2005","journal-title":"Proc. 22nd Intl. Conf. Machine Learning"},{"key":"p_23","doi-asserted-by":"publisher","DOI":"10.1016\/0097-3165(76)90024-8"},{"key":"p_24","first-page":"1880","volume":"2000","author":"Sarkar P.","year":"2000","journal-title":"Adv. in Crypt. - CRYPTO"},{"key":"p_28","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1984.1056949"},{"key":"p_29","first-page":"2248","volume":"2001","author":"Tarannikov Y.","year":"2001","journal-title":"Adv. in Crypt. - ASIACRYPT"},{"key":"p_31","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1007\/BF00202268","volume":"8","author":"Yang Y. X.","year":"1995","journal-title":"J. Cryptology"}],"container-title":["International Journal of Foundations of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0129054116500131","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,2]],"date-time":"2022-07-02T20:26:47Z","timestamp":1656793607000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0129054116500131"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6]]},"references-count":17,"journal-issue":{"issue":"04","published-online":{"date-parts":[[2016,7,7]]},"published-print":{"date-parts":[[2016,6]]}},"alternative-id":["10.1142\/S0129054116500131"],"URL":"https:\/\/doi.org\/10.1142\/s0129054116500131","relation":{},"ISSN":["0129-0541","1793-6373"],"issn-type":[{"value":"0129-0541","type":"print"},{"value":"1793-6373","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,6]]}}}