{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:43:35Z","timestamp":1740149015408,"version":"3.37.3"},"reference-count":30,"publisher":"Wiley","license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61472249","61572192","61571191","61672238","2016KW-038"],"award-info":[{"award-number":["61472249","61572192","61571191","61672238","2016KW-038"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61472249","61572192","61571191","61672238","2016KW-038"],"award-info":[{"award-number":["61472249","61572192","61571191","61672238","2016KW-038"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61472249","61572192","61571191","61672238","2016KW-038"],"award-info":[{"award-number":["61472249","61572192","61571191","61672238","2016KW-038"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61472249","61572192","61571191","61672238","2016KW-038"],"award-info":[{"award-number":["61472249","61572192","61571191","61672238","2016KW-038"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"International Science & Technology Cooperation & Exchange Projects of Shaanxi Province","award":["61472249","61572192","61571191","61672238","2016KW-038"],"award-info":[{"award-number":["61472249","61572192","61571191","61672238","2016KW-038"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2017]]},"abstract":"<jats:p>Several factors (e.g., balancedness, good correlation immunity) are considered as important properties of Boolean functions for using in cryptographic primitives. A Boolean function is perfect algebraic immune if it is with perfect immunity against algebraic and fast algebraic attacks. There is an increasing interest in construction of Boolean function that is perfect algebraic immune combined with other characteristics, like resiliency. A resilient function is a balanced correlation-immune function. This paper uses bivariate representation of Boolean function and theory of finite field to construct a generalized and new class of Boolean functions on even variables by extending the Carlet-Feng functions. We show that the functions generated by this construction support cryptographic properties of 1-resiliency and (sub)optimal algebraic immunity and further propose the sufficient condition of achieving optimal algebraic immunity. Compared experimentally with Carlet-Feng functions and the functions constructed by the method of first-order concatenation existing in the literature on even (from 6 to 16) variables, these functions have better immunity against fast algebraic attacks. Implementation results also show that they are almost perfect algebraic immune functions.<\/jats:p>","DOI":"10.1155\/2017\/6268230","type":"journal-article","created":{"date-parts":[[2017,9,14]],"date-time":"2017-09-14T17:00:39Z","timestamp":1505408439000},"page":"1-9","source":"Crossref","is-referenced-by-count":3,"title":["1-Resilient Boolean Functions on Even Variables with Almost Perfect Algebraic Immunity"],"prefix":"10.1155","volume":"2017","author":[{"given":"Gang","family":"Han","sequence":"first","affiliation":[{"name":"School of Electronics and Information, Northwestern Polytechnical University, Shaanxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9278-4521","authenticated-orcid":true,"given":"Yu","family":"Yu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"},{"name":"Westone Cryptologic Research Center, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1779-6178","authenticated-orcid":true,"given":"Xiangxue","family":"Li","sequence":"additional","affiliation":[{"name":"Westone Cryptologic Research Center, Beijing, China"},{"name":"Department of Computer Science and Technology, East China Normal University, Shanghai, China"},{"name":"National Engineering Laboratory for Wireless Security, Xi\u2019an University of Posts and Telecommunications, Xi\u2019an, China"}]},{"given":"Qifeng","family":"Zhou","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, East China Normal University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5976-2200","authenticated-orcid":true,"given":"Dong","family":"Zheng","sequence":"additional","affiliation":[{"name":"National Engineering Laboratory for Wireless Security, Xi\u2019an University of Posts and Telecommunications, Xi\u2019an, China"}]},{"given":"Hui","family":"Li","sequence":"additional","affiliation":[{"name":"School of Electronics and Information, Northwestern Polytechnical University, Shaanxi, China"}]}],"member":"311","reference":[{"volume-title":"Boolean functions for cryptography and error correcting codes","year":"2010","first-page":"257","key":"1"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1109\/TIT.2006.876253"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1007\/3-540-39200-9_21"},{"year":"2009","key":"4"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1109\/TIT.1984.1056949"},{"key":"6","first-page":"573","volume-title":"Improved fast correlation attacks using parity-check equations of weight 4 and 5","volume":"1807","year":"2000"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1109\/18.6037"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1007\/3-540-48405-1_13"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1007\/978-3-540-89255-7_26"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1007\/3-540-39200-9_21"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1007\/978-3-540-24676-3_28"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1007\/s10623-005-6300-x"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1109\/TIT.2007.915914"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1007\/11935230_6"},{"doi-asserted-by":"publisher","key":"15","DOI":"10.1007\/s10623-010-9413-9"},{"doi-asserted-by":"publisher","key":"16","DOI":"10.1109\/TIT.2011.2109935"},{"doi-asserted-by":"publisher","key":"17","DOI":"10.1007\/978-3-540-45146-4_11"},{"doi-asserted-by":"publisher","key":"32","DOI":"10.1016\/j.jmaa.2013.02.009"},{"doi-asserted-by":"publisher","key":"19","DOI":"10.1007\/s11390-011-9433-6"},{"doi-asserted-by":"publisher","key":"18","DOI":"10.1007\/978-3-642-34961-4_12"},{"doi-asserted-by":"publisher","key":"20","DOI":"10.1023\/A:1008337029047"},{"volume-title":"On constructions and nonlinearity of correlation immune functions (extended abstract)","year":"1994","first-page":"181","key":"21"},{"doi-asserted-by":"publisher","key":"22","DOI":"10.1007\/10719994_2"},{"doi-asserted-by":"publisher","key":"23","DOI":"10.1007\/3-540-46766-1_6"},{"doi-asserted-by":"publisher","key":"24","DOI":"10.1109\/TIT.2011.2145690"},{"doi-asserted-by":"publisher","key":"25","DOI":"10.1109\/TIT.2012.2217476"},{"doi-asserted-by":"publisher","key":"27","DOI":"10.1016\/j.dam.2013.04.014"},{"doi-asserted-by":"publisher","key":"30","DOI":"10.1109\/TC.1985.1676518"},{"doi-asserted-by":"publisher","key":"29","DOI":"10.1007\/978-3-642-31912-9_18"},{"doi-asserted-by":"publisher","key":"31","DOI":"10.1007\/978-3-540-28628-8_24"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2017\/6268230.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2017\/6268230.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2017\/6268230.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,9,14]],"date-time":"2017-09-14T17:00:47Z","timestamp":1505408447000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2017\/6268230\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"references-count":30,"alternative-id":["6268230","6268230"],"URL":"https:\/\/doi.org\/10.1155\/2017\/6268230","relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"type":"print","value":"1939-0114"},{"type":"electronic","value":"1939-0122"}],"subject":[],"published":{"date-parts":[[2017]]}}}